To find out details about a computer, choose a client computer in Static or Dynamic Group and click Details to view more information about that computer.
The information window consists of seven different parts:
•Name - you can change the computer's Name or Description.
•Parent group - change parent Static group of the computer.
•Assigned users - you can change assigned users with current computer.
•Last connected and Scan time - time information with last connection or scan.
•Functionality problems - link to list of problems with current computer.
•Muted - view any muted threats on the selected client.
•Applied policies count and - number of policies applied.
•Unresolved threats count - count of unresolved threats.
•ESET security products - list of ESET components installed on computer.
•Device - information about Manufacturer and Model of computer.
•OS information - OS Name, Type, Version, etc.
•Network adapters - information about networking, IPv4 and IPV6 , Subnet, etc.
•Device identifiers - Serial number, FQDN name, etc.
•Configuration - contains list of configurations of installed ESET products (ERA Agent, ERA Proxy, ESET endpoint, etc) - open configuration via context menu and convert it to policy. Clicking on one of them offers opening the delivered configuration in viewer. By clicking the Request configuration button you can create a task for ERA Agent to collect all the managed products configurations. After the task is delivered to ERA Agent, it is executed ASAP and the results are delivered to ERA Server on the next connection, then you can see the list of all managed products configurations. Clicking the Convert Policy button will open a configuration to be converted to a policy and edited afterwards.
•Applied Policies - list of policies applied to computer. Click Manage Policies button you can manage, edit, assign or delete policy.
Displays the most recent SysInspector results, click Request log to run the SysInspector log request task on selected clients.
A list of executed tasks, you can filter the view to narrow down the results, drill-down, edit, duplicate, delete or run on/rerun the task.
Displays a list of programs installed on a client with details such as version, size, security status, etc.Select a program and click Uninstall to remove it. You will be asked to enter Uninstallation parameters, these are optional command line parameters for the installer (installation package). Each program Uninstallation parameters are unique for each installer of each software.
Shows a list of alerts and their details: Problem, Status, Product, Occurred, Severity, etc. You can also execute some Actions from this screen by clicking Tasks in the lower right corner.
Threats and Quarantine:
All threat types are displayed, but you can filter by Anti-virus, Firewall and HIPS threats for a more specific view.
•Quarantine - a list of quarantined threats with details such as Threat name, Threat type, Object name, Size, First occurred, Count, User reason, etc.
Click Tasks to execute actions. Refer to the Icon legend for details about actions.