Import a list of computers

To continue ERA Agent deployment from the previous chapter:

1.Select one of the following options:

Text file: A file with hostnames or IP addresses. Each IP address or hostname must be on a new line.

Remote Administrator export : A file with hostnames or IP addresses exported from ERA Web Console.

2.Click Browse and select the file you would like to upload and then click Next.

3.Selected computers for remote deployment will be displayed. Make sure all computers are added and then click Next.

validation-status-icon-warning IMPORTANT: Make sure that computers have the same platform (64-bit or 32-bit operating systems).

4.Click Browse and select the bundle installer package you have created in ERA Web Console. If you do not use any other security applications on your local computer, deselect the check box next to Use ESET AV Remover.

5.Enter login credentials for the target computers. If computers are members of a domain, enter domain administrator credentials. If you log in with local administration credentials, it is necessary to disable remote UAC on the target computers. Optionally, you can select the check box next to Use current user credentials and login credentials will be automatically completed.

6.Deployment method is used to execute programs on remote machines. Built-in method is a default setting which supports Windows error messages. PsExec is a third-party tool and it is an alternative to the built-in method. Select one of these options and click Next.


7.When the installation is started,  "Success" will be displayed.  Click Finish to complete the deployment. If deployment fails, you can export a list of failed computers. Click Browse next the Export failed computers field, select a .txt file to which you want to save the list and then click Export failed computer.


You can check the status log (C:\ProgramData\ESET\RemoteAdministrator\Agent\Logs\status.html) on the client machine to make sure ERA Agent is working properly.

validation-status-icon-infoNOTE: In case of any problems with deployment, read the Troubleshooting chapter.