Computer details

To view the details about a computer, select a client computer in a Static or Dynamic Group and click Show Details. You can also execute actions from the Computers screen by clicking Computer in the lower left corner.

The information window consists of seven different parts:

details_default Overview

The following tiles provide an overview of the computer's situation.

Computer

Click the edit icon edit_default to change the computer's name or description. You can select Allow Duplicate Name f there is already another managed computer with the same name.

FQDN - fully qualified domain name of the computer

details_hoverNOTE

If you have your client computers and ESMC Server running under Active Directory, you can automate populating Name and Description fields using the Static Group Synchronization task.

Parent Group - Change the parent Static group of the computer.

IP - the IP address of the machine.

Applied Policies Count - Click the number to see the list of the policies applied to the machine.

Member of Dynamic Groups - The list of Dynamic Groups the client computer belonged to during the latest replication.

 

Hardware

This tile contains a list of the key hardware parameters, information about the operating system and unique identifiers. Click the tile to view the Details - Hardware tab.

 

Alerts

Alerts - Links to a list of problems with the current computer.

Unresolved Threats Count - Number of unresolved threats. Click to see the list of unresolved threats.

Last Connected Time - Information about the time of the  last connection.

Detection Engine - Version of detection engine on the target device.

Updated - The update status.

 

Products & Licenses

List of ESET components installed on the computer. Click the tile to view the Details - Product & Licenses tab.

Users

Logged users (computers only) - Domain and username of users logged on the device.

Assigned users

oClick Add user or Assign user to assign a user from Computer Users to this device.

oClick the trash can icon delete_default to un-assign the current user.

oClick the assigned user's username to display the account details.

Location (mobile devices only). Devices in the iOS Device Enrollment Program (DEP) can be located only when "Lost Mode" is activated.

Hardware button is used to set up the computer for cloning. It is required when computers are cloned or computers' hardware is changed.

Mark as Master for Cloning > Match with existing computer - See the Match with an existing computer every time option. It is recommended to use this option before the VDI pool is created.

Mark as Master for Cloning > Create new computer - See the Create a new computer every time option. It is recommended to use this option before the VDI pool is created.

Disable hardware detection - Permanently disable detection of hardware changes. This action is irreversible!

Unmark as Master for Cloning - Remove the master flag. After this is applied, each new cloning of the machine results in a question.

validation-status-icon-warning IMPORTANT

Hardware fingerprint detection is not supported on:

Linux, macOS, Android, iOS

systems managed via ESET Virtual Agent Hosts (ESET Virtualization Security)

machines without ESET Management Agent 7


gear_icon Configuration

Configuration tab - Contains list of configurations of installed ESET products (ESET Management Agent, ESET endpoint, etc.). Available actions are:

Click Request configuration to create a task for ESET Management Agent to collect all the managed product configurations. After the task is delivered to ESET Management Agent, it is executed immediately and the results are delivered to ESMC Server on the next connection. This will allow you to see the list of all managed product configurations.

Open a configuration via context menu and convert it to a policy. Click a configuration to see it in the viewer.

Once you open the configuration, you can convert it to a policy. Click Convert to Policy; the current configuration will be transferred to the policy wizard and you can modify and save the configuration as a new policy.

Download a configuration for diagnostics and support purposes. Click a selected configuration and click Download for diagnostics in drop-down menu.

Applied Policies tab - List of policies applied to the device. Click Manage Policies to manage, edit, assign or delete a policy.


icon_sysinspector_logs Logs (computers only)

SysInspector - Click Request log (Windows only) to run the SysInspector log request task on selected clients. After the task is completed, a new entry is added to the list of configurations. Click a configuration in the list to explore it.

Log Collector - Click Run Log Collector to run the Log collector task. After the task is completed, a new entry is added to the list of logs. Click a log in the list to explore it.

Diagnostic logs - Click the Diagnostics > Turn on to start the Diagnostics mode on the current machine. Diagnostics mode will make the client send all logs to the ESMC Server. You can browse all logs within 24 hours. Logs are sorted into 5 categories: Spam Log, Firewall Log, HIPS Log, Device Control Log, Web Control Log.

details_hoverNOTE

The file size limit for log delivery per device is 16MB. If the logs gathered by the task are greater, the task will fail with the  "Log collector output exceeded 16MB and will not be transferred." message. If this occurs, either change the verbosity of the logs and retry the task or gather the logs locally on the device.


play_default Task Executions

A list of executed tasks. You can filter the view to narrow down the results, drill down, edit, duplicate, delete or run on/rerun the task.


icon_installed_applications Installed Applications

Displays a list of programs installed on a client with details such as version, size, security status, etc. You can turn on the reporting of non-ESET applications via Policy setting. Select a program and click Uninstall to remove it. You will be asked to enter the Uninstallation parameters. These are optional command line parameters for the installer (installation package). Uninstallation parameters are unique for each software installer. You can find more information in the documentation for each product.

If an update for the ESET product is available, you can update the ESET product by clicking Update ESET Products button.

details_hoverNOTE

iOS devices report the list of installed software to ESMC once a day. User cannot force refresh the list.


icon_threats Alerts

Shows a list of alerts and their details: Problem, Status, Product, Occurred, Severity, etc. This list can be accessed directly from the Computers section by clicking the alerts count in the Alerts column. You can manage alerts using one-click actions.


question_defaultQuestions (computers only)

The list of cloning-related question is on the Questions tab. Read more about resolving questions for changed or cloned computers.


icon_threat_and_quarantine Threats and Quarantine

Threats - All threat types are displayed, but you can filter threats by threat type: Anti-virus, Firewall, Blocked Files, Enterprise Inspector and HIPS threats.

Quarantine - A list of quarantined threats with details such as Threat name, Threat type, Object name, Size, First occurred, Count, User reason, etc.


icon_more Details

Basic - Information about the device: OS Name, Type, Version, Serial number, FQDN name, etc. Information about its status including whether the device is muted, managed, the last time it was updated and the number of applied policies.

Hardware - Information about the hardware of the computer, the manufacturer and model and information about networking (IPv4, IPV6, subnet, network adapter...).

Products and Licenses - Version of current detection engine, versions of installed ESET Security Products and licenses used.