How to manage Endpoint products from ESET Security Management Center

Administrator can perform variety of tasks from the ESMC Web Console in order to install products and control client computers. Follow links below to read more about those topics.

Installation of ESET Management Agent and Endpoint security products

ESET Security Management Center requires that theESET Management Agent to be installed on each managed client computer. The ESET Management Agent can be installed in combination with your Endpoint security product using the ESET Remote Deployment Tool or all-in-one installer. Before installation, we recommend that you import your license into ESET Security Management Center so it can be used for your consequent installations. There are two methods to install your Endpoint product:

Use the ESET Remote Deployment Tool or all-in-one installer to install your Endpoint product and ESET Management Agent at the same time

Install your ESET Endpoint product on clients where you have already installed ESET Management Agent using a client task

Managing the Endpoint security product from ESET Security Management Center

All Endpoint security products can be managed from ESMC Web Console. Policies are used to apply settings to single computers or groups. For example, you can create a policy to block access to certain web localities or change all other settings from in the product. Policies can be merged, as shown in our example. Policies set using ESMC cannot be overwritten by a user on a client machine. However, the administrator can use the override feature to allow a user to make changes on a client temporarily. When you are finished making changes, you can request the final configuration from the client and save it as a new policy.

Client tasks can also be used to manage clients. Client tasks are deployed from the Web Console and executed on the client by the ESET Management Agent. The most common client tasks for Windows Endpoints are:

Update modules (also updates the virus database)

Run On-Demand scan

Run custom command

Request the computer and product configuration

Reporting the computer status and getting information from clients to ESET Security Management Center

Each client computer is connected to  ESET Security Management Center through ESET Management Agent. The Agent reports all requested information about the client machine and its software to the ESMC Server. The connection between the agent and server is set by default to 1 minute, but it can be changed in your ESET Management Agent policy. All logs from Endpoints or other ESET security products are sent to the ESMC Server.

Information about installed ESET products and other basic information about a client's OS and status can be found in Computers. Select a client and click Show Details. In the gear_icon Configuration section of this window, a user can look up older configurations or request current configuration. In the SysInspector section, a user can request logs (from Windows computers only).

Web Console also allows you to access a list of all threats (navigate to Threats) from client devices. Threats from a single device can be viewed in Computers. Select a client and click Show Details > Threats and Quarantine. If the client computer runs ESET Enterprise Inspector, you can view and manage Enterprise Inspector threats.

You can generate custom reports on-demand or using a scheduled task to view data about clients in your network. Pre-defined report templates offer a quick way to gather important data, or you can create your own new templates. Examples of reports include aggregated information about computers, threats, quarantine and necessary updates.

validation-status-icon-warning IMPORTANT

A user can only use report templates for which he has sufficient permissions. By default, all templates are stored in the group All. A report can only include information about computers and events within that user's permission scope. Even if a report template is shared among more users, each user's report will only contain information about devices for which that user has permission. See the list of permissions for more information on access rights.