Icon legend
This is a collection of icons used throughout ESET PROTECT Web Console with their description. Some of the icons depict actions, item types or current status. Most icons are displayed in one of three colors to denote the accessibility of an element:
Default icon - available action
Blue icon - highlighted element when you hover with mouse pointer
Gray icon - action not available
Status icon |
Descriptions |
---|---|
|
Details about the client device. |
|
Add Device - add new devices. New Task - add new task. New Notification - add new notification. New Static/Dynamic Groups - add new groups. |
|
Edit - you can edit your created tasks, notifications, reports template, groups, policies, etc. |
|
Duplicate - lets you create a new policy based on the existing policy you have selected, a new name is required for the duplicate. |
|
Move - computers, policies, Static or Dynamic Groups. |
|
Delete - removes the selected client, group, etc completely. |
|
Rename multiple items - if you select multiple items you can rename them one by one in a list or use Regex search and replace multiple items at once. |
|
Scan - using this option will run the On Demand Scan task on the client that reported the detection. |
|
Update > Update Modules - using this option will run the Modules Update task (triggers an update manually). Update > Update ESET products - Update ESET products installed on the selected device. Update > Update Operating System - Update the operating system on the selected device. |
|
Audit Log - View the Audit Log for the selected item. |
|
Run Task for mobile devices. |
|
Re-enroll - Re-enroll a mobile device. |
|
Unlock - device will be unlocked. |
|
Lock - device will be locked when suspicious activity is detected or the device is marked as missing. |
|
Find - if you want to request the GPS coordinates of your mobile device. |
|
Siren / Lost Mode sound - triggers a loud siren remotely, the siren will start even if your device is set to mute. |
|
Factory reset - all data stored in your device will be permanently erased. |
|
Power - Click a computer and select Power > Reboot to reboot the device. You can configure the managed computers' restart/shutdown behavior. The computers must run ESET Management Agent 9.1 and later and an ESET security product that supports this setting. |
|
Shutdown - Click a computer and select Power > Shutdown to shut down the device. You can configure the managed computers' restart/shutdown behavior. The computers must run ESET Management Agent 9.1 and later and an ESET security product that supports this setting. |
Log out - Click a computer and select Power > Log out to log all users out of the computer. |
|
|
Run Task - select a task and configure trigger and throttling (optional) for this task. The task will be queued according to the task settings. This option immediately triggers an existing task that you select from a list of available tasks. |
|
Recent tasks - shows recent tasks. Click a task to execute it again. |
|
Assign User - assign user to a device. You can manage users in Computer Users. |
|
Manage Policies - a policy can also be assigned directly to a client (multiple clients), not just a group. Select this option to assign the policy to selected client(s). |
|
Send Wake-Up Call - ESET PROTECT Server runs instant replication of the ESET Management Agent on a client machine via EPNS. This is useful when you do not want to wait for the regular interval when the ESET Management Agent connects to ESET PROTECT Server. For example when you want a Client Task to be run immediately on client(s) or if you want a Policy to be applied right away. |
|
Deploy Agent - Create ESET Management Agent Installer to deploy Agent on the selected device. |
|
|
|
Connect via RDP - generate and download a .rdp file that will let you connect to target device via Remote Desktop Protocol. |
|
Mute - if you select a computer and press Mute, the Agent on this client stops reporting to ESET PROTECT; it will only aggregate the information. A muted icon will be displayed next to a computer name in the Muted column. |
|
Disable - disable or remove a setting or selection. |
|
Assign - assign a Policy to client or groups. |
|
Import - select Reports / Policies / Public key you want to import. |
|
Export - select Reports / Policies / Peer Certificate you want to export. |
|
Tags - Edit tags (assign, unassign, create, delete). |
Static Group |
|
Dynamic Group |
|
Not apply policy flag |
|
Apply policy flag |
|
Force policy flag |
|
Triggers - See the list of Triggers for the selected Client Task. |
|
Desktop |
|
Mobile |
|
Server |
|
File Server |
|
Mail Server |
|
Gateway Server |
|
Collaboration Server |
|
ESET Management Agent |
|
Mobile Device Connector |
|
Rogue Detection Sensor |
|
ESET PROTECT Server |
|
ESET Inspect Server |
|
ESET Bridge |
|
Antivirus detection type. See all detection types in Detections. Click a computer and select Solutions > Deploy security product to deploy an ESET security product to the computer. |
|
Click a computer or the gear icon next to a static group and select Solutions > Enable ESET LiveGuard to activate and enable the ESET LiveGuard Advanced. |
|
ESET Inspect Connector Click Computers > click a computer or select more computers and click Computer > Solutions > Enable ESET Inspect to deploy ESET Inspect Connector to the managed Windows/Linux/macOS computers. ESET Inspect is only available when you have ESET Inspect license and ESET Inspect connected to ESET PROTECT. A Web Console user needs Read permission or above for Access to ESET Inspect or Read permission or above for ESET Inspect User. |
|
Click a computer and select Solutions > Enable encryption to enable ESET Full Disk Encryption on the selected computer. |
|
The computer has ESET Full Disk Encryption enabled. |