ESET Online Help

Search English
Select the category
Select the topic

How to manage Endpoint products from ESET PROTECT

Before you can start managing ESET Business Solutions you need to perform initial configuration. We recommend that you use Status Overview, especially if you have skipped the ESET PROTECT Tour. Administrator can perform variety of tasks from the ESET PROTECT Web Console to install products and control client computers.

Installation of ESET Management Agent and Endpoint security products

ESET PROTECT requires that theESET Management Agent to be installed on each managed client computer. The ESET Management Agent can be installed in combination with your Endpoint security product. Before installation, we recommend that you import your license into ESET PROTECT so it can be used for your consequent installations. There are several methods to install your Endpoint product:

Use the Agent and ESET security product installer or ESET Remote Deployment Tool to install your Endpoint product and ESET Management Agent at the same time.

Click a computer and select icon_eset Solutions > icon_antivirusDeploy security product to deploy an ESET security product to the computer.

Install your ESET Endpoint product on clients where you have already installed ESET Management Agent using a Client Task.

Managing the Endpoint security product from ESET PROTECT

All Endpoint security products can be managed from ESET PROTECT Web Console. Policies are used to apply settings to single computers or groups. For example, you can create a policy to block access to certain web localities, change scanner settings detection sensitivity (available in Endpoint 7.2 and later), or change all other ESET security settings. Policies can be merged, as shown in our example. Policies set using ESET PROTECT cannot be overwritten by a user on a client machine. However, the administrator can use the override feature to allow a user to make changes on a client temporarily. When you are finished making changes, you can request the final configuration from the client and save it as a new policy.

Tasks can also be used to manage clients. Tasks are deployed from the Web Console and executed on the client by the ESET Management Agent. The most common Client Tasks for Windows Endpoints are:

Update modules (also updates the virus database)

Run On-Demand scan

Run custom command

Request the computer and product configuration

Upgrade ESET security products

1.Click Dashboard > Status Overview > Component version status.

2.Click the yellow/red graph representing outdated components or applications and select Update installed ESET components to initiate an update.

Reporting the computer status and getting information from clients to ESET PROTECT

Each client computer is connected to ESET PROTECT through ESET Management Agent. The Agent reports all requested information about the client machine and its software to ESET PROTECT Server. The connection between the agent and server is set by default to 1 minute, but it can be changed in your ESET Management Agent policy. All logs from Endpoints or other ESET security products are sent to ESET PROTECT Server.

Information about installed ESET products and other basic information about a client's OS and status can be found in Computers. Select a client and click Details. In the gear_icon Configuration section of this window, a user can look up earlier configurations or request current configuration. In the SysInspector section, a user can request logs (from Windows computers only).

Web Console also allows you to access a list of all detections from client devices. Detections from a single device can be viewed in Computers. Select a client and click Details > Detections and Quarantine. If the client computer runs ESET Inspect, you can view and manage ESET Inspect detections.

You can generate custom reports on-demand or using a scheduled task to view data about clients in your network. Pre-defined report templates offer a quick way to gather important data, or you can create your own new templates. Examples of reports include aggregated information about computers, detections, quarantine and necessary updates.


important

A user can only use report templates for which he has sufficient permissions. By default, all templates are stored in the group All. A report can only include information about computers and events within that user's permission scope. Even if a report template is shared among more users, each user's report will only contain information about devices for which that user has permission. See the list of permissions for more information on access rights.