ESET Online Help

Search English
Select the category
Select the topic

Add computers using RD Sensor

If you are not using AD synchronization, the easiest way to find an unmanaged computer in your network structure is to use RD Sensor. RD Sensor monitors the network in which it is deployed and when a new device without an Agent connects to the network it reports this information to the ESET PROTECT On-Prem.

In Reports, go to section Computers and click the Rogue computers report.

using_RD_sensor

The Rogue computers report lists computers found by the RD Sensor. You can adjust the information reported by RD Sensor with the RD Sensor policy. You can add computers by clicking the computer you want to Add, or you can Add all displayed items.

fs_rd_sensor_add_computer

If you are adding a single computer, you can use a preset name or specify your own (this is a display name that will be used in ESET PROTECT Web Console only, not an actual hostname).

You can also add a description if you want to. If this computer already exists in your ESET PROTECT On-Prem directory, you will be notified and can decide what to do with the duplicate. The available options are: Deploy Agent, Skip, Retry, Move, Duplicate or Cancel.

When the computer is added, a window will open with an option to Deploy Agent.

If you click Add all displayed items a list of computers to be added will be displayed:

1.Click delete_default next to the name of a specific computer if you do not want to include it in your ESET PROTECT On-Prem directory at this time. When you are finished removing computers from the list, click Add.

2.Select the action to take when a duplicate is found (allow for a slight delay depending on the number of computers in your list): Skip, Retry, Move, Duplicate or Cancel.

3.An All devices successfully added window will appear.

using_rd_sensor_add_all_displayed_items

Click Deploy Agent—In Create Installer, select the operating system and Agent deployment type.

Click OK to deploy the Agent later. The added computers will appear in Computers. Click the computer > icon_eset Solutions to deploy the Agent:

oicon_installers Deploy agent using an installer—In Create Installer, select the operating system and Agent deployment type.

odeploy_default Deploy agent using a server task—Use the Agent Deployment Server Task to deploy the Agent.

The results of the RD Sensor scan are written to a log file called detectedMachines.log. It contains a list of discovered computers on your network. You can find the detectedMachines.log file here:

Windows
C:\ProgramData\ESET\Rogue Detection Sensor\Logs\detectedMachines.log

Linux
/var/log/eset/RogueDetectionSensor/detectedMachines.log