Icon legend
This is a collection of icons used throughout ESET PROTECT Web Console with their description. Some of the icons depict actions, item types or current status.
Most icons are displayed in one of three colors to denote the accessibility of an element:
• Default icon—available action
• Blue icon—highlighted element when you hover with the mouse pointer
• Gray icon—action not available
Status icon |
Description |
---|---|
Details about the client device. |
|
Add Device—Add new devices. New Task—Add a new task. New Notification—Add new notification. New Static/Dynamic Groups—Add new groups. |
|
Edit—You can edit your created tasks, notifications, reports template, groups, policies, etc. |
|
Duplicate—Create a new policy based on the existing policy you have selected, a new name is required for the duplicate. |
|
Move—Computers, policies, Static or Dynamic Groups. |
|
Delete—Remove the selected client, group, etc. |
|
Rename multiple items—If you select multiple items, you can rename them one by one in a list or use Regex search and replace multiple items at once. |
|
Scan—Run the On-Demand Scan task on the client that reported the detection. |
|
Update > Update Modules—Run the Modules Update task (triggers an update manually). Update > Update ESET products—Update ESET products installed on the selected device. Update > Update Operating System—Update the operating system on the selected device. |
|
Audit Log—View the Audit Log for the selected item. |
|
Power—Click a computer and select Power > Reboot to restart the device. You can configure the managed computers' restart/shutdown behavior. The computers must run an ESET security product that supports this setting. |
|
Shutdown—Click a computer and select Power > Shutdown to shut down the device. You can configure the managed computers' restart/shutdown behavior. The computers must run an ESET security product that supports this setting. |
|
Log out—Click a computer and select Power > Log Out to log all users out of the computer. |
|
Run Task—Select a task and configure trigger and throttling (optional) for this task. The task will be queued according to the task settings. This option immediately triggers an existing task you select from a list of available tasks. |
|
Recent tasks—Shows recent tasks. Click a task to execute it again. |
|
Assign User—Assign the user to a device. You can manage users in Computer Users. |
|
Manage Policies—A policy can also be assigned directly to a client (multiple clients), not just a group. Select this option to assign the policy to the selected client(s). |
|
Send Wake-Up Call—ESET PROTECT Server runs instant replication of the ESET Management Agent on a client machine via EPNS. This is useful when you do not want to wait for the regular interval when the ESET Management Agent connects to ESET PROTECT Server. For example, when you want a Client Task to be run immediately on the client(s) or if you want a Policy to be applied right away. |
|
Deploy Agent—Create ESET Management Agent Installer to deploy Agent on the selected device. |
|
Connect via RDP—Generate and download a .rdp file that will allow you to connect to the target device via Remote Desktop Protocol. |
|
Mute/Unmute—You can use the Mute option to suppress the visual representation of the alerts reported on a computer. |
|
Disable—Disable or remove a setting or selection. |
|
Assign—Assign a Policy to clients or groups. |
|
Import—Select Reports / Policies / Public key you want to import. |
|
Export—Select Reports / Policies / Peer Certificate you want to export. |
|
Tags—Edit tags (assign, unassign, create, delete). |
|
Static Group |
|
Dynamic Group |
|
Not apply policy flag |
|
Apply policy flag |
|
Force policy flag |
|
Triggers—See the list of Triggers for the selected Client Task. |
|
Desktop |
|
Server |
|
File Server |
|
Mail Server |
|
Gateway Server |
|
Collaboration Server |
|
ESET Management Agent |
|
Rogue Detection Sensor |
|
ESET PROTECT Server |
|
ESET Inspect Server |
|
ESET Bridge |
|
Antivirus detection type. See all detection types in Detections. Click a computer and select Solutions > Deploy security product to deploy an ESET security product to the computer. |
|
Click a computer or the gear icon next to a static group and select Solutions > Enable ESET LiveGuard to activate and enable the ESET LiveGuard Advanced. |
|
ESET Inspect Connector Click Computers > click a computer or select more computers and click Computer > Solutions > Enable ESET Inspect On-Prem to deploy ESET Inspect Connector to the managed Windows/Linux/macOS computers. ESET Inspect On-Prem is only available when you have ESET Inspect On-Prem license and ESET Inspect On-Prem connected to ESET PROTECT On-Prem. A Web Console user requires Read permission or higher for either Access to ESET Inspect or ESET Inspect User. |
|
Click a computer and select Solutions > Enable encryption to enable ESET Full Disk Encryption on the selected computer. |
|
The computer has ESET Full Disk Encryption enabled. |