ESET PROTECT On-Prem
 
Select the tab
ESET PROTECT On-Prem – Table of Contents

Icon legend

This is a collection of icons used throughout ESET PROTECT Web Console with their description. Some of the icons depict actions, item types or current status.

Most icons are displayed in one of three colors to denote the accessibility of an element:

Action available Default icon—available action

Highlighted element Blue icon—highlighted element when you hover with the mouse pointer

Action unavailable Gray icon—action not available

Status icon

Description

Details

Details about the client device.

Add

Add Device—Add new devices.

New Task—Add a new task.

New Notification—Add new notification.

New Static/Dynamic Groups—Add new groups.

Edit

Edit—You can edit your created tasks, notifications, reports template, groups, policies, etc.

Duplicate

Duplicate—Create a new policy based on the existing policy you have selected, a new name is required for the duplicate.

Move

Move—Computers, policies, Static or Dynamic Groups.
Access GroupMove the object to another Static Group where it is available to users with sufficient rights for the target group. Changing the Access Group is useful when solving access issues with other users. Access Group sets the object's Static Group and access to the object based on the user's access rights.

Remove

Delete—Remove the selected client, group, etc.

Scan

Scan—Run the On-Demand Scan task on the client that reported the detection.

Update

Update > Update Modules—Run the Modules Update task (triggers an update manually).

Update > Update ESET products—Update ESET products installed on the selected device.

Update > Update Operating System—Update the operating system on the selected device.

Audit log

Audit LogView the Audit Log for the selected item.

Power/reboot/restore

Power—Click a computer and select Power > Reboot to restart the device. You can configure the managed computers' restart/shutdown behavior. The computers must run an ESET security product that supports this setting.
Restore—Restore the quarantined file to its original location.

Shutdown or deactivate

Shutdown—Click a computer and select Power Power > Shutdown Shutdown to shut down the device. You can configure the managed computers' restart/shutdown behavior. The computers must run an ESET security product that supports this setting.

Deactivate Products

Log out

Log out—Click a computer and select Power Power > Log out Log Out to log all users out of the computer.

Run a task.

Run Task—Select a task and configure trigger and throttling (optional) for this task. The task will be queued according to the task settings. This option immediately triggers an existing task you select from a list of available tasks.

Recent tasks

Recent tasks—Shows recent tasks. Click a task to execute it again.

Assign a user

Assign User—Assign the user to a device. You can manage users in Computer Users.

Manage policies

Manage Policies—A policy can also be assigned directly to a client (multiple clients), not just a group. Select this option to assign the policy to the selected client(s).

Send a wake-up call.

Send Wake-Up Call—ESET PROTECT Server runs instant replication of the ESET Management Agent on a client machine via EPNS. This is useful when you do not want to wait for the regular interval when the ESET Management Agent connects to ESET PROTECT Server. For example, when you want a Client Task to be run immediately on the client(s) or if you want a Policy to be applied right away.

Isolate from network

Isolate from network

Connect

End network isolation

Connect via RDP—Generate and download a .rdp file that will allow you to connect to the target device via Remote Desktop Protocol.

Mute

Unmute

Mute/Unmute—You can use the Mute Mute option to suppress the visual representation of the alerts reported on a computer.

Disable or remove

Disable—Disable or remove a setting or selection.

Edit

Assign—Assign a Policy to clients or groups.

Import

Import—Select Reports / Policies / Public key you want to import.

Export

Export—Select Reports / Policies / Peer Certificate you want to export.

Tags

TagsEdit tags (assign, unassign, create, delete).

Static group

Static Group

Dynamic Group

Dynamic Group

Not apply policy flag

Not apply policy flag

Apply

Apply policy flag

The Force flag

Force policy flag

Triggers

Triggers—See the list of Triggers for the selected Client Task.

Desktop

Desktop

Server

Server

File server

File Server

Mail server

Mail Server

Gateway server

Gateway Server

Collaboration server

Collaboration Server

ESET Management Agent

ESET Management Agent

Rogue Detection Sensor

Rogue Detection Sensor

ESET PROTECT Server

ESET PROTECT Server

ESET Inspect Server

ESET Inspect Server

ESET Bridge

ESET Bridge

Antivirus detections

Antivirus detection type. See all detection types in Detections.

Click a computer and select Solutions Solutions > Deploy security productDeploy security product to deploy an ESET security product to the computer.

ESET LiveGuard Advanced

Click a computer or the gear icon Gear next to a static group and select Solutions Solutions > ESET LiveGuard Advanced Enable ESET LiveGuard to activate and enable the ESET LiveGuard Advanced.

ESET Inspect Connector

ESET Inspect Connector

Click Computers > click a computer or select more computers and click Computer > Solutions Solutions > Enable ESET Inspect On-Prem Enable ESET Inspect On-Prem to deploy ESET Inspect Connector to the managed Windows/Linux/macOS computers. ESET Inspect On-Prem is only available when you have ESET Inspect On-Prem license and ESET Inspect On-Prem connected to ESET PROTECT On-Prem. A Web Console user requires Read permission or higher for either Access to ESET Inspect or ESET Inspect User.

Enable encryption

Click a computer and select Solutions Solutions > Enable encryption Enable encryption to enable ESET Full Disk Encryption on the selected computer.

ESET Full Disk Encryption

The computer has ESET Full Disk Encryption enabled.