Computer details

To find out details about a computer, select a client computer in a Static or Dynamic Group and click Show Details or click the computer name.

The information window consists of the following parts:

details_default Overview

There are the following tiles with an overview of the computer's situation.

Computer

Click the edit icon edit_default to change the computer's name or description. You can select Allow Duplicate Name if there is already another managed computer with the same name.

Click Select tags to assign tags.

FQDN - fully qualified domain name of the computer

note

Note

If you have your client computers and ESET PROTECT Server running under Active Directory, you can automate populating Name and Description fields using Static Group Synchronization task.

 

Parent Group - Change parent Static group of the computer.

IP - the IP address of the machine.

Applied Policies Count - Click the number to see the list of the applied policies.

Member of Dynamic Groups - The list of Dynamic Groups in which the client computer was present during the latest replication.

 

Hardware

This tile contains a list of key hardware parameters, information about operating system and unique identifiers. Click the tile to view the Details - Hardware tab.

 

Alerts

Alerts - Link to list of problems with current computer.

Unresolved Detections Count - Count of unresolved detections. Click the count to see the list of unresolved detections.

Last Connected Time - Last Connected displays the date and time of last connection of the managed device. The Last Connected information gets highlighted to indicate that the computer is not connecting:

oYellow (error) - computer is not connecting for 2-14 days.

oRed (warning) - computer is not connecting for more than 14 days.

Last Scan Time - Time information with last scan.

Detection Engine - Version of detection engine on target device.

Updated - The update status.

 

Products & Licenses

List of ESET components installed on the computer. Click the tile to view the Details - Product & Licenses tab.

 

Encryption

The encryption tile is visible only on workstations that are supported by ESET Full Disk Encryption.

 

ESET Dynamic Threat Defense

The tile provides basic information about the service. It can have two tile statuses:

White - the default state. After the ESET Dynamic Threat Defense is activated and working, the tile is still in the white state.

Yellow - if there is a problem with the ESET Dynamic Threat Defense service, the tile turns yellows and shows the information about the problem.

Available actions:

Enable - This option is available after you import the product license. Click it to set up the activation task and policy for the ESET Dynamic Threat Defense product on the current machine.

note

Note

Each device with ESET Dynamic Threat Defense needs to have enabled ESET LiveGrid® Reputation System and ESET LiveGrid® Feedback System. Please check your device policies.

Submitted files - shortcut to Submitted Files menu.

Learn more - shortcut to the product page.

 

Users

Logged users (computers only) - Domain and username of users logged on the device.

Assigned users

oClick Add user or Assign user to assign a user from Computer Users to this device.

oClick the trash icon delete_default to un-assign current user.

oClick the assigned user's username to display his account details.

 

Location (mobile devices only). Devices in iOS Apple Business Manager (ABM) can be localized only when "Lost Mode" is activated.

 

Virtualization

The tile appears after you mark the computer as master for cloning and displays the VDI settings. Click the gear icon to change the VDI settings.

 

Click the Network Isolation button to run the network isolation client tasks on the computer:

disconnect_normal Isolate from network

mn_icn_connect_normal End network isolation

 

Virtualization button is used to set up the computer for cloning. It is required when computers are cloned or computers' hardware is changed.

Mark as Master for Cloning

Disable hardware detection - Disable detection of the hardware changes permanently. This action is irreversible!

Unmark as Master for Cloning - Remove the master flag. After this is applied, each new cloning of the machine results in a question.

important

Important

Hardware fingerprint detection is not supported on:

Linux, macOS, Android, iOS

systems managed via ESET Virtual Agent Hosts (ESET Virtualization Security)

machines without ESET Management Agent


gear_icon Configuration

Configuration tab - Contains list of configurations of installed ESET products (ESET Management Agent, ESET endpoint, etc.). Available actions are:

Click Request configuration to create a task for ESET Management Agent to collect all the managed product configurations. After the task is delivered to ESET Management Agent, it is executed immediately and the results are delivered to ESET PROTECT Server on the next connection. This will allow you to see the list of all managed product configurations.

Open a configuration via context menu and convert it to a policy. Click a configuration to see it in the viewer.

Once you open the configuration, you can convert it to a policy. Click Convert to Policy, current configuration will be transferred to the policy wizard and you can modify and save the configuration as a new policy.

Download a configuration for diagnostics and support purposes. Click a selected configuration and click Download for diagnostics in drop-down menu.

Applied Policies tab - List of policies applied to the device. If you have applied a policy for ESET product or ESET product feature that is not installed on the computer, the listed policy is grayed out.

note

Note

You can see the policies assigned to the selected device as well as policies applied to groups containing the device.

Click manage_default Manage Policies to manage, edit, assign or delete a policy. Policies are applied based on their order (Policy Order column). To change the policy application priority, select the check box next to a policy and click Apply Sooner or Apply Later.

Applied Exclusions tab - List of exclusions applied to the device.


icon_sysinspector_logs Logs (computers only)

SysInspector - Click Request log (Windows only) to run the SysInspector log request task on selected clients. After the task is completed, a new entry is added in the list of ESET SysInspector logs. Click a log in the list to explore it.

Log Collector - Click Run Log Collector to run the Log collector task. After the task is completed, a new entry is added in the list of logs. Click a log in the list to download it.

Diagnostic logs - Click the Diagnostics > Turn on to start the Diagnostics mode on the current machine. Diagnostics mode will make client send all logs to the ESET PROTECT Server. You can browse all logs within 24 hours. Logs are sorted into 5 categories: Spam Log, Firewall Log, HIPS Log, Device Control Log, Web Control Log. Click Diagnostics > Resend All Logs to resend all logs from Agent in next replication. Click Diagnostics > Turn off to stop the Diagnostics mode.

note

Note

The file size limit for log delivery per device is 200 MB. You can access logs from the Web Console at Show Details > Logs section. If the logs gathered by the task are bigger than 200 MB, the task will fail. If the task fails, you can:

Gather the logs locally on the device.

Change the verbosity of the logs and retry the task:

oFor Windows targets, use the /Targets:EraAgLogs parameter to gather only ESET Management Agent logs.

oFor Linux/macOS targets, use the --no-productlogs parameter to exclude logs from the installed ESET security product.


play_default Task Executions

A list of executed tasks. You can filter the view to narrow down the results, view task details, edit, duplicate, delete or run on/rerun the task.


icon_installed_applications Installed Applications

Displays a list of programs installed on a client with details such as version, size, security status, etc. You can turn on the reporting of non-ESET applications via Policy setting. Select a program and click Uninstall to remove it. You will be asked to enter Uninstallation parameters. These are optional command line parameters for the installer (installation package). Uninstallation parameters are unique for each software installer. You can find more information in the documentation for the particular product.

If an update for the ESET product is available, you can update the ESET product by clicking Update ESET Products button.

note

Note

ESET PROTECT 8.1 supports the automatic upgrade of ESET Management Agent on managed computers.

iOS devices report the list of installed software to ESET PROTECT once a day. Users cannot force refresh the list.


icon_threats Alerts

Shows a list of alerts and their details: Problem, Status, Product, Occurred, Severity, etc. This list can be accessed directly from Computers section by clicking the alerts count in the Alerts column. You can manage alerts via one-click actions.


question_defaultQuestions (computers only)

The list of cloning-related question is on the Questions tab. Read more about resolving questions for changed or cloned computers.


icon_threat_and_quarantine Detections and Quarantine

Detections - All detection types are displayed, but you can filter them by Detection Category - icon_antivirusAntivirus, icon_blocked Blocked files, icon_ei_alert Enterprise Inspector, icon_firewall Firewall, icon_hips HIPS, and icon_web_protection Web protection.

Quarantine - A list of quarantined detections with details such as Detection name, Detection type, Object name, Size, First occurred, Count, User reason, etc.


icon_more Details

Basic - Information about the device: OS Name, Type, Version, Serial number, FQDN name, etc. Information whether the device is muted, managed, when it was last time updated and number of applied policies.

Hardware - Information about the hardware of the computer, manufacturer and model and information about networking (IPv4, IPV6, subnet, network adapter...).

Products and Licenses - Version of current detection engine, versions of installed ESET security products, used licenses.

Encryption - If you use ESET Full Disk Encryption, see the disk encryption status overview.