How to securely use ESET PROTECT
Security is a shared duty between ESET (us) and Customer (you).
Shared responsibility
Responsibility |
ESET duty |
Customer (your duty) |
|---|---|---|
Physical infrastructure |
Secure the data centers and servers. |
N/A |
Software integrity |
Patch and update the ESET PROTECT code. |
N/A |
User access control |
Provide tools to manage users. |
Manage user accounts and permissions. |
Data protection |
Encrypt data at rest and in transit. |
Classify and manage sensitive data. |
Endpoint security |
Secure the cloud environment. |
Secure the devices used to access the Web Console. |
Guidance for secure usage
To maintain a secure environment, follow these procedures:
Manage passwords and Two-Factor Authentication (2FA)
•Create strong passwords—Follow the ESET PROTECT password policy while creating user accounts. Include upper-case letters, lower-case letters, numbers, and symbols.
•Enable 2FA—Enable 2FA if it is available for your account. This adds a second layer of security if your password is stolen.
•Do not share credentials—Each user must have a unique account. Do not share login details among employees.
Manage permissions
•Principle of least privilege—Only give users the permissions they need to do their job.
•Regular reviews—Audit your user list every 90 days. Remove access for employees who leave the company or change roles.
Secure your connection
•Endpoint protection—Use an antimalware software (for example, ESET Endpoint Security) or EDR (for example, ESET Inspect) on all computers that connect to the ESET PROTECT Web Console.
•Keep software updated—Ensure your web browser and operating system have the latest security patches.
•Avoid public Wi-Fi—Access the ESET PROTECT Web Console through a secure, encrypted internet connection (such as a corporate VPN).
Educate your users
Although it is not possible for any antimalware system to completely eliminate the risk caused by infiltrations and attacks, you can significantly minimize your risk of malware attack by following best practice strategies.
Reporting security issues
Security policy is available for ESET PROTECT. Comprehensive Security policy is available at https://legal.eset.com/security.
If you find a security vulnerability or suspect an unauthorized login, tell us about it.