ESET PROTECT – Table of Contents

How to securely use ESET PROTECT

Security is a shared duty between ESET (us) and Customer (you).

Shared responsibility

Responsibility

ESET duty

Customer (your duty)

Physical infrastructure

Secure the data centers and servers.

N/A

Software integrity

Patch and update the ESET PROTECT code.

N/A

User access control

Provide tools to manage users.

Manage user accounts and permissions.

Data protection

Encrypt data at rest and in transit.

Classify and manage sensitive data.

Endpoint security

Secure the cloud environment.

Secure the devices used to access the Web Console.

Guidance for secure usage

To maintain a secure environment, follow these procedures:

Manage passwords and Two-Factor Authentication (2FA)

Create strong passwords—Follow the ESET PROTECT password policy while creating user accounts. Include upper-case letters, lower-case letters, numbers, and symbols.

Enable 2FA—Enable 2FA if it is available for your account. This adds a second layer of security if your password is stolen.

Do not share credentials—Each user must have a unique account. Do not share login details among employees.

Manage permissions

Principle of least privilege—Only give users the permissions they need to do their job.

Regular reviews—Audit your user list every 90 days. Remove access for employees who leave the company or change roles.

Secure your connection

Endpoint protection—Use an antimalware software (for example, ESET Endpoint Security) or EDR (for example, ESET Inspect) on all computers that connect to the ESET PROTECT Web Console.

Keep software updated—Ensure your web browser and operating system have the latest security patches.

Avoid public Wi-Fi—Access the ESET PROTECT Web Console through a secure, encrypted internet connection (such as a corporate VPN).

Educate your users

Although it is not possible for any antimalware system to completely eliminate the risk caused by infiltrations and attacks, you can significantly minimize your risk of malware attack by following best practice strategies.

Reporting security issues

Security policy is available for ESET PROTECT. Comprehensive Security policy is available at https://legal.eset.com/security.

If you find a security vulnerability or suspect an unauthorized login, tell us about it.