Icon legend
This is a collection of icons used throughout ESET PROTECT Web Console with their description. Some of the icons depict actions, item types or current status.
Most icons are displayed in one of three colors to denote the accessibility of an element:
• Default icon—available action
• Blue icon—highlighted element when you hover with the mouse pointer
• Gray icon—action not available
Status icon |
Description |
|||
---|---|---|---|---|
Details about the client device. |
||||
Add Device—Add new devices. New Task—Add a new task. New Notification—Add new notification. New Static/Dynamic Groups—Add new groups. |
||||
Edit—You can edit your created tasks, notifications, reports template, groups, policies, etc. |
||||
Duplicate—Create a new policy based on the existing policy you have selected, a new name is required for the duplicate. |
||||
Move—Computers, policies, Static or Dynamic Groups. |
||||
Delete—Remove the selected client, group, etc. |
||||
Scan—Run the On-Demand Scan task on the client that reported the detection. |
||||
Update > Update Modules—Run the Modules Update task (triggers an update manually). Update > Update ESET products—Update ESET products installed on the selected device. Update > Update Operating System—Update the operating system on the selected device. |
||||
Audit Log—View the Audit Log for the selected item. |
||||
Re-enroll—Re-enroll a mobile device. |
||||
Unlock—Device will be unlocked so that it can be used again. See also the anti-theft actions.
|
||||
Lock—Device will be locked when suspicious activity is detected, or the device is marked as missing. |
||||
Find—Request the GPS coordinates of your mobile device. |
||||
Siren / Lost Mode sound—Triggers a loud siren remotely. The siren will start even if your device is mute. |
||||
Factory reset—All data stored in your device will be permanently erased. |
||||
Power—Click a computer and select Power > Reboot to restart the device. You can configure the managed computers' restart/shutdown behavior. The computers must run an ESET security product that supports this setting. |
||||
Shutdown—Click a computer and select |
||||
Log out—Click a computer and select |
||||
Run Task—Select a task and configure trigger and throttling (optional) for this task. The task will be queued according to the task settings. This option immediately triggers an existing task you select from a list of available tasks. |
||||
Recent tasks—Shows recent tasks. Click a task to execute it again. |
||||
Assign User—Assign the user to a device. You can manage users in Computer Users. |
||||
Manage Policies—A policy can also be assigned directly to a client (multiple clients), not just a group. Select this option to assign the policy to the selected client(s). |
||||
Send Wake-Up Call—ESET PROTECT Server runs instant replication of the ESET Management Agent on a client machine via EPNS. This is useful when you do not want to wait for the regular interval when the ESET Management Agent connects to ESET PROTECT Server. For example, when you want a Client Task to be run immediately on the client(s) or if you want a Policy to be applied right away. |
||||
Connect Remotely—via RDP or via Terminal—Generate and download a .rdp file that will allow you to connect to the target device via Remote Desktop Protocol or Terminal. |
||||
Mute/Unmute—You can use the |
||||
Disable—Disable or remove a setting or selection. |
||||
Assign—Assign a Policy to clients or groups. |
||||
Tags—Edit tags (assign, unassign, create, delete). |
||||
Static Group |
||||
Dynamic Group |
||||
Show subgroups of the currently selected group in Computers. |
||||
Not apply policy flag |
||||
Apply policy flag |
||||
Force policy flag |
||||
Triggers—See the list of Triggers for the selected Client Task. |
||||
Desktop |
||||
Mobile |
||||
Server |
||||
File Server |
||||
Mail Server |
||||
Gateway Server |
||||
Collaboration Server |
||||
ESET Management Agent |
||||
Rogue Detection Sensor |
||||
ESET Bridge |
||||
Antivirus detection type. See all detection types in Detections. Click a computer and select |
||||
Investigate Incidents—Click to redirect into the ESET Inspect console to open Executables, Scripts or Events. |
||||
Click a computer or the gear icon |
||||
ESET Inspect Connector Click Computers > click a computer or select more computers and click Computer > |
||||
Click a computer and select |
||||
The computer has ESET Full Disk Encryption enabled. |
||||
Vulnerabilities Click a computer or the gear icon |
||||
Patch Management |