Icon legend
This is a collection of icons used throughout ESET PROTECT Web Console with their description. Some of the icons depict actions, item types or current status.
Most icons are displayed in one of three colors to denote the accessibility of an element:
• Default icon—available action
• Blue icon—highlighted element when you hover with the mouse pointer
• Gray icon—action not available
Status icon |
Description |
|||
---|---|---|---|---|
Details about the client device. |
||||
Investigate Incidents—Click to redirect into the ESET Inspect console to open Executables, Scripts or Events. |
||||
Add Device—Add new devices. New Task—Add a new task. New Notification—Add new notification. New Static/Dynamic Groups—Add new groups. |
||||
Edit—You can edit your created tasks, notifications, reports template, groups, policies, etc. |
||||
Duplicate—Create a new policy based on the existing policy you have selected, a new name is required for the duplicate. |
||||
Move—Computers, policies, Static or Dynamic Groups. |
||||
Delete—Remove the selected client, group, etc. |
||||
Rename multiple items—If you select multiple items, you can rename them one by one in a list or use Regex search and replace multiple items at once. |
||||
Scan—Run the On-Demand Scan task on the client that reported the detection. |
||||
Update > Update Modules—Run the Modules Update task (triggers an update manually). Update > Update ESET products—Update ESET products installed on the selected device. Update > Update Operating System—Update the operating system on the selected device. |
||||
Audit Log—View the Audit Log for the selected item. |
||||
Run Task for mobile devices. |
||||
Re-enroll—Re-enroll a mobile device. |
||||
Unlock—Device will be unlocked so that it can be used again. See also the anti-theft actions.
|
||||
Lock—Device will be locked when suspicious activity is detected, or the device is marked as missing. |
||||
Find—Request the GPS coordinates of your mobile device. |
||||
Siren / Lost Mode sound—Triggers a loud siren remotely. The siren will start even if your device is mute. |
||||
Factory reset—All data stored in your device will be permanently erased. |
||||
Power—Click a computer and select Power > Reboot to restart the device. You can configure the managed computers' restart/shutdown behavior. The computers must run an ESET security product that supports this setting. |
||||
Shutdown—Click a computer and select Power > Shutdown to shut down the device. You can configure the managed computers' restart/shutdown behavior. The computers must run an ESET security product that supports this setting. |
||||
Log out—Click a computer and select Power > Log Out to log all users out of the computer. |
||||
Run Task—Select a task and configure trigger and throttling (optional) for this task. The task will be queued according to the task settings. This option immediately triggers an existing task you select from a list of available tasks. |
||||
Recent tasks—Shows recent tasks. Click a task to execute it again. |
||||
Assign User—Assign the user to a device. You can manage users in Computer Users. |
||||
Manage Policies—A policy can also be assigned directly to a client (multiple clients), not just a group. Select this option to assign the policy to the selected client(s). |
||||
Send Wake-Up Call—ESET PROTECT Server runs instant replication of the ESET Management Agent on a client machine via EPNS. This is useful when you do not want to wait for the regular interval when the ESET Management Agent connects to ESET PROTECT Server. For example, when you want a Client Task to be run immediately on the client(s) or if you want a Policy to be applied right away. |
||||
Connect Remotely—via RDP or via Terminal—Generate and download a .rdp file that will allow you to connect to the target device via Remote Desktop Protocol or Terminal. |
||||
Mute/Unmute—You can use the Mute option to suppress the visual representation of the alerts or vulnerabilities reported on a device: |
||||
Disable—Disable or remove a setting or selection. |
||||
Assign—Assign a Policy to clients or groups. |
||||
Tags—Edit tags (assign, unassign, create, delete). |
||||
Static Group |
||||
Dynamic Group |
||||
Show subgroups of the currently selected group in Computers. |
||||
Not apply policy flag |
||||
Apply policy flag |
||||
Force policy flag |
||||
Triggers—See the list of Triggers for the selected Client Task. |
||||
Desktop |
||||
Mobile |
||||
Server |
||||
File Server |
||||
Mail Server |
||||
Gateway Server |
||||
Collaboration Server |
||||
ESET Management Agent |
||||
Rogue Detection Sensor |
||||
ESET Bridge |
||||
Antivirus detection type. See all detection types in Detections. Click a computer and select Platform modules > Enable security product to enable an ESET security product on the computer. |
||||
Click a computer or the gear icon next to a static group and select Platform modules > Enable ESET LiveGuard to activate and enable the ESET LiveGuard Advanced. |
||||
ESET Inspect Connector Click Computers > click a computer or select more computers and click Computer > Platform modules > Enable ESET Inspect to deploy ESET Inspect Connector to the managed Windows/Linux/macOS computers. ESET Inspect is only available when you have ESET Inspect license and ESET Inspect connected to ESET PROTECT. A Web Console user requires Read permission or higher for Access to ESET Inspect. |
||||
Click a computer and select Platform modules > Enable encryption to enable ESET Full Disk Encryption on the selected computer. |
||||
The computer has ESET Full Disk Encryption enabled. |
||||
Vulnerabilities |
||||
Patch Management |