1 Overview 1 .........................................................................................................................................................
2 Changelogs 1 ...................................................................................................................................................
3 Requirements 3 ..............................................................................................................................................
3.1 Supported Operating Systems 4 ..............................................................................................................
3.1.1 Deprecated TLS 1.0 and 1.1 5 .........................................................................................................................
3.2 Supported Web Browsers and Resolution regarding ESA Web Console 5 .........................................
3.3 Supported Web Applications 6 .................................................................................................................
3.4 Supported Mobile Phone Operating Systems 7 .....................................................................................
3.5 Installation Requirements 7 ......................................................................................................................
3.5.1 ESA components and OS compatibility 11 ..........................................................................................................
3.5.2 Performance recommendations 12 ...................................................................................................................
3.6 Supported Active Directory Environments 13 ........................................................................................
3.7 Firewall exceptions 14 ...............................................................................................................................
3.8 Policies 15 ....................................................................................................................................................
3.9 Handling cloned computers 15 .................................................................................................................
3.10 IP addresses used by ESET Secure Authentication 16 .......................................................................
4 Installation 16 ...................................................................................................................................................
4.1 Install the Authentication Server 17 ........................................................................................................
4.1.1 Custom proxy settings 20 ..............................................................................................................................
4.1.2 High Availability View - Active Directory 20 ........................................................................................................
4.1.3 High Availability View - Standalone mode 21 ......................................................................................................
4.2 Install the Reporting Engine (Elasticsearch) 21 ....................................................................................
4.3 Install the Remote Desktop plugin 22 .....................................................................................................
4.4 Install the Web App plugin 23 ...................................................................................................................
4.5 Install the Windows Login plugin 24 ........................................................................................................
4.6 Change, repair, remove installation 25 ...................................................................................................
4.7 Remote Installation via ESMC 27 ..............................................................................................................
4.8 Install Windows Login and RDP protection via GPO 28 ........................................................................
4.8.1 Startup script 29 .........................................................................................................................................
4.8.2 Software Installation task 30 ..........................................................................................................................
4.8.3 MSI arguments 38 .......................................................................................................................................
4.9 Upgrade installation 40 ..............................................................................................................................
4.9.1 Compatibility of ESA Components 40 ................................................................................................................
4.10 Database migration (Export Data) 41 ...................................................................................................
5 External Access 43 ........................................................................................................................................
5.1 Using reverse proxy 44 ..............................................................................................................................
5.1.1 Configure proxy for ESA 45 ............................................................................................................................
5.2 Transparent proxy 46 .................................................................................................................................
6 SSL Certificate 47 ...........................................................................................................................................
6.1 Replacing the SSL Certificate 47 ..............................................................................................................
6.2 Generate a custom SSL Certificate 48 .....................................................................................................
6.3 Making Certificates Trusted 51 .................................................................................................................
7 Geo located DNS support 52 ....................................................................................................................
8 Getting started with ESET Secure Authentication Web Console 53 ..................................
8.1 Activate ESET Secure Authentication 55 .................................................................................................
8.2 User Management - Provisioning 56 ........................................................................................................
8.2.1 User Status 59 ............................................................................................................................................
8.2.2 Synchronizing with AD/LDAP 61 .......................................................................................................................
8.2.3 Import users from file 63 ...............................................................................................................................
8.2.4 Self-enrollment 64 .......................................................................................................................................
8.3 Groups Based User Management 67 ........................................................................................................
8.4 Invitations 68 ...............................................................................................................................................
8.5 Use domain authentication 69 ..................................................................................................................