1 ESET Endpoint Antivirus for macOS 1 ..................................................................................................
2 What's new in version 7 1 ....................................................................................................................
2.1 Version 6 & version 7 comparison 2 .................................................................................................
2.2 Settings migration 6 ......................................................................................................................
2.3 Changelogs 7 ................................................................................................................................
3 System requirements 7 ........................................................................................................................
4 Upgrade ESET Endpoint Antivirus for macOS version 6 to version 7 7 .................................................
5 Installation 10 ......................................................................................................................................
5 Basic installation 10 ........................................................................................................................
5 Command line installation 11 ..............................................................................................................
5 Post-installation process 12 ................................................................................................................
5 Pre-installation settings 13 .................................................................................................................
5 Jamf pre-installation settings 16 ...........................................................................................................
5 Deployment via ESET management console 18 ..........................................................................................
5 Where can I find my license 19 ............................................................................................................
5 Local activation 19 .........................................................................................................................
5 Activation via Terminal 20 .................................................................................................................
5 Remote activation 20 ......................................................................................................................
6 Documentation for endpoints managed remotely 21 ...........................................................................
6.1 Introduction to ESET PROTECT CLOUD 21 .........................................................................................
6.2 Introduction to ESET PROTECT 22 ...................................................................................................
6.3 Disable notification via MDM 23 ......................................................................................................
7 Working with ESET Endpoint Antivirus for macOS 24 ...........................................................................
7.1 Protection Status 24 .....................................................................................................................
7.2 Computer Scan 25 .........................................................................................................................
7.2 Custom scan 26 ..........................................................................................................................
7.3 Update detection modules 26 .........................................................................................................
7.3 Terminal utilities and daemons 26 ......................................................................................................
7.3 Quarantine 27 ............................................................................................................................
7.3 Configuration 29 ..........................................................................................................................
7.3 Events 29 .................................................................................................................................
7.3 Update detection modules via Terminal 30 .............................................................................................
7.3 On-demand scan via Terminal 31 .......................................................................................................
7.4 About 33 ......................................................................................................................................
8 Product configuration 33 ......................................................................................................................
8.1 Detection engine 33 ......................................................................................................................
8.1 Real-time File System Protection 34 ....................................................................................................
8.1 Cloud-based protection 36 ...............................................................................................................
8.1 Malware scans 38 ........................................................................................................................
8.1 ThreatSense parameters 38 .............................................................................................................
8.1 Additional ThreatSense parameters 41 .................................................................................................
8.1 Cleaning levels 41 ........................................................................................................................
8.2 Update 42 ....................................................................................................................................
8.2 Update mirror (custom update servers) 43 .............................................................................................
8.2 Anti-Phishing protection 44 ..............................................................................................................
8.2 Web access protection 44 ...............................................................................................................
8.2 Email client protection 45 ................................................................................................................
8.3 Tools 47 .......................................................................................................................................
8.3 Proxy server 47 ...........................................................................................................................
8.3 Log files 48 ...............................................................................................................................