5.8 Example scenario of merging policies 267 .............................................................................................
5.8 Configuration of a product from ESET PROTECT On-Prem 271 ........................................................................
5.8 Assign a Policy to a Group 271 ..........................................................................................................
5.8 Assign a Policy to a Client 273 ..........................................................................................................
5.8 How to use Override mode 274 .........................................................................................................
5.9 Notifications 276 ..........................................................................................................................
5.9 Manage Notifications 278 ...............................................................................................................
5.9 Events on managed computers or groups 279 .........................................................................................
5.9 Server status changes 280 ..............................................................................................................
5.9 Dynamic group changes 282 ............................................................................................................
5.9 Distribution 283 ..........................................................................................................................
5.9 How to configure an SNMP Trap Service 284 ...........................................................................................
5.10 Status Overview 286 ...................................................................................................................
5.11 More 288 ...................................................................................................................................
5.11 Submitted Files 289 ....................................................................................................................
5.11 Exclusions 290 ..........................................................................................................................
5.11 Quarantine 293 .........................................................................................................................
5.11 Computer Users 294 ...................................................................................................................
5.11 Add New Users 295 ....................................................................................................................
5.11 Edit Users 297 ..........................................................................................................................
5.11 Create New User Group 300 ...........................................................................................................
5.11 Dynamic Group Templates 301 ........................................................................................................
5.11 New Dynamic Group Template 302 ...................................................................................................
5.11 Rules for a Dynamic Group template 303 .............................................................................................
5.11 Operations 304 .........................................................................................................................
5.11 Rules and logical connectors 304 ......................................................................................................
5.11 Template rules evaluation 306 ........................................................................................................
5.11 Dynamic Group template - examples 308 ............................................................................................
5.11 Dynamic Group - a security product is installed 309 .................................................................................
5.11 Dynamic Group - a specific software version is installed 309 ........................................................................
5.11 Dynamic Group - a specific version of a software is not installed at all 310 .........................................................
5.11 Dynamic Group - a specific version of a software is not installed but other version exists 311 ....................................
5.11 Dynamic Group - a computer is in specific subnet 312 ...............................................................................
5.11 Dynamic Group - installed but not activated version of server security product 313 ...............................................
5.11 How to automate ESET PROTECT On-Prem 313 .......................................................................................
5.11 License Management 315 ..............................................................................................................
5.11 ESET PROTECT Hub, ESET Business Account or ESET MSP Administrator 319 ......................................................
5.11 Add License - License Key 321 ........................................................................................................
5.11 Offline activation 322 ..................................................................................................................
5.11 Access Rights 325 ......................................................................................................................
5.11 Users 326 ...............................................................................................................................
5.11 Create a Native User 329 ..............................................................................................................
5.11 User actions and user details 331 .....................................................................................................
5.11 Change user password 333 ............................................................................................................
5.11 Mapped users 334 ......................................................................................................................
5.11 Assign a Permission Set to a User 337 ................................................................................................
5.11 Two-Factor Authentication 338 ........................................................................................................
5.11 Permission Sets 340 ....................................................................................................................
5.11 Manage Permission Sets 342 ..........................................................................................................
5.11 List of permissions 344 .................................................................................................................
5.11 Certificates 349 .........................................................................................................................