ESET PROTECT Cloud Owner's manual

Category
Security device components
Type
Owner's manual
ESET PROTECT Cloud
protect_cloud
Click here to display the Online help version of this document
Copyright ©2021 by ESET, spol. s r.o.
ESET PROTECT Cloud was developed by ESET, spol. s r.o.
For more information visit https://www.eset.com
All rights reserved. No part of this documentation may be reproduced, stored in a retrieval system or transmitted in
any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise without
permission in writing from the author.
ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice.
Technical Support: https://support.eset.com
REV. 4/22/2021
1 About help 1 .....................................................................................................................................................
1.1 Icon legend 1 ...............................................................................................................................................
2 Release notes 3 ..............................................................................................................................................
3 Availability of service 11 ............................................................................................................................
4 Introduction to ESET PROTECT Cloud 11 ..........................................................................................
4.1 New features in ESET PROTECT Cloud 13 ................................................................................................
4.2 Supported Web browsers, ESET security products and languages 14 ...............................................
4.3 Supported Operating Systems 16 ............................................................................................................
4.4 Prerequisites 18 ..........................................................................................................................................
4.5 Differences between on-premise and cloud management console 18 ...............................................
5 Getting started with ESET PROTECT Cloud 19 ...............................................................................
5.1 Create a new ESET PROTECT Cloud instance using ESET Business Account 20 ...............................
5.2 Create a new ESET PROTECT Cloud user in ESET Business Account 22 .............................................
5.3 ESET PROTECT Cloud Web Console 28 .....................................................................................................
5.3.1 Login screen 31 ..........................................................................................................................................
5.3.2 Using the Startup Wizard 32 ...........................................................................................................................
5.3.3 User settings 35 ..........................................................................................................................................
5.3.4 Filters and layout customization 37 ..................................................................................................................
5.3.5 Tags 39 ....................................................................................................................................................
5.3.6 Import CSV 42 ............................................................................................................................................
5.3.7 Troubleshooting - Web Console 43 ...................................................................................................................
5.4 Synchronize ESET PROTECT Cloud with Active Directory 44 ...............................................................
5.5 How to manage Endpoint products from ESET PROTECT Cloud 48 .....................................................
5.6 ESET Push Notification Service 49 ...........................................................................................................
6 VDI, cloning and hardware detection 49 ...........................................................................................
6.1 Resolving cloning questions 52 ................................................................................................................
6.2 Hardware identification 54 ........................................................................................................................
7 Apache HTTP Proxy 54 ................................................................................................................................
7.1 Apache HTTP Proxy installation and cache 55 .......................................................................................
7.1.1 Squid installation and HTTP Proxy cache 58 ........................................................................................................
7.2 Apache HTTP Proxy installation - Linux 58 .............................................................................................
7.2.1 Squid HTTP Proxy installation on Ubuntu Server 62 ..............................................................................................
8 ESET Management Agent Deployment 63 .......................................................................................
8.1 Add computers using RD Sensor 63 .........................................................................................................
8.1.1 ESET Rogue Detection Sensor policy settings 64 ..................................................................................................
8.1.2 RD Sensor installation 65 ..............................................................................................................................
8.1.3 RD Sensor prerequisites 65 ............................................................................................................................
8.2 Local deployment 65 ..................................................................................................................................
8.2.1 Create Agent (and ESET security product) installer 66 ...........................................................................................
8.2.1.1 ESET PROTECT Live Installer behavior 68 ........................................................................................................
8.2.2 Agent Installer - Linux 68 ...............................................................................................................................
8.2.2.1 Deployment Agent Linux 69 .........................................................................................................................
8.2.2.2 Agent prerequisites - Linux 69 ......................................................................................................................
8.2.3 Agent Installer - macOS 70 ............................................................................................................................
8.3 Remote deployment 71 ..............................................................................................................................
8.3.1 Agent deployment using GPO and SCCM 71 ........................................................................................................
8.3.1.1 Deployment steps - SCCM 72 .......................................................................................................................
8.3.2 ESET Remote Deployment Tool 87 ...................................................................................................................
8.3.2.1 ESET Remote Deployment Tool prerequisites 88 ...............................................................................................
8.3.2.2 Select computers from Active Directory 88 ......................................................................................................
8.3.2.3 Scan the local network for computers 90 .........................................................................................................
8.3.2.4 Import a list of computers 91 .......................................................................................................................
8.3.2.5 Add computers manually 93 ........................................................................................................................
8.3.2.6 ESET Remote Deployment Tool - troubleshooting 94 ..........................................................................................
8.4 Agent protection 96 ....................................................................................................................................
8.5 ESET Management Agent settings 96 ......................................................................................................
8.5.1 Create a Policy to enable ESET Management Agent Password protection 97 ................................................................
8.6 Troubleshooting - Agent connection 99 ..................................................................................................
9 ESET PROTECT Cloud Main Menu 99 ...................................................................................................
9.1 Dashboard 100 .............................................................................................................................................
9.1.1 Drill down 102 ............................................................................................................................................
9.2 Computers 104 .............................................................................................................................................
9.2.1 Computer details 105 ...................................................................................................................................
9.2.2 Remove computer from management 109 .........................................................................................................
9.2.3 Groups 110 ...............................................................................................................................................
9.2.3.1 Group Actions 111 ....................................................................................................................................
9.2.3.2 Group Details 112 .....................................................................................................................................
9.2.3.3 Static Groups 113 .....................................................................................................................................
9.2.3.3.1 Create a new Static Group 113 ..................................................................................................................
9.2.3.3.2 Export Static Groups 115 .........................................................................................................................
9.2.3.3.3 Import Static Groups 116 .........................................................................................................................
9.2.3.4 Dynamic Groups 116 .................................................................................................................................
9.2.3.4.1 Create a new Dynamic Group 117 ..............................................................................................................
9.2.3.5 Move Static or Dynamic Group 119 ...............................................................................................................
9.2.3.6 Assign Client Task to a Group 121 .................................................................................................................
9.2.3.7 Assign Policy to a Group 122 .......................................................................................................................
9.3 Detections 123 .............................................................................................................................................
9.3.1 Manage Detections 125 ................................................................................................................................
9.3.2 Create Exclusion 126 ...................................................................................................................................
9.3.2.1 ESET security products compatible with exclusions 128 ......................................................................................
9.3.3 Ransomware Shield 129 ...............................................................................................................................
9.4 Reports 129 ..................................................................................................................................................
9.4.1 Create a new report template 131 ...................................................................................................................
9.4.2 Generate report 134 ....................................................................................................................................
9.4.3 Schedule a report 135 ..................................................................................................................................
9.4.4 Outdated applications 135 ............................................................................................................................
9.4.5 SysInspector log viewer 136 ..........................................................................................................................
9.4.6 Hardware Inventory 137 ...............................................................................................................................
9.4.7 Audit log report 139 .....................................................................................................................................
9.5 Tasks 139 ......................................................................................................................................................
9.5.1 Client Tasks 140 .........................................................................................................................................
9.5.1.1 Client Task Triggers 141 .............................................................................................................................
9.5.1.1.1 Assign Client Task to a Group or Computer(s) 143 ..........................................................................................
9.5.1.2 Anti-Theft Actions 144 ...............................................................................................................................
9.5.1.3 Diagnostics 146 .......................................................................................................................................
9.5.1.4 Display Message 148 .................................................................................................................................
9.5.1.5 End computer isolation from network 149 .......................................................................................................
9.5.1.6 Export Managed Products Configuration 149 ....................................................................................................
9.5.1.7 Isolate computer from network 150 ...............................................................................................................
9.5.1.8 Modules Update 151 ..................................................................................................................................
9.5.1.9 Modules Update Rollback 152 ......................................................................................................................
9.5.1.10 On-Demand Scan 153 ..............................................................................................................................
9.5.1.11 Operating System Update 155 ....................................................................................................................
9.5.1.12 Quarantine Management 156 .....................................................................................................................
9.5.1.13 Product Activation 157 .............................................................................................................................
9.5.1.14 Reset Cloned Agent 158 ...........................................................................................................................
9.5.1.15 Rogue Detection Sensor Database Reset 158 .................................................................................................
9.5.1.16 Run Command 159 ..................................................................................................................................
9.5.1.17 Run SysInspector Script 161 ......................................................................................................................
9.5.1.18 Server Scan 161 .....................................................................................................................................
9.5.1.19 Shutdown computer 162 ...........................................................................................................................
9.5.1.20 Software Install 163 .................................................................................................................................
9.5.1.20.1 Upgrade ESET software 165 ....................................................................................................................
9.5.1.20.2 Safetica software 166 ............................................................................................................................
9.5.1.21 Software Uninstall 167 .............................................................................................................................
9.5.1.22 Stop Managing (Uninstall ESET Management Agent) 168 ...................................................................................
9.5.1.23 SysInspector Log Request (Windows only) 169 ................................................................................................
9.5.1.24 Upgrade Agent 170 .................................................................................................................................
9.5.1.25 Upload Quarantined File 171 ......................................................................................................................
9.5.2 Server Tasks 172 ........................................................................................................................................
9.5.2.1 Delete Not Connecting Computers 173 ...........................................................................................................
9.5.2.2 Generate Report 174 .................................................................................................................................
9.5.2.3 Rename computers 176 .............................................................................................................................
9.5.3 Task trigger types 177 .................................................................................................................................
9.5.3.1 Cron expression interval 178 .......................................................................................................................
9.5.4 Advanced Settings - Throttling 181 ..................................................................................................................
9.5.4.1 Throttling Examples 183 .............................................................................................................................
9.5.5 Tasks overview 185 .....................................................................................................................................
9.5.5.1 Progress indicator 187 ...............................................................................................................................
9.5.5.2 Status icon 187 ........................................................................................................................................
9.5.5.3 Task details 188 .......................................................................................................................................
9.6 Installers 190 ...............................................................................................................................................
9.7 Policies 192 ..................................................................................................................................................
9.7.1 Policies Wizard 193 .....................................................................................................................................
9.7.2 Flags 194 ..................................................................................................................................................
9.7.3 Manage Policies 196 ....................................................................................................................................
9.7.4 How Policies are applied to clients 196 .............................................................................................................
9.7.4.1 Ordering Groups 196 .................................................................................................................................
9.7.4.2 Enumerating Policies 197 ...........................................................................................................................
9.7.4.3 Merging Policies 199 .................................................................................................................................
9.7.4.3.1 Example scenario of merging policies 200 ....................................................................................................
9.7.5 Configuration of a product from ESET PROTECT Cloud 203 .....................................................................................
9.7.6 Assign a Policy to a Group 203 .......................................................................................................................
9.7.7 Assign a Policy to a Client 204 ........................................................................................................................
9.7.8 How to use Override mode 205 .......................................................................................................................
9.8 Notifications 207 .........................................................................................................................................
9.8.1 Manage Notifications 208 ..............................................................................................................................
9.8.1.1 Events on managed computers 209 ...............................................................................................................
9.8.1.2 Status update on ESET PROTECT Cloud 209 .....................................................................................................
9.8.1.3 Dynamic group changes 210 .......................................................................................................................
9.8.2 Distribution 211 ..........................................................................................................................................
9.9 Status Overview 212 ...................................................................................................................................
9.10 More 213 .....................................................................................................................................................
9.10.1 Submitted Files 213 ...................................................................................................................................
9.10.2 Exclusions 214 .........................................................................................................................................
9.10.3 Quarantine 217 .........................................................................................................................................
9.10.4 Computer Users 219 ..................................................................................................................................
9.10.4.1 Add New Users 219 .................................................................................................................................
9.10.4.2 Edit Users 221 ........................................................................................................................................
9.10.4.3 Create New User Group 222 .......................................................................................................................
9.10.5 Dynamic Group Templates 223 .....................................................................................................................
9.10.5.1 New Dynamic Group Template 224 ..............................................................................................................
9.10.5.2 Rules for a Dynamic Group template 225 ......................................................................................................
9.10.5.2.1 Operations 225 ....................................................................................................................................
9.10.5.2.2 Rules and logical connectors 226 ..............................................................................................................
9.10.5.2.3 Template rules evaluation 227 .................................................................................................................
9.10.5.3 Dynamic Group template - examples 229 ......................................................................................................
9.10.5.3.1 Dynamic Group - a security product is installed 229 .......................................................................................
9.10.5.3.2 Dynamic Group - a specific software version is installed 230 ............................................................................
9.10.5.3.3 Dynamic Group - a specific version of a software is not installed at all 230 ..........................................................
9.10.5.3.4 Dynamic Group - a specific version of a software is not installed but other version exists 231 ...................................
9.10.5.3.5 Dynamic Group - a computer is in specific subnet 231 ....................................................................................
9.10.5.3.6 Dynamic Group - installed but not activated version of server security product 231 ...............................................
9.10.5.4 How to automate ESET PROTECT Cloud 232 ...................................................................................................
9.10.6 License Management 233 ............................................................................................................................
9.10.7 Access Rights 236 .....................................................................................................................................
9.10.7.1 Users 237 .............................................................................................................................................
9.10.7.1.1 User actions and user details 239 .............................................................................................................
9.10.7.1.2 Assign a Permission Set to a User 240 ........................................................................................................
9.10.7.1.3 Two-Factor Authentication 241 .................................................................................................................
9.10.7.2 Permission Sets 242 ................................................................................................................................
9.10.7.2.1 Manage Permission Sets 244 ...................................................................................................................
9.10.7.2.2 List of permissions 246 ..........................................................................................................................
9.10.8 Audit Log 248 ...........................................................................................................................................
9.10.9 Settings 249 ............................................................................................................................................
9.10.9.1 Syslog security restrictions and limits 253 .....................................................................................................
9.10.10 Export logs to Syslog 254 ...........................................................................................................................
9.10.10.1 Syslog server 254 ..................................................................................................................................
9.10.10.2 Events exported to LEEF format 254 ...........................................................................................................
9.10.10.3 Events exported to JSON format 255 ..........................................................................................................
10 ESET PROTECT Cloud for Managed Service Providers 257 ...................................................
10.1 Features of ESET PROTECT Cloud for MSP users 259 .........................................................................
10.2 Create a new ESET PROTECT Cloud user in ESET MSP Administrator 260 ......................................
10.3 Deployment process for MSP 262 ..........................................................................................................
10.3.1 Local deployment of Agent 263 .....................................................................................................................
10.3.2 Remote deployment of Agent 263 ..................................................................................................................
10.4 MSP Licenses 263 ......................................................................................................................................
10.5 Start MSP customer setup 265 ...............................................................................................................
10.6 Skip MSP customer setup 268 ................................................................................................................
10.7 Create custom installer 268 ....................................................................................................................
10.8 MSP Users 271 ...........................................................................................................................................
10.9 Tagging of MSP objects 273 ....................................................................................................................
10.10 MSP Status overview 273 ......................................................................................................................
10.11 Removing a company 275 ......................................................................................................................
11 Cloud Mobile Device Management 277 ...........................................................................................
11.1 CMDM Enrollment 277 ..............................................................................................................................
11.2 CMDM Management 279 ..........................................................................................................................
12 ESET PROTECT Cloud Migration scenarios 279 ...........................................................................
12.1 Partial Migration from ESMC 7 / ESET PROTECT 8 to ESET PROTECT Cloud 280 ............................
13 Stop using ESET PROTECT Cloud 295 ...............................................................................................
13.1 Last ESET PROTECT Cloud license expiration 297 ...............................................................................
14 About ESET PROTECT Cloud 297 .........................................................................................................
15 ESET PROTECT Cloud Security 298 ....................................................................................................
16 Terms of Use 301 .........................................................................................................................................
16.1 ESET Management Agent EULA 305 .......................................................................................................
16.2 Data Processing Agreement 310 ............................................................................................................
16.3 Standard Contractual Clauses 311 .........................................................................................................
17 Privacy policy 316 ........................................................................................................................................
18 Cloud Eligible Licenses 318 ....................................................................................................................
19 Preview features 318 .................................................................................................................................
19.1 iOS management 320 ...............................................................................................................................
19.2 Computer preview 320 .............................................................................................................................
1
About help
The Administration guide was written to help you get familiar with ESET PROTECT Cloud and provides instructions
to use it.
For consistency and to help prevent confusion, the terminology used throughout this guide is based on the ESET
PROTECT Cloud parameter names. We also use a set of symbols to highlight topics of particular interest or
significance.
Note
Notes can provide valuable information, such as specific features or a link to a related topic.
Important
This requires your attention and it should not be skipped. Usually, it provides non-critical but
significant information.
Warning
Critical information you should treat with increased caution. Warnings are placed specifically to deter
you from committing potentially harmful mistakes. Please read and understand text placed in
warning brackets, as it references highly sensitive system settings or something risky.
Example
Example scenario that describes a user case relevant for the topic where it is included. Examples are
used to explain more complicated topics.
Convention Meaning
Bold type Names of interface items such as boxes and option buttons.
Italic type Placeholders for information you provide. For example, file name or path means you type the
actual path or a name of file.
Courier New Code samples or commands
Hyperlink Provides quick and easy access to cross-referenced topics or external web location. Hyperlinks
are highlighted in blue and may be underlined.
%ProgramFiles% The Windows system directory which stores installed programs of Windows and others.
Online Help is the primary source of help content. The latest version of Online Help will automatically be
displayed when you have a working internet connection.
Topics in this guide are divided into several chapters and sub-chapters. You can find relevant information by
using the search field at the top.
The ESET Knowledgebase contains answers to the most frequently asked questions, as well as
recommended solutions for various issues. Regularly updated by ESET technical specialists, the
Knowledgebase is the most powerful tool for resolving various types of problems.
The ESET Forum provides ESET users with an easy way to get help and to help others. You can post any
problem or question related to your ESET products.
You can post your rating and/or provide a feedback on a particular topic in help: Click the Was this
information helpful? link underneath the help page.
Icon legend
This is a collection of icons used throughout ESET PROTECT Cloud Web Console with their description. Some of the
icons depict actions, item types or current status. Most icons are displayed in one of three colors to denote the
accessibility of an element:
2
Default icon - available action
Blue icon - highlighted element when you hover with mouse pointer
Gray icon - action not available
Status icon Descriptions
Show Details - detailed information about the client device.
Add New - add new devices.
New Task - add new task.
New Notification - add new notification.
New Static/Dynamic Groups - add new groups.
Edit - you can edit your created tasks, notifications, reports template, groups, policies, etc.
Duplicate - lets you create a new policy based on the existing policy you have selected, a new name
is required for the duplicate.
Move - computers, policies, Static or Dynamic Groups.
Access Group - Move the item to a different Static Group.
Delete - removes the selected client, group, etc completely.
Rename multiple items - if you select multiple items you can rename them one by one in a list or
use Regex search and replace multiple items at once.
Scan - using this option will run the On Demand Scan task on the client that reported the detection.
Update Modules - using this option will run the Modules Update task (triggers an update manually).
Audit Log - View the Audit Log for the selected item.
Reboot - if you select a computer and press Reboot the device will be rebooted.
Restore - restore quarantined file to its original location.
Shutdown - if you select a computer and click Reboot > Shutdown the device will be shut down.
Deactivate Products
Run Task - select a task and configure trigger and throttling (optional) for this task. The task will be
queued according to the task settings. This option immediately triggers an existing task that you
select from a list of available tasks.
Last used tasks - shows last used tasks. You can click task to execute it again.
Assign User - assign user to a device. You can manage users in Computer Users.
Manage Policies - a policy can also be assigned directly to a client (multiple clients), not just a group.
Select this option to assign the policy to selected client(s).
Send Wake-Up Call - ESET PROTECT Cloud Server runs instant replication of the ESET Management
Agent on a client machine via EPNS. This is useful when you do not want to wait for the regular interval
when the ESET Management Agent connects to the ESET PROTECT Cloud Server. For example when
you want a Client Task to be run immediately on client(s) or if you want a Policy to be applied right
away.
Isolate from network
End network isolation
Connect - generate and download a .rdp file that will let you connect to target device via Remote
Desktop Protocol.
Mute - if you select a computer and press Mute, the Agent on this client stops reporting to ESET
PROTECT Cloud; it will only aggregate the information. A muted icon will be displayed next to a
computer name in the Muted column.
Once muting is disabled by clicking Un-mute, the muted computer will report again and
communication between ESET PROTECT Cloud and the client is restored.
Disable - disable or remove a setting or selection.
Assign - assign a Policy to client or groups.
Import - select Reports / Policies you want to import.
Export - select Reports / Policies you want to export.
Tags - Edit tags (assign, unassign, create, delete).
Static Group
3
Status icon Descriptions
Dynamic Group
Not apply policy flag
Apply policy flag
Force policy flag
Triggers - See the list of Triggers for the selected Client Task.
Desktop
Server
File Server
Mail Server
Gateway Server
Collaboration Server
Agent
Rogue Detection Sensor
ESET Full Disk Encryption
Enable EDTD - activate and enable the ESET Dynamic Threat Defense.
Release notes
ESET PROTECT Cloud 2.2.0
NEW: New concept–Option to preview certain features
NEW: Preview feature–Support for iOS / iPadOS (without ABM enrollment)
NEW: Preview feature–Computer preview
ADDED: Upgrade outdated products in a computer group
ADDED: Default filter in the Detection screen (unresolved detections first)
ADDED: Ability to use a second license to activate ESET Dynamic Threat Defense in a software installation task
when an eligible endpoint product is selected
ADDED: User management for users with global "write" access
ADDED: Expiration time for client task triggers (Triggers tab)
ADDED: New report–Computer Hardware Overview
ADDED: Enabled non-root administration (other than the instance creator) to manage the security of other
managed accounts (depends on the upcoming EBA release planned for April 2020)
IMPROVED: Pause a task for ESET Full Disk Encryption (capability to select an exact date and time)
IMPROVED: The encryption status tile is now more interactive
IMPROVED: Extended information in detection details
IMPROVED: A recommendation message is displayed when the Administrator tries to run a client task on more
than 1,000 clients (using a group is recommended)
IMPROVED: Assigning a policy to more than 200 individual devices is permitted (using a group is
recommended)
IMPROVED: Various performance improvements
FIXED: Licenses with over 10,000 seats were displayed as infinite
FIXED: In some cases, the "Planned" flag In a client task remained active after a task was executed
4
FIXED: The license usage number did not display the correct number when a license was overused
FIXED: Subunits were not used by percentage usage enumeration for mail security products
FIXED: The operating system name (Big Sur) for macOS 11.1 and 11.2 was missing
FIXED: Various other bug fixes and improvements
ESET PROTECT Cloud 2.1.0
ADDED: Ability to look up specific computer based on the last logged user parameter
ADDED: Support for policy-based migration from on-premise console to cloud console
FIXED: Issue with opening/reading PDF reports sent by email (base64-encoded)
FIXED: Non-root user with write permission rights for ESET PROTECT Cloud in ESET Business Account cannot
import or create dynamic group templates
FIXED: Device filters on Dashboards display different values than in tables
FIXED: In some cases, Detail in the "Audit Log" overlapping other lines
FIXED: Product deactivation fails with timeout (in certain cases) if started by "Delete not connected computers"
server task
FIXED: User cannot delete objects in some cases even with correct access rights
FIXED: Name of the file is garbled when Japanese characters are used
FIXED: Various other bug fixes and minor improvements
ESET PROTECT Cloud 2.0.148.0
CHANGED: ESET Cloud Administrator renamed to ESET PROTECT Cloud
ADDED: Ability to manage and protect Android mobile devices
ADDED: Ability to manage FileVault (macOS) native encryption when an eligible license is present
ADDED: Increased device management limit (up to 10,000 - dependent on purchased license size)
ADDED: One-click deployment of ESET Dynamic Threat Defense if an eligible license is present
ADDED: Ability to manage dynamic groups
ADDED: Ability to manage notifications
ADDED: Ability to define specific permission sets for selected users
ADDED: Active Directory synchronization (Computers only)
ADDED: Syslog log exporting
ADDED: New “Audit log” section provides detailed information about specific actions
ADDED: Ability to mass deploy the management agent to macOS devices
ADDED: Second-level menu for advanced options
ADDED: Secure Browser management
5
ADDED: Support for sites (ESET Business Account) licenses including new "License user" column
ADDED: Renew a license in the “License Management” screen
ADDED: Ability to drill-down from expiring license issues in “Dashboards” and “Reports” to obtain more
information in the “License Management” screen
ADDED: New “Manage license” context menu
ADDED: EULA update notifications that support auto-upgrade (uPCU) of endpoint products in managed
environments
ADDED: New ESET Full Disk Encryption (EFDE) management actions directly from “Computer details”
ADDED: New EFDE Dynamic groups and Reports
ADDED: Detection details (LiveGrid, Observed in organization, Virus Total )
ADDED: One-click access to client task triggers
ADDED: Unsupported browser warning
ADDED: New "Seats allocated to sites" present in dedicated license report
ADDED: Multi-line command scripts for Run Command task
ADDED: Option to create a Computer user group in the “Add computer user” wizard
CHANGED: Management Agent - supported operating systems
CHANGED: Retention policy defaults
CHANGED: License unit/sub-units visualization changed to "used/total" for online licenses and "X offline" for
offline licenses
CHANGED: Access to behavior reports (when EDTD is purchased and enabled) are available (in the UI) only if
an eligible license is present
IMPROVED: Ability to define a retention policy for certain logs
IMPROVED: Exclusions mechanism extended to firewall threats
IMPROVED: Computer details now directly accessible by clicking the computer name
IMPROVED: One-click Network isolation
IMPROVED: Columns ordering
IMPROVED: Pop-up with search option
IMPROVED: Hierarchical Dynamic groups tree
IMPROVED: Multi-select in pop-up (modal) windows
IMPROVED: Ability to create one exclusion from multiple detentions with standard exclusion criteria(s)
IMPROVED: Breadcrumbs for better navigation in Wizards
IMPROVED: Various other performance and security improvements
FIXED: “Delete task action” removes all client tasks, not just selected items in a task list for a specific group
FIXED: Status filter not visible for server tasks (only in client tasks)
FIXED: Failed to send a wake-up call from the client task details executions
6
FIXED: Incorrect target group type displays when editing a client trigger
FIXED: “Status update” type notifications fail to save if they contain the “$” character
FIXED: Import of policies with large file sizes
FIXED: Infinite units or subunits in tooltips for licenses in the License Management screen display incorrectly
FIXED: License-related notifications (for example, expiration/overuse) trigger when a license is suspended
FIXED: Policy does not block the selected Scan profile
FIXED: Filters previously set are not saved
FIXED: Various other bug fixes
ESET Cloud Administrator 1.2.118.0
ADDED: Support for ESET Dynamic Thread Defense (Sold separately. Available for purchase in upcoming
weeks)
ADDED: Submitted files screen
ADDED: Ability to pause ESET Full Disk Encryption available from EFDE client version 1.2 (EFDE - purchased
separately)
ADDED: Automatic resolution of firewall logs and filtered websites
ADDED: Ukrainian language
ADDED: New filtering options
ADDED: Many other performance, usability, and security improvements
IMPROVED: Discontinued the default limit for the number of displayed static groups
IMPROVED: Performance improvements in the “groups” tree on the “Computers” and “Detections” screens
IMPROVED: Selected screens redesign: Users, scheduled reports and edit updates in the navigation bar
IMPROVED: Unified table design for task selection, computers selection, and other features
IMPROVED: Second-level menu added under "Change assignments" in the policy screen
FIXED: Delay of product version status shown in the main web console
FIXED: System applications are not reported on macOS 10.15
FIXED: Language detection on macOS Catalina
FIXED: Table sorting behavior: Clicking column headers adds columns to multi-sorting until it has been clicked
3 times
FIXED: Last scan time in “computer details” screen won’t impact the computer security status tile
FIXED: User cannot resolve detections when the “Resolved” column is not shown in the “detections” table
FIXED: The side panel does not remember the expanded/collapsed state after log-out and log-in
FIXED: Some threats cannot be marked as resolved
FIXED: After moving computers from a specific group, the view is changed to the group "ALL."
ESET Cloud Administrator - ESET Management Agent release- June
7
ADDED: New version of ESET Management Agent
ADDED: Updating ESET Management Agent to the latest version can be deployed centrally alongside the cloud
service update
ADDED: Agent compatibility with H1/2021 Windows version 10
ESET Cloud Administrator 1.2.82.0
IMPROVED: Email domain validation when sending live installer link was discontinued
IMPROVED: Checkbox "automatically reboot when needed" not checked by default when activating EFDE from
encryption tile
IMPROVED: Dozens of usability, security, performance and stability improvements
FIXED: Clicking column headers adds columns to multi-sorting until it has been clicked 3 times
FIXED: Last Scan Time should note trigger red security status
FIXED: Not possible to resolve detections when "Resolution" column is not shown
FIXED: The side panel doesn't remember expanded/collapsed state after log-out and log-in
FIXED: Agents stop connecting to cloud service under some circumstances
FIXED: Recipients not visible in notifications emails
FIXED: Computer with outdated OS are not visible in appropriate dynamic group
FIXED: Ability to create hash exclusion without a hash present
FIXED: ESET Full Disk Encryption not included within the selective export task configuration
ESET Cloud Administrator 1.2
NEW: ESET Full Disk Encryption
NEW: Tagging - mark all relevant objects (e.g., computers) using user-defined tags
NEW: Support for the newest generation of Linux products, starting with ESET File Security for Linux v7
NEW: Centralized Exclusions and wizard
ADDED: Option to automatically delete computers that are not connecting
ADDED: Option to rename computers based on defined criteria
ADDED: Computer isolation task
ADDED: Unified table design with new navigation elements
ADDED: Ability to export tables across all the main screens to different formats
ADDED: New "empty screen states" for simpler object creation
ADDED: Detections view is now aggregated by time and other criteria to simplify operations and to resolve
them
ADDED: Execute one click actions from the "task executions" screen
8
ADDED: Create a combined installer including ESET Full Disk Encryption
ADDED: Option to deactivate individual products
ADDED: New dynamic groups related to newly introduced products
ADDED: Search by group name in computer screens and search bar
ADDED: Option to save dashboard layout as preset for other users
ADDED: Generate defined reports filtered to a selected group
ADDED: Indonesian language support
ADDED: New ESET Management Agent version (Windows) supports the latest security products
IMPROVED: Many UI Improvements & other usability changes
IMPROVED: Context menu now applies for all selected rows
IMPROVED: Filtering panel has many new options such as autocomplete
IMPROVED: New column selector element for primary tables.
IMPROVED: Layout of detections (previously "threats") screen with new detection details
IMPROVED: Reports screen layout includes a one click report generation option
IMPROVED: Task section was updated and triggers are now displayed in a separate view of "task details"
IMPROVED: Layout of policies screen, with simpler orientation and navigation
IMPROVED: Layout of notifications screen with notification details
IMPROVED: Quick links menu
IMPROVED: AV remover (part of management agent) supports auto update
IMPROVED: Download speeds from the repositories were significantly improved
IMPROVED: Management agent file size significantly reduced
CHANGED: "Threats" section was renamed to "Detections"
CHANGED: Management agent compatibility update related to macOS 10.7 and 10.8 support (see the
documentation for more details)
CHANGED: ESET Cloud Administrator ends support for Endpoint and Server Security versions 6.4 and earlier.
FIXED: Various other bug fixes and internal performance improvements
ESET Cloud Administrator 1.1.360.0
Added: Full support for endpoint version 7.1 products
Fixed: Various bugs
ESET Cloud Administrator 1.1.359.0
Improved: Internal performance improvements
9
ESET Cloud Administrator 1.1.358.0
Improved: Overall performance improvements
Changed: Updated copyright information
Fixed: ESET Cloud Administrator (ECA) server does not receive all "Web protection" threats
Fixed: "Web protection" threat details view in the webconsole displays an unexpected error
Fixed: An uncaught exception occurs when working with ECA
Fixed: Indonesian language support is missing in product installation filters
Fixed: Server Device Status chart is missing
ESET Cloud Administrator 1.1.356.0
FIXED: Issue with too many notifications send from one incident.
ESET Cloud Administrator 1.1.350.0
New version of ESET Management Agent fixing various installation/upgrade/repair issues.
Internal service performance improvements
Fixed invalid installer CA certificate encoding in GPO installer script
ESET Cloud Administrator 1.1.349
Various minor performance improvements
ESET Cloud Administrator 1.1.345
Various minor bug fixes
Wrong information is displayed under "Policy Product" column while creating the ECA Live installer
ESET Cloud Administrator 1.1.343.0
One-click actions
New one-click action - One click upgrade option – even from aggregated data.
New One-click actions to resolve "resolvable" actions – activate, reboot, update OS, or various protection
issues
Hardware inventory
Redesigned client details section
New "incident overview" dashboard, with new types of graphical elements, and one-click navigation to threats
Improved Automatic resolving of handled threats
Option to generate live installer without security product selected
10
New status overview section
Live installer now support offline cache to speed up the deployment
Overall UI improvements (polished UI, new vector icons, updated menus)
Updated "overview" dashboard with one click navigation & Configurable RSS feed
Redesigned quick links & help links
New layout for wizard elements
Ability to switch ECA do different language in EBA (support for NEW languages)
Automatic detection of "machine cloning"
Ability to send e-mail directly from ECA when sending installer
Automatic log-outs
New more streamlined way when adding computers or using introductory wizard
Redesigned "filter bar" with the option to remove / reset / save filter presets + "category filter" moved to
"filters"
New columns for number / highest severity of alerts, cloning questions, and hardware detection reliability
status
Enhanced filtering options by product name, version, number of alerts, policies, threats, & other options
New "remove computer from management" wizard, showing clear steps how to correctly remove devices from
ECA
Redesigned task wizard
New task types - Diagnostic (enable diagnostic / log collector)
Section "logs" now includes tabs to display "log collector" and new section for "diagnostic logs"
Alerts - Alert (problem) details are reported from the supported security products
New dynamic groups for desktops and servers
Questions to resolve conflicts
Possible to locate threats detected by the same scan
Added current detection engine version and a hash value
Possibility to filter by cause, threat type, scan, scanner and define more granular criteria for the time filter in
threats
Possibility to collapse and expand all reports in one click
Software installation task executes a "pre-execution check", and reports "task failed" with further details
New report template categories Hardware Inventory, Cloning Detection
Restyled report creation wizard
Extended options for filtering for specific values
Redesigned installer generation flow
Ability to configure LiveGrid and PUA settings when creating live installer
11
Ability to configure Live Installer proxy settings during the installer creation
Support for GPO (Group policy)
New filter to "hide not-assigned policies"
Policy details showing "assigned to" (combines computers / groups) and "applied on" (actually applied targets)
New predefined policies for optimal usage of ESET Live Grid, and few tweaks to existing recommended
templates for maximum protection
Possibility to allow "local lists"
Possible to edit multiple notifications at once
New announcement channel to inform users about planned outages and other important events
Improved migration from ERA6 (ESMC) managed environment when executing live installers
Availability of service
Availability
Our target is to provide 99.5% service availability. Our effort and well-defined processes drive this endeavor. In the
event of an ESET PROTECT Cloud service outage, endpoints remain secure and unaffected.
Maintenance
The ESET PROTECT Cloud service is subject to routine maintenance procedures. All maintenance windows that
exceed 15 minutes are announced to console administrators in advance. Outages during maintenance windows are
not affecting our targeted availability. Maintenance will be performed during weekends and outside working hours
(US data center - during US night hours; EU data center - during EU night hours).
Introduction to ESET PROTECT Cloud
Welcome to ESET PROTECT Cloud. ESET PROTECT Cloud allows you to manage ESET products on workstations and
servers in a networked environment with up to 10,000 devices from one central location. Using the ESET PROTECT
Cloud Web Console, you can deploy ESET solutions, manage tasks, enforce security policies, monitor system status
and quickly respond to problems or threats on remote computers.
ESET PROTECT Cloud is made up of the following components:
ESET PROTECT Cloud as a service
ESET PROTECT Cloud Web Console
The Web Console interprets the data stored in the ESET PROTECT Cloud database. It visualizes the vast
amounts of data into clear dashboards and reports, and also enforces policies and carries out tasks on agents
and other ESET applications.
ESET PROTECT Live Installer
Is a small application consisting of ESET Management Agent and a business endpoint product in a
streamlined and easy to use package.
ESET Management Agent is a small application with no graphical user interface that executes the commands
of ESET PROTECT Cloud on connected clients. It executes the tasks, collects logs from ESET applications,
interprets and forces policies, and performs other valid tasks such as software deployment and general
computer monitoring.
12
Is an easily downloadable, pre-configured package, containing an agent and security product (downloaded
during installation), in the form of a streamlined installer that will automatically connect to the proper cloud
instance and activate itself with a valid license with minimal interaction required from the user. The installer
will identify the correct platform and download the proper security product installer package.
The agent is a lightweight application that facilitates all communication between the ESET security product
on a client computer and ESET PROTECT Cloud .
ESET security products
ESET security products protect client computers and servers from threats.
ESET PROTECT Cloud supports the following ESET security products.
ESET Business Account
Central entry point for business customers, or an identity provider to ESET PROTECT Cloud.
Serves as a single-sign on for business customers to view their licenses, activated services, perform user
management, and more.
An ESET business account is required to activate the ESET PROTECT Cloud instance.
ESET Remote Deployment Tool
A tool that can remotely deploy ESET PROTECT Live Installer to the network.
Has the capability to remotely map the network and sync with AD, or support the import of targets on which
the product will be deployed .
13
New features in ESET PROTECT Cloud
Renaming of ESET Cloud Administrator
ESET Cloud Administrator was renamed "ESET PROTECT Cloud". Products and services are evolving to cover new
markets and customer needs. We have decided to rename our solution to better accommodate the current and
new capabilities that we have planned.
Remote Mobile Device Management for Android
Manage and protect Android mobile devices with ESET Endpoint Security for Android. Quickly deploy to one or
multiple devices via email or QR code. Initial configuration and scalability offer significant advantages for operation
in small environments while also suitable for large-site deployments. Learn more
ESET Full Disk Encryption for macOS
We are extending platform coverage and adding FileVault (native encryption for macOS) management to increase
organizations’ data security. Learn more
Support of ESET Dynamic Threat Defense
An add-on paid service that provides another layer of security for ESET products such as Mail Security and
Endpoints by utilizing a cloud-based sandboxing technology to detect new, never-before-seen threat types. Future
proof your company’s IT security with: Behavior-based Detection, Machine learning, Zero-day Threats Detection
and Cloud Sandboxing. Learn more
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186
  • Page 187 187
  • Page 188 188
  • Page 189 189
  • Page 190 190
  • Page 191 191
  • Page 192 192
  • Page 193 193
  • Page 194 194
  • Page 195 195
  • Page 196 196
  • Page 197 197
  • Page 198 198
  • Page 199 199
  • Page 200 200
  • Page 201 201
  • Page 202 202
  • Page 203 203
  • Page 204 204
  • Page 205 205
  • Page 206 206
  • Page 207 207
  • Page 208 208
  • Page 209 209
  • Page 210 210
  • Page 211 211
  • Page 212 212
  • Page 213 213
  • Page 214 214
  • Page 215 215
  • Page 216 216
  • Page 217 217
  • Page 218 218
  • Page 219 219
  • Page 220 220
  • Page 221 221
  • Page 222 222
  • Page 223 223
  • Page 224 224
  • Page 225 225
  • Page 226 226
  • Page 227 227
  • Page 228 228
  • Page 229 229
  • Page 230 230
  • Page 231 231
  • Page 232 232
  • Page 233 233
  • Page 234 234
  • Page 235 235
  • Page 236 236
  • Page 237 237
  • Page 238 238
  • Page 239 239
  • Page 240 240
  • Page 241 241
  • Page 242 242
  • Page 243 243
  • Page 244 244
  • Page 245 245
  • Page 246 246
  • Page 247 247
  • Page 248 248
  • Page 249 249
  • Page 250 250
  • Page 251 251
  • Page 252 252
  • Page 253 253
  • Page 254 254
  • Page 255 255
  • Page 256 256
  • Page 257 257
  • Page 258 258
  • Page 259 259
  • Page 260 260
  • Page 261 261
  • Page 262 262
  • Page 263 263
  • Page 264 264
  • Page 265 265
  • Page 266 266
  • Page 267 267
  • Page 268 268
  • Page 269 269
  • Page 270 270
  • Page 271 271
  • Page 272 272
  • Page 273 273
  • Page 274 274
  • Page 275 275
  • Page 276 276
  • Page 277 277
  • Page 278 278
  • Page 279 279
  • Page 280 280
  • Page 281 281
  • Page 282 282
  • Page 283 283
  • Page 284 284
  • Page 285 285
  • Page 286 286
  • Page 287 287
  • Page 288 288
  • Page 289 289
  • Page 290 290
  • Page 291 291
  • Page 292 292
  • Page 293 293
  • Page 294 294
  • Page 295 295
  • Page 296 296
  • Page 297 297
  • Page 298 298
  • Page 299 299
  • Page 300 300
  • Page 301 301
  • Page 302 302
  • Page 303 303
  • Page 304 304
  • Page 305 305
  • Page 306 306
  • Page 307 307
  • Page 308 308
  • Page 309 309
  • Page 310 310
  • Page 311 311
  • Page 312 312
  • Page 313 313
  • Page 314 314
  • Page 315 315
  • Page 316 316
  • Page 317 317
  • Page 318 318
  • Page 319 319
  • Page 320 320
  • Page 321 321
  • Page 322 322
  • Page 323 323
  • Page 324 324
  • Page 325 325
  • Page 326 326
  • Page 327 327
  • Page 328 328

ESET PROTECT Cloud Owner's manual

Category
Security device components
Type
Owner's manual

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI