Contents
......................................................................................................................5
Introduction1.
...................................................................................................................................................................................................................5What's new in version 21.1
...................................................................................................................................................................................................................9Minimum system requirements1.2
......................................................................................................................9
Users connecting to ESET Remote Administrator2.
...................................................................................................................................................................................................................10ESET Remote Administrator Server2.1
...................................................................................................................................................................................................................11Web Console2.2
...................................................................................................................................................................................................................11Proxy2.3
...................................................................................................................................................................................................................12Agent2.4
...................................................................................................................................................................................................................12RD Sensor2.5
......................................................................................................................12
Remote installation3.
......................................................................................................................13
Local installation on the device4.
...................................................................................................................................................................................................................13Download from ESET website4.1
...................................................................................................................................................................................................................14Download from Google Play4.2
...................................................................................................................................................................................................................15Start-up wizard4.3
......................................................................................................................16
Uninstallation5.
......................................................................................................................16
Product activation6.
......................................................................................................................17
Antivirus7.
...................................................................................................................................................................................................................18Automatic Scans7.1
...................................................................................................................................................................................................................19Scan Logs7.2
...................................................................................................................................................................................................................19Ignore rules7.3
...................................................................................................................................................................................................................20Advanced settings7.4
......................................................................................................................21
Anti-Theft8.
...................................................................................................................................................................................................................22Administrator contacts8.1
...............................................................................................................................................................................................23How to add administrator contact
8.1.1
...................................................................................................................................................................................................................23Lock screen info8.2
...................................................................................................................................................................................................................23Trusted SIM cards8.3
...................................................................................................................................................................................................................23Remote commands8.4
......................................................................................................................24
Application Control9.
...................................................................................................................................................................................................................25Blocking Rules9.1
...............................................................................................................................................................................................25Blocking by application name
9.1.1
....................................................................................................................................................................................26How to block an application by its name
9.1.1.1
...............................................................................................................................................................................................26Blocking by application category
9.1.2
....................................................................................................................................................................................26How to block an application based on its category
9.1.2.1
...............................................................................................................................................................................................26Blocking by application permissions
9.1.3
....................................................................................................................................................................................26How to block an application by its permissions
9.1.3.1
...............................................................................................................................................................................................26Block unknown sources
9.1.4
...................................................................................................................................................................................................................27Exceptions9.2
...............................................................................................................................................................................................27How to add exceptions
9.2.1
...................................................................................................................................................................................................................27Required applications9.3
...................................................................................................................................................................................................................28Allowed applications9.4
...................................................................................................................................................................................................................29Permissions9.5
...................................................................................................................................................................................................................30Usage9.6