ESET Endpoint Security User guide

Category
Antivirus security software
Type
User guide
ESET ENDPOINT SECURITY 6
User Guide
Microsof Windows® 10/8.1/8/7/Vista/XP x86 SP3/XP x64 SP2
Click here to download the most recent version of this document
ESET ENDPOINT SECURITY 6
Copyright ©2017 by ESET, spol. s r. o.
ESET Endpoint Security was developed by ESET, spol. s r. o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a retrieval
system or transmitted in any form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise without permission in writing from the author.
ESET, spol. s r. o. reserves the right to change any of the described application software without
prior notice.
Worldwide Customer Support: www.eset.com/support
REV. 9/6/2017
Contents
.......................................................6ESET Endpoint Security 61.
....................................................................................................6What's new in version 6.61.1
....................................................................................................6System requirements1.2
....................................................................................................7Prevention1.3
.......................................................9
Documentation for users connected via ESET
Remote Administrator
2.
....................................................................................................9ESET Remote Administrator Server2.1
....................................................................................................10Web Console2.2
....................................................................................................10Proxy2.3
....................................................................................................11Agent2.4
....................................................................................................11RD Sensor2.5
.......................................................12Using ESET Endpoint Security by itself3.
....................................................................................................12Installation with ESET AV Remover3.1
..............................................................................13ESET AV Remover
3.1.1
..............................................................................15
Uninstallation using ESET AV Remover ended with
error
3.1.2
....................................................................................................16Installation3.2
..............................................................................18Advanced installation
3.2.1
....................................................................................................21Product installation via ERA (command line)3.3
....................................................................................................22Product activation3.4
....................................................................................................23Computer scan3.5
....................................................................................................23Upgrading to a more recent version3.6
....................................................................................................23Beginner's guide3.7
..............................................................................24The user interface
3.7.1
..............................................................................27Update setup
3.7.2
..............................................................................29Zones setup
3.7.3
..............................................................................29Web control tools
3.7.4
....................................................................................................30Common Questions3.8
..............................................................................30How to update ESET Endpoint Security
3.8.1
..............................................................................30How to activate ESET Endpoint Security
3.8.2
..............................................................................31
How to use current credentials to activate a new
product
3.8.3
..............................................................................31How to remove a virus from my PC
3.8.4
..............................................................................32How to allow communication for a certain application
3.8.5
..............................................................................32How to create a new task in Scheduler
3.8.6
..............................................................................33How to schedule a scan task (every 24 hours)
3.8.7
..............................................................................33
How to connect ESET Endpoint Security to ESET Remote
Administrator
3.8.8
..............................................................................34How to configure a mirror
3.8.9
..............................................................................34
How do I upgrade to Windows 10 with ESET Endpoint
Security
3.8.10
..............................................................................35How to use Override mode
3.8.11
..............................................................................37How to activate Remote monitoring and management
3.8.12
....................................................................................................39Work with ESET Endpoint Security3.9
..............................................................................40Computer
3.9.1
..................................................................................41Antivirus
3.9.1.1
........................................................................42An infiltration is detected
3.9.1.1.1
..................................................................................43Shared local cache
3.9.1.2
..................................................................................44Real-time file system protection
3.9.1.3
........................................................................45Additional ThreatSense parameters
3.9.1.3.1
........................................................................45Cleaning levels
3.9.1.3.2
........................................................................46Checking real-time protection
3.9.1.3.3
........................................................................46When to modify real-time protection configuration
3.9.1.3.4
........................................................................46What to do if real-time protection does not work
3.9.1.3.5
..................................................................................47On-demand computer scan
3.9.1.4
........................................................................48Custom scan launcher
3.9.1.4.1
........................................................................49Scan progress
3.9.1.4.2
........................................................................50Computer scan log
3.9.1.4.3
..................................................................................50Device control
3.9.1.5
........................................................................51Device control rules editor
3.9.1.5.1
........................................................................52Adding Device control rules
3.9.1.5.2
..................................................................................54Removable media
3.9.1.6
..................................................................................54Idle-state scanning
3.9.1.7
..................................................................................55Host-based Intrusion Prevention System (HIPS)
3.9.1.8
........................................................................57Advanced setup
3.9.1.8.1
........................................................................58HIPS interactive window
3.9.1.8.2
..................................................................................58Presentation mode
3.9.1.9
..................................................................................59Startup scan
3.9.1.10
........................................................................59Automatic startup file check
3.9.1.10.1
..................................................................................60Document protection
3.9.1.11
..................................................................................60Exclusions
3.9.1.12
..................................................................................61ThreatSense engine parameters setup
3.9.1.13
........................................................................66Exclusions
3.9.1.13.1
..............................................................................66Network
3.9.2
..................................................................................67Firewall
3.9.2.1
........................................................................69Learning mode
3.9.2.1.1
..................................................................................70Firewall profiles
3.9.2.2
........................................................................70Profiles assigned to network adapters
3.9.2.2.1
..................................................................................70Configuring and using rules
3.9.2.3
........................................................................71Firewall rules
3.9.2.3.1
........................................................................72Working with rules
3.9.2.3.2
..................................................................................73Trusted zone
3.9.2.4
..................................................................................73Configuring zones
3.9.2.5
..................................................................................73Known networks
3.9.2.6
........................................................................74Known networks editor
3.9.2.6.1
........................................................................76Network authentication - Server configuration
3.9.2.6.2
..................................................................................77Logging
3.9.2.7
..................................................................................77Establishing connection - detection
3.9.2.8
..................................................................................78Solving problems with ESET Personal firewall
3.9.2.9
........................................................................79Troubleshooting wizard
3.9.2.9.1
........................................................................79Logging and creating rules or exceptions from log
3.9.2.9.2
........................................................................79Create rule from log
3.9.2.9.2.1
........................................................................79Creating exceptions from firewall notifications
3.9.2.9.3
........................................................................79Advanced PCAP logging
3.9.2.9.4
........................................................................80Solving problems with protocol filtering
3.9.2.9.5
..............................................................................81Web and email
3.9.3
..................................................................................82Protocol filtering
3.9.3.1
........................................................................82Web and email clients
3.9.3.1.1
........................................................................83Excluded applications
3.9.3.1.2
........................................................................84Excluded IP addresses
3.9.3.1.3
........................................................................84SSL/TLS
3.9.3.1.4
........................................................................85Encrypted SSL communication
3.9.3.1.4.1
........................................................................85List of known certificates
3.9.3.1.4.2
........................................................................86List of SSL/TLS filtered applications
3.9.3.1.4.3
..................................................................................86Email client protection
3.9.3.2
........................................................................86Email clients
3.9.3.2.1
........................................................................87Email protocols
3.9.3.2.2
........................................................................88Alerts and notifications
3.9.3.2.3
........................................................................89Antispam protection
3.9.3.2.4
........................................................................90Blacklist/Whitelist/Exceptions list
3.9.3.2.4.1
........................................................................91Adding addresses to whitelist and blacklist
3.9.3.2.4.2
........................................................................91Marking messages as spam or not spam
3.9.3.2.4.3
..................................................................................91Web access protection
3.9.3.3
........................................................................92Web protocols
3.9.3.3.1
........................................................................92URL address management
3.9.3.3.2
..................................................................................93Anti-Phishing protection
3.9.3.4
..............................................................................94Web control
3.9.4
..................................................................................95Rules
3.9.4.1
........................................................................96Adding Web control rules
3.9.4.1.1
..................................................................................97Category groups
3.9.4.2
..................................................................................98URL groups
3.9.4.3
..............................................................................98Updating the program
3.9.5
..................................................................................102Update setup
3.9.5.1
........................................................................104Update profiles
3.9.5.1.1
........................................................................104Update rollback
3.9.5.1.2
........................................................................105Update mode
3.9.5.1.3
........................................................................105HTTP Proxy
3.9.5.1.4
........................................................................106Connect to LAN as
3.9.5.1.5
........................................................................107Mirror
3.9.5.1.6
........................................................................109Updating from the Mirror
3.9.5.1.6.1
........................................................................111Troubleshooting Mirror update problems
3.9.5.1.6.2
..................................................................................111How to create update tasks
3.9.5.2
..............................................................................112Tools
3.9.6
..................................................................................113Log files
3.9.6.1
........................................................................114Search in log
3.9.6.1.1
..................................................................................114Proxy server setup
3.9.6.2
..................................................................................115Scheduler
3.9.6.3
..................................................................................116Protection statistics
3.9.6.4
..................................................................................117Watch activity
3.9.6.5
..................................................................................118ESET SysInspector
3.9.6.6
..................................................................................118ESET LiveGri
3.9.6.7
..................................................................................119Running processes
3.9.6.8
..................................................................................121Network connections
3.9.6.9
..................................................................................122Submission of samples for analysis
3.9.6.10
..................................................................................123Email notifications
3.9.6.11
..................................................................................125Quarantine
3.9.6.12
..................................................................................126Microsoft Windows update
3.9.6.13
..................................................................................126ESET CMD
3.9.6.14
..............................................................................127User interface
3.9.7
..................................................................................127User interface elements
3.9.7.1
..................................................................................129Access setup
3.9.7.2
..................................................................................130Alerts and notifications
3.9.7.3
........................................................................131Advanced settings conflict error
3.9.7.3.1
..................................................................................131System tray icon
3.9.7.4
..................................................................................132Context menu
3.9.7.5
....................................................................................................132Advanced user3.10
..............................................................................132Profile manager
3.10.1
..............................................................................133Diagnostics
3.10.2
..............................................................................133Import and export settings
3.10.3
..............................................................................134Command Line
3.10.4
..............................................................................136Idle-state detection
3.10.5
..............................................................................136ESET SysInspector
3.10.6
..................................................................................136Introduction to ESET SysInspector
3.10.6.1
........................................................................136Starting ESET SysInspector
3.10.6.1.1
..................................................................................137User Interface and application usage
3.10.6.2
........................................................................137Program Controls
3.10.6.2.1
........................................................................139Navigating in ESET SysInspector
3.10.6.2.2
........................................................................140Keyboard shortcuts
3.10.6.2.2.1
........................................................................141Compare
3.10.6.2.3
..................................................................................142Command line parameters
3.10.6.3
..................................................................................143Service Script
3.10.6.4
........................................................................143Generating Service script
3.10.6.4.1
........................................................................143Structure of the Service script
3.10.6.4.2
........................................................................146Executing Service scripts
3.10.6.4.3
..................................................................................146FAQ
3.10.6.5
..................................................................................147ESET SysInspector as part of ESET Endpoint Security
3.10.6.6
..............................................................................148Remote monitoring and management
3.10.7
..................................................................................149RMM Command Line
3.10.7.1
..................................................................................151List of JSON commands
3.10.7.2
........................................................................151get protection-status
3.10.7.2.1
........................................................................152get application-info
3.10.7.2.2
........................................................................155get license-info
3.10.7.2.3
........................................................................155get logs
3.10.7.2.4
........................................................................157get activation-status
3.10.7.2.5
........................................................................157get scan-info
3.10.7.2.6
........................................................................159get configuration
3.10.7.2.7
........................................................................160get update-status
3.10.7.2.8
........................................................................160start scan
3.10.7.2.9
........................................................................161start activation
3.10.7.2.10
........................................................................162start deactivation
3.10.7.2.11
........................................................................163start update
3.10.7.2.12
........................................................................164set configuration
3.10.7.2.13
....................................................................................................165Glossary3.11
..............................................................................165Types of threats
3.11.1
..................................................................................165Viruses
3.11.1.1
..................................................................................165Worms
3.11.1.2
..................................................................................165Trojans
3.11.1.3
..................................................................................166Rootkits
3.11.1.4
..................................................................................166Adware
3.11.1.5
..................................................................................166Spyware
3.11.1.6
..................................................................................167Packers
3.11.1.7
..................................................................................167Potentially unsafe applications
3.11.1.8
..................................................................................167Potentially unwanted applications
3.11.1.9
..................................................................................169Botnet
3.11.1.10
..............................................................................169Types of remote attacks
3.11.2
Contents
..................................................................................170Worm attacks
3.11.2.1
..................................................................................170DoS attacks
3.11.2.2
..................................................................................170Port scanning
3.11.2.3
..................................................................................170DNS Poisoning
3.11.2.4
..............................................................................171Email
3.11.3
..................................................................................171Advertisements
3.11.3.1
..................................................................................171Hoaxes
3.11.3.2
..................................................................................172Phishing
3.11.3.3
..................................................................................172Recognizing spam scams
3.11.3.4
........................................................................172Rules
3.11.3.4.1
........................................................................173Whitelist
3.11.3.4.2
........................................................................173Blacklist
3.11.3.4.3
........................................................................173Exception list
3.11.3.4.4
........................................................................173Server-side control
3.11.3.4.5
..............................................................................173ESET Technology
3.11.4
..................................................................................173Exploit Blocker
3.11.4.1
..................................................................................174Advanced Memory Scanner
3.11.4.2
..................................................................................174ESET LiveGri
3.11.4.3
..................................................................................174Botnet protection
3.11.4.4
..................................................................................174Java Exploit Blocker
3.11.4.5
..................................................................................174Script-Based Attacks Protection
3.11.4.6
6
1. ESET Endpoint Security 6
ESET Endpoint Security 6 represents a new approach to truly integrated computer security. The most recent version
of the ThreatSense® scanning engine, combined with our custom Firewall and Antispam module, utilizes speed and
precision to keep your computer safe. The result is an intelligent system that is constantly on alert for attacks and
malicious software endangering your computer.
ESET Endpoint Security 6 is a complete security solution produced from our long-term effort to combine maximum
protection and a minimal system footprint. The advanced technologies, based on artificial intelligence, are capable
of proactively eliminating infiltration by viruses, spyware, trojan horses, worms, adware, rootkits, and other
Internet-borne attacks without hindering system performance or disrupting your computer.
ESET Endpoint Security 6 is primarily designed for use on workstations in a small business environment. Using ESET
Endpoint Security with ESET Remote Administrator in an enterprise environment allows you to easily manage any
number of client workstations, apply policies and rules, monitor detections and remotely configure clients from any
networked computer.
1.1 What's new in version 6.6
ESET Endpoint Security 6.6 has been released and is available to download. For more information about what's new
in ESET Endpoint Security 6.6, see the following improvements or new features:
Antimalware Scan Interface (AMSI) protection against scripts in Powershell (wscript.exe and also cscript.exe).
Protection against javascripts in web browsers.
Protected service Allows anti-malware user-mode services to be launched as a protected service (Windows 8.1,
10).
Set the logging severity for all rules (Device and Web control).
ESET Endpoint Security will inform you when you connect to an unprotected wireless network or network with
weak protection.
Specify the mode after learning mode expiration.
ESET Endpoint Security will inform you when ESET LiveGrid® is not accessible.
Graphical user interface, alert windows and notification windows have a new layout and design.
ESET Endpoint Security can be monitored via Remote monitoring and Management (RMM).
1.2 System requirements
For seamless operation of ESET Endpoint Security, the system should meet the following hardware and software
requirements (default product settings):
Processors Supported:
32-bit (x86) or 64-bit (x64) processor, 1 GHz or higher (see Note 1)
Operating Systems: Microsoft ® Windows ® 10/8.1/8/7/Vista/XP SP3 32-bit/XP SP2 64-bit
An operating system and the required service pack supported by the chosen ESET product version installed
System requirements of the operating system and other software installed on the computer are fulfilled
0.3 GB of free system memory (see Note 2)
1 GB of free disk space(see Note 3)
Minimum display resolution 1024x768
Internet connection or a local area network connection to a source (see Note 4) of product updates
Although it might be possible to install and run the product on systems that do not meet these requirements, we
7
recommend prior usability testing to be done based on performance requirements.
NOTE
(1): In case of Windows XP operating system, the minimum processor speed requirement could be lower.
(2): The product might use more memory if the memory would be otherwise unused on a heavily infected
computer or when huge lists of data are being imported into the product (e.g. URL white lists).
(3): The disk space needed to download the installer, install the product and to keep a copy of the installation
package in program data as well as backups of product updates to support the rollback feature. The product might
use more disk space under different settings (e.g. when more product update backup versions are stored,
memory dumps or huge amounts of log records are kept) or on an infected computer (e.g. due to the quarantine
feature). We recommend to keep enough free disk space to support the updates of the operating system and for
ESET product updates.
(4): Although not recommended, the product might be updated manually from a removable media.
1.3 Prevention
When you work with your computer, and especially when you browse the Internet, please keep in mind that no
antivirus system in the world can completely eliminate the risk of infiltrations and attacks. To provide maximum
protection and convenience, it is essential that you use your antivirus solution correctly and adhere to several
useful rules:
Update regularly
According to statistics from ESET LiveGrid®, thousands of new, unique infiltrations are created each day in order to
bypass existing security measures and bring profit to their authors all at the expense of other users. The specialists
at the ESET Virus Lab analyze these threats on a daily basis and prepare and release updates in order to continually
improve the level of protection for our users. To ensure the maximum effectiveness of these updates it is important
that updates are configured properly on your system. For more information on how to configure updates, see the
Update setup chapter.
Download security patches
The authors of malicious software often exploit various system vulnerabilities in order to increase the effectiveness
of spreading malicious code. With this in mind, software companies watch closely for any vulnerabilities in their
applications to appear and release security updates to eliminate potential threats on a regular basis. It is important
to download these security updates as they are released. Microsoft Windows and web browsers such as Internet
Explorer are two examples of programs for which security updates are released on a regular schedule.
Back up important data
Malware writers usually do not care about user’s needs, and the activity of malicious programs often leads to total
malfunction of an operating system and the loss of of important data. It is important to regularly back up your
important and sensitive data to an external source such as a DVD or external hard drive. This will make it far easier
and faster to recover your data in the event of system failure.
Regularly scan your computer for viruses
Detection of more known and unknown viruses, worms, trojans and rootkits are handled by the Real-time file
system protection module. This means that every time you access or open a file, it is scanned for a malware activity.
We recommend that you run a full Computer scan at least once a month because malware signatures may vary and
the detection engine updates itself each day.
Follow basic security rules
This is the most useful and most effective rule of all always be cautious. Today, many infiltrations require user
intervention in order to be executed and distributed. If you are cautious when opening new files, you will save
considerable time and effort that would otherwise be spent cleaning infiltrations. Here are some useful guidelines:
8
Do not visit suspicious websites with multiple pop-ups and flashing advertisements.
Be careful when installing freeware programs, codec packs, etc. Only use safe programs and only visit safe
Internet websites.
Be cautious when opening email attachments, particularly those from mass-mailed messages and messages from
unknown senders.
Don't use an Administrator account for everyday work on your computer.
9
2. Documentation for users connected via ESET Remote Administrator
ESET Remote Administrator (ERA) is an application that allows you to manage ESET products in a networked
environment from one central location. The ESET Remote Administrator task management system allows you to
install ESET security solutions on remote computers and quickly respond to new problems and threats. ESET Remote
Administrator does not provide protection against malicious code on its own, it relies on the presence of an ESET
security solution on each client.
ESET security solutions support networks that include multiple platform types. Your network can include a
combination of current Microsoft, Linux-based, Mac OS and operating systems that run on mobile devices (mobile
phones and tables).
The picture below depicts a sample architecture for a network protected by ESET security solutions managed by ERA:
NOTE
For more information see the ESET Remote Administrator Online help.
2.1 ESET Remote Administrator Server
ESET Remote Administrator Server is a primary component of ESET Remote Administrator. It is the executive
application that processes all data received from clients that connect to the Server (through the ERA Agent). The ERA
Agent facilitates communication between the client and the server. Data (Client logs, configuration, agent
replication, etc.) are stored in a database. To correctly process the data, the ERA Server requires a stable connection
to a Database server. We recommend that you install ERA Server and your database on separate servers to optimize
performance. The machine on which ERA Server is installed must be configured to accept all Agent/Proxy/RD Sensor
connections which are verified using certificates. Once installed, you can open ERA Web Console which connects to
the ERA Server (as can be seen in the diagram). From the Web Console, all ERA Server operations are performed
when managing ESET security solutions within your network.
10
2.2 Web Console
ERA Web Console is a web-based user interface that presents data from ERA Server and allows you to manage ESET
security solutions in your network. Web Console can be accessed using a browser. It displays an overview of the
status of clients on your network and can be used to deploy ESET solutions to unmanaged computers remotely. You
can choose to make the web server accessible from the internet to allow for the use of ESET Remote Administrator
from virtually any place or device.
This is the Web Console's Dashboard:
The Quick Search tool is located at the top of the Web Console. Select Computer Name, IPv4/IPv6 Address or Threat
Name from the drop-down menu, type your search string into the text field and then click the magnifier symbol or
press Enter to search. You will be redirected to the Groups section, where your search result will be displayed.
NOTE
For more information see the ESET Remote Administrator Online help.
2.3 Proxy
ERA Proxy is another component of ESET Remote Administrator and serves two purposes. In a medium-sized or
enterprise network with many clients (for example, 10,000 clients or more), you can use ERA Proxy to distribute load
between multiple ERA Proxies facilitating the main ERA Server. The other advantage of the ERA Proxy is that you can
use it when connecting to a remote branch office with a weak link. This means that the ERA Agent on each client is
not connecting to the main ERA Server directly via ERA Proxy, which is on the same local network as the branch
office. This configuration frees up the link to the branch office. The ERA Proxy accepts connections from all local ERA
Agents, compiles data from them and uploads it to the main ERA Server (or another ERA Proxy). This allows your
network to accommodate more clients without compromising the performance of your network and database
queries.
Depending on your network configuration, it is possible for ERA Proxy to connect to another ERA Proxy and then
connect to the main ERA Server.
For proper function of the ERA Proxy, the host computer where you install ERA Proxy must have an ESET Agent
installed and must be connected to the upper level (either ERA Server or an upper ERA Proxy, if there is one) of your
11
network.
2.4 Agent
ERA Agent is an essential part of the ESET Remote Administrator product. ESET security solutions on client machines
(for example ESET Endpoint security) communicate with ERA Server through the Agent. This communication allows
for the management of ESET security solutions on all remote clients from a one central location. The Agent collects
information from the client and sends it to the Server. When the Server sends a task to a client, the task is sent to
the Agent which then communicates with the client. All network communication happens between the Agent and
the upper part of the ERA network – Server and Proxy.
The ESET Agent uses one of the following three methods to connect to the Server:
1. The Client's Agent is directly connected to the Server.
2. The Client's Agent is connected through a Proxy that is connected to the Server.
3. The Client's Agent is connected to the Server through multiple Proxies.
The ESET Agent communicates with ESET solutions installed on a client, collects information from programs on that
client and passes configuration information received from the Server to the client.
NOTE
The ESET proxy has its own Agent which handles all communication tasks between clients, other proxies and the
Server.
2.5 RD Sensor
RD (Rogue Detection) Sensor is a part of ESET Remote Administrator designed to find computers on your network. It
provides a convenient way of adding new computers to ESET Remote Administrator without the need to find and
add them manually. Every computer found on your network is displayed in the Web Console and added to the
default All group. From here, you can take further actions with individual client computers.
RD Sensor is a passive listener that detects computers that are present on the network and sends information about
them to the ERA Server. The ERA Server evaluates whether the PCs found on the network are unknown or already
managed.
12
3. Using ESET Endpoint Security by itself
This section of this User Guide is intended for users who are using ESET Endpoint Security without ESET Remote
Administrator. All features and functionalities of ESET Endpoint Security are fully accessible depending on a user's
account rights.
3.1 Installation with ESET AV Remover
Before you continue with the installation process, it is important that you uninstall any existing security application
on the computer. Select the check box next to I want to uninstall unwanted antivirus applications using ESET AV
Remover to have ESET AV Remover scan your system and remove any supported security applications. Leave the
check box deselected and click Continue to install ESET Endpoint Security without running ESET AV Remover.
13
3.1.1 ESET AV Remover
The ESET AV Remover tool will help you to remove almost any antivirus software previously installed on your
system. Follow the instructions below to remove an existing antivirus program using ESET AV Remover:
1. To view a list of antivirus software that ESET AV Remover can remove, visit ESET Knowledgebase article.
2. Read the End-User License Agreement and click Accept to acknowledge your acceptance. Clicking Decline will
continue to installation of ESET Endpoint Security without removal of existing security application on the
computer.
3. ESET AV Remover will begin searching your system for antivirus software.
14
4. Select any listed antivirus applications and click Remove. Removal may take a moment.
5. When removal is successful, click Continue.
15
6. Restart your computer to apply changes and continue with installation of ESET Endpoint Security. If uninstallation
is unsuccessful, see the Uninstallation with ESET AV Remover ended with an error section of this guide.
3.1.2 Uninstallation using ESET AV Remover ended with error
If you are not able to remove an antivirus program using ESET AV Remover, you will receive a notification that the
application you are trying to remove might not be supported by ESET AV Remover. Visit the list of supported
products or uninstallers for common Windows antivirus software on ESET Knowledgebase to see if this specific
program can be removed.
When the uninstallation of the security product was unsuccessful or some of its components was uninstalled
partially, you are prompted to Restart and rescan. Confirm UAC after startup and continue with the scanning and
uninstallation process.
If necessary, contact ESET Customer Care to open a support request and have the AppRemover.log file available to
assist ESET Technicians. The AppRemover.log file is located in the eset folder. Browse to %TEMP% in Windows
Explorer to access this folder. ESET Customer Care will respond as quickly as possible to help resolve your issue.
16
3.2 Installation
Once you launch the installer, the installation wizard will guide you through the installation process.
IMPORTANT
Make sure that no other antivirus programs are installed on your computer. If two or more antivirus solutions are
installed on a single computer, they may conflict with each other. We recommend that you uninstall any other
antivirus programs on your system. See our knowledgebase article for a list of uninstaller tools for common
antivirus software (available in English and several other languages).
In the next step, the End-User License Agreement will be displayed. Please read and click Accept to acknowledge
your acceptance of the End-User License Agreement. Click Next after you accept the terms to continue with
installation.
17
After you select "I accept..." and click Next, you will be prompted to enable ESET LiveGri feedback system. ESET
LiveGri helps ensure that ESET is immediately and continuously informed about new infiltrations, which allows us
to better protect our customers. The system allows you to submit new threats to the ESET Virus Lab, where they are
analyzed, processed and added to the detection engine.
The next step in the installation process is to configure detection of Potentially unwanted applications which are
not necessarily malicious, but can often negatively affect the behavior of your operating system. See the Potentially
unwanted applications chapter for more details. You can access additional settings by clicking Advanced settings (for
example to install your ESET product in a specific folder or enable automatic scan after the installation).
The final step is to confirm installation by clicking Install.
18
3.2.1 Advanced installation
Advanced installation allow you to customize a number of installation parameters not available when performing a
typical installation.
After selecting your preference for detection of potentially unwanted applications and clicking Advanced settings,
you will be prompted to select a location for the installation Product folder. By default, the program installs to the
following directory:
C:\Program Files\ESET\ESET Endpoint Security\
You can specify a location for program modules and data. By default, they are installed to the following directories,
respectfully:
C:\Program Files\ESET\ESET Endpoint Security\
C:\ProgramData\ESET\ESET Endpoint Security\
Click Browse… to change these locations (not recommended).
In the next window, you can choose which product components will be installed. Product components in the
Computer section include Real-time file system protection, Computer scan, Document protection and Device
control. Please note that the first two components are mandatory for your security solution to work. The Network
section offers the option to install the firewall, which monitors all incoming and outgoing network traffic and
applies rules for individual network connections. Firewall also provides protection against attacks from remote
computers. Components in the Web and email section are responsible for your protection while you are browsing
the Internet and communicating via email. The Update mirror component can be used to update other computers on
your network. The Microsoft NAP support section provides an agent from ESET to ensure full compatibility with the
NAP architecture.
19
To configure your proxy server settings, select I use a proxy server and click Next. Enter the IP address or URL of your
proxy server in the Address field. If you are not sure whether you use a proxy server to connect to the Internet,
select Use the same settings as Internet Explorer (Recommended) and click Next. If you do not use a proxy server,
select I do not use a proxy server. For more information see Proxy server.
Custom installation allows you to define how automatic program updates will be handled on your system. Click
Change... to access Advanced settings.
20
If you do not want program components to be updated, select Never update program components. Select Ask
before downloading program components to display a confirmation window each time the system attempts to
download program components. To download program component upgrades automatically, select Always update
program components.
Next, select a filtering mode for the ESET Firewall. Four filtering modes are available for the ESET Endpoint Security
Firewall. The behavior of the firewall changes based on the selected mode. Filtering modes also influence the level
of user interaction required.
The next installation window offers the option to set a password to protect your program settings. Select Protect
configuration settings with a password and enter your password into the the New password and Confirm new
password fields. This password will be required to change or access the settings of ESET Endpoint Security. When
both password fields match, click Next to continue.
Click Install to start installation.
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175

ESET Endpoint Security User guide

Category
Antivirus security software
Type
User guide

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI