1 About help 1 .........................................................................................................................................
2 Introduction 2 .......................................................................................................................................
2.1 Manageable ESET endpoint products 2 ............................................................................................
2.2 New features in ESET PROTECT 10.1 2 .............................................................................................
3 ESET PROTECT components and architecture 3 ...................................................................................
4 System requirements 4 ........................................................................................................................
4.1 Hardware 4 ...................................................................................................................................
4.2 Operating system 6 .......................................................................................................................
4.3 Network 8 ....................................................................................................................................
4.4 Software 8 ....................................................................................................................................
5 Install the ESET PROTECT Server 9 ......................................................................................................
5.1 All-in-one installation of ESET PROTECT Server 10 ............................................................................
6 Post-installation steps 21 .....................................................................................................................
7 Deploy ESET Management Agent and ESET endpoint products 22 ......................................................
7.1 Deployment package creation 23 ....................................................................................................
7.2 Deployment package installation 28 ................................................................................................
7.3 Other deployment methods 30 .......................................................................................................
7.4 ESET Remote Deployment Tool 31 ...................................................................................................
8 ESET PROTECT Web Console 34 ...........................................................................................................
8.1 ESET PROTECT Tour 36 ..................................................................................................................
8.2 Dashboard 36 ...............................................................................................................................
8.3 Computers 38 ...............................................................................................................................
8.4 Groups 39 ....................................................................................................................................
8.5 Detections 41 ...............................................................................................................................
8.6 Reports 42 ...................................................................................................................................
8.7 Tasks 43 ......................................................................................................................................
8.8 Policies 44 ....................................................................................................................................
8.9 Notifications 45 ............................................................................................................................
8.10 Status Overview 47 .....................................................................................................................
8.11 Quarantine 47 .............................................................................................................................
8.12 License Management 48 ...............................................................................................................
8.13 Users and permission sets 50 .......................................................................................................
8.14 Certificates 51 ............................................................................................................................
9 Help and support 52 .............................................................................................................................
10 End User License Agreement 52 ........................................................................................................
11 Privacy Policy 59 ................................................................................................................................