1 Welcome 1 .........................................................................................................................................................
2 Product overview 1 .......................................................................................................................................
2.1 Requirements and supported products 6 ...............................................................................................
2.2 Using HTTP Proxy 8 ....................................................................................................................................
2.2.1 Linux Proxy configuration 9 ............................................................................................................................
2.2.2 Windows Proxy configuration 11 ......................................................................................................................
3 How to purchase the service 14 ............................................................................................................
4 Activate ESET Dynamic Threat Defense 15 .....................................................................................
4.1 Import licenses in EBA 16 ..........................................................................................................................
4.2 Synchronize EBA with ESMC 17 ................................................................................................................
4.3 Synchronize EBA with ESET PROTECT 19 ................................................................................................
4.4 Add license in ESET MSP Administrator 21 .............................................................................................
4.5 Synchronize ESET MSP Administrator with ESMC 26 ............................................................................
4.6 Synchronize ESET MSP Administrator with ESET PROTECT 27 ............................................................
4.7 Activate a group of computers 29 ............................................................................................................
4.8 Activate a single computer 34 ..................................................................................................................
5 How to enable and configure the ESET Dynamic Threat Defense service 36 .............
5.1 Configuration of ESET security product 36 .............................................................................................
5.2 Policy management 38 ...............................................................................................................................
6 Using ESET Dynamic Threat Defense 41 ..........................................................................................
6.1 ESET Mail Security 42 .................................................................................................................................
6.2 ESET Endpoint Security and ESET File Security 46 ................................................................................
6.3 Proactive protection 49 ..............................................................................................................................
6.4 List of submitted files 52 ...........................................................................................................................
6.5 Create a report 54 .......................................................................................................................................
6.6 Results of analysis 59 .................................................................................................................................
6.6.1 Behavioral report 60 ....................................................................................................................................
6.7 Manual upload of a file for analysis 62 ....................................................................................................
6.7.1 Submit file from ESMC 7.0 63 .........................................................................................................................
6.7.2 Submit file from ESET PROTECT 65 ..................................................................................................................
6.7.3 Submit file from ESET Endpoint Security 66 ......................................................................................................
6.7.4 Submit file from ESET File Security 67 ...............................................................................................................
6.7.5 Submit file from ESET Mail Security 68 ..............................................................................................................
6.8 Add exclusion 69 .........................................................................................................................................
6.9 Use exclusions to improve performance 72 ...........................................................................................
6.9.1 Review list of submitted files 72 ......................................................................................................................
6.9.2 Exclude folders 79 .......................................................................................................................................
6.9.3 Exclude process 82 ......................................................................................................................................
6.9.4 Review number of submitted files 85 ................................................................................................................
6.10 Notification for detected threats 88 ......................................................................................................
7 Common questions 91 .................................................................................................................................
8 Test ESET Dynamic Threat Defense functionality 93 ................................................................
9 Troubleshooting 95 ........................................................................................................................................
9.1 Diagnostics 101 ...........................................................................................................................................
9.2 Troubleshooting Apache HTTP Proxy 105 ...............................................................................................
10 Fair Use policy 106 ......................................................................................................................................
11 Privacy policy 107 ........................................................................................................................................
12 Terms of Use 109 .........................................................................................................................................
12.1 ESET Management Agent EULA 111 .......................................................................................................
12.2 Data Processing Agreement 117 ............................................................................................................
12.3 Standard Contractual Clauses 118 .........................................................................................................