1 Introduction 1 ...................................................................................................................................................
1.1 Manageable ESET endpoint products 1 ...................................................................................................
1.2 New features in ESET PROTECT 8.0 1 ......................................................................................................
2 ESET PROTECT components and architecture 2 ..........................................................................
3 System requirements 3 ..............................................................................................................................
3.1 Hardware 3 ...................................................................................................................................................
3.2 Operating system 4 ....................................................................................................................................
3.3 Network 5 .....................................................................................................................................................
3.4 Software 6 ....................................................................................................................................................
4 Install ESET PROTECT Server 6 ..............................................................................................................
4.1 All-in-one installation of ESET PROTECT Server 7 .................................................................................
5 Post-installation steps 18 ...........................................................................................................................
6 Deploy ESET Management Agent and ESET endpoint products 19 ...................................
6.1 Deployment package creation 19 .............................................................................................................
6.2 Deployment package installation 21 .......................................................................................................
6.3 Other deployment methods 23 .................................................................................................................
6.4 ESET Remote Deployment Tool 24 ...........................................................................................................
7 ESET PROTECT Web Console 26 ............................................................................................................
7.1 Startup Wizard 28 .......................................................................................................................................
7.2 Dashboard 29 ...............................................................................................................................................
7.3 Computers 30 ...............................................................................................................................................
7.4 Groups 32 .....................................................................................................................................................
7.5 Detections 33 ...............................................................................................................................................
7.6 Reports 34 ....................................................................................................................................................
7.7 Tasks 35 ........................................................................................................................................................
7.8 Policies 36 ....................................................................................................................................................
7.9 Notifications 37 ...........................................................................................................................................
7.10 Status Overview 39 ..................................................................................................................................
7.11 Quarantine 39 ............................................................................................................................................
7.12 License Management 40 ..........................................................................................................................
7.13 Users and Permission Sets 42 ................................................................................................................
7.14 Certificates 43 ...........................................................................................................................................
8 Help and support 43 .....................................................................................................................................
9 End User License Agreement 44 ............................................................................................................
10 Privacy policy 49 ..........................................................................................................................................