![](//vs1.manuzoid.com/store/data-gzf/95ce03d74542843ef9eaefdd53ebca10/2/001969758.htmlex.zip/bg4.jpg)
4.4.1 Computer details 85 .....................................................................................................................................
4.4.2 Remove computer from management 88 ...........................................................................................................
4.5 Threats 89 ....................................................................................................................................................
4.5.1 Enterprise Inspector 92 .................................................................................................................................
4.6 Reports 93 ....................................................................................................................................................
4.6.1 Create a new report template 94 .....................................................................................................................
4.6.2 Generate report 97 ......................................................................................................................................
4.6.3 Schedule a report 98 ....................................................................................................................................
4.6.4 Outdated applications 99 ..............................................................................................................................
4.6.5 SysInspector log viewer 99 ............................................................................................................................
4.6.6 Hardware Inventory 100 ...............................................................................................................................
4.7 Client Tasks 101 ..........................................................................................................................................
4.7.1 Shutdown computer 102 ...............................................................................................................................
4.7.2 Diagnostics 103 ..........................................................................................................................................
4.7.3 On-Demand Scan 104 ..................................................................................................................................
4.7.4 Operating System Update 106 ........................................................................................................................
4.7.5 Rogue Detection Sensor Database Reset 107 .....................................................................................................
4.7.6 Quarantine Management 107 .........................................................................................................................
4.7.7 Security Management Center Components Upgrade 108 .......................................................................................
4.7.8 Reset Cloned Agent 109 ...............................................................................................................................
4.7.9 Run Command 110 ......................................................................................................................................
4.7.10 Run SysInspector Script 111 .........................................................................................................................
4.7.11 Send File to EDTD 111 ................................................................................................................................
4.7.12 Server Scan 111 ........................................................................................................................................
4.7.13 Software Install 112 ...................................................................................................................................
4.7.13.1 Upgrade ESET software 114 .......................................................................................................................
4.7.14 Software Uninstall 115 ................................................................................................................................
4.7.15 Product Activation 116 ................................................................................................................................
4.7.16 SysInspector Log Request (Windows only) 117 ..................................................................................................
4.7.17 Upload Quarantined File 117 ........................................................................................................................
4.7.18 Modules Update 118 ..................................................................................................................................
4.7.19 Modules Update Rollback 118 .......................................................................................................................
4.7.20 Display Message 119 ..................................................................................................................................
4.7.21 Anti-Theft Actions 120 ................................................................................................................................
4.7.22 Stop Managing (Uninstall ESET Management Agent) 122 .....................................................................................
4.7.23 Export Managed Products Configuration 122 ....................................................................................................
4.7.24 Assign Task to Group 123 ............................................................................................................................
4.7.25 Assign Task to Computer(s) 124 ....................................................................................................................
4.7.26 Triggers for Client tasks 125 .........................................................................................................................
4.7.27 Client Tasks executions 126 .........................................................................................................................
4.7.27.1 Progress indicator 129 ..............................................................................................................................
4.7.27.2 Status icon 130 ......................................................................................................................................
4.7.27.3 Drill down 130 ........................................................................................................................................
4.7.27.4 Trigger 132 ...........................................................................................................................................
4.8 Installers 133 ...............................................................................................................................................
4.9 Policies 135 ..................................................................................................................................................
4.9.1 Policies Wizard 136 .....................................................................................................................................
4.9.2 Flags 137 ..................................................................................................................................................
4.9.3 Manage Policies 138 ....................................................................................................................................
4.9.4 How Policies are applied to clients 139 .............................................................................................................
4.9.4.1 Ordering Groups 139 .................................................................................................................................
4.9.4.2 Enumerating Policies 141 ...........................................................................................................................
4.9.4.3 Merging Policies 143 .................................................................................................................................
4.9.4.3.1 Example scenario of merging policies 144 ....................................................................................................
4.9.5 Configuration of a product from ESMC 147 .........................................................................................................
4.9.6 Assign a Policy to a Group 147 .......................................................................................................................
4.9.7 Assign a Policy to a Client 148 ........................................................................................................................
4.9.8 ESET Rogue Detection Sensor policy settings 149 ................................................................................................