5.8 Configuration of a product from ESET PROTECT 266 ..................................................................................
5.8 Assign a Policy to a Group 266 ..........................................................................................................
5.8 Assign a Policy to a Client 268 ..........................................................................................................
5.8 How to use Override mode 269 .........................................................................................................
5.9 Notifications 271 ..........................................................................................................................
5.9 Manage Notifications 273 ...............................................................................................................
5.9 Events on managed computers or groups 274 .........................................................................................
5.9 Server status changes 275 ..............................................................................................................
5.9 Dynamic group changes 277 ............................................................................................................
5.9 Distribution 278 ..........................................................................................................................
5.9 How to configure an SNMP Trap Service 279 ...........................................................................................
5.10 Status Overview 281 ...................................................................................................................
5.11 More 283 ...................................................................................................................................
5.11 Submitted Files 284 ....................................................................................................................
5.11 Exclusions 285 ..........................................................................................................................
5.11 Quarantine 288 .........................................................................................................................
5.11 Computer Users 289 ...................................................................................................................
5.11 Add New Users 290 ....................................................................................................................
5.11 Edit Users 291 ..........................................................................................................................
5.11 Create New User Group 294 ...........................................................................................................
5.11 Dynamic Group Templates 295 ........................................................................................................
5.11 New Dynamic Group Template 296 ...................................................................................................
5.11 Rules for a Dynamic Group template 297 .............................................................................................
5.11 Operations 298 .........................................................................................................................
5.11 Rules and logical connectors 298 ......................................................................................................
5.11 Template rules evaluation 300 ........................................................................................................
5.11 Dynamic Group template - examples 302 ............................................................................................
5.11 Dynamic Group - a security product is installed 303 .................................................................................
5.11 Dynamic Group - a specific software version is installed 303 ........................................................................
5.11 Dynamic Group - a specific version of a software is not installed at all 304 .........................................................
5.11 Dynamic Group - a specific version of a software is not installed but other version exists 304 ....................................
5.11 Dynamic Group - a computer is in specific subnet 305 ...............................................................................
5.11 Dynamic Group - installed but not activated version of server security product 306 ...............................................
5.11 How to automate ESET PROTECT 306 .................................................................................................
5.11 License Management 308 ..............................................................................................................
5.11 ESET HUB, ESET Business Account or ESET MSP Administrator 312 .................................................................
5.11 Add License - License Key 314 ........................................................................................................
5.11 Offline activation 315 ..................................................................................................................
5.11 Access Rights 318 ......................................................................................................................
5.11 Users 319 ...............................................................................................................................
5.11 Create a Native User 322 ..............................................................................................................
5.11 User actions and user details 324 .....................................................................................................
5.11 Change user password 326 ............................................................................................................
5.11 Mapped users 327 ......................................................................................................................
5.11 Assign a Permission Set to a User 330 ................................................................................................
5.11 Two-Factor Authentication 331 ........................................................................................................
5.11 Permission Sets 333 ....................................................................................................................
5.11 Manage Permission Sets 335 ..........................................................................................................
5.11 List of permissions 337 .................................................................................................................
5.11 Certificates 342 .........................................................................................................................
5.11 Peer Certificates 343 ...................................................................................................................