Contents
.......................................................5ESET Endpoint Antivirus 61.
....................................................................................................5What's new in version 6.61.1
....................................................................................................5System requirements1.2
....................................................................................................6Prevention1.3
.......................................................7
Documentation for users connected via ESET
Remote Administrator
2.
....................................................................................................7ESET Remote Administrator Server2.1
....................................................................................................8Web Console2.2
....................................................................................................8Proxy2.3
....................................................................................................9Agent2.4
....................................................................................................9RD Sensor2.5
.......................................................10Using ESET Endpoint Antivirus by itself3.
....................................................................................................10Installation with ESET AV Remover3.1
..............................................................................11ESET AV Remover
3.1.1
..............................................................................13
Uninstallation using ESET AV Remover ended with
error
3.1.2
....................................................................................................14Installation3.2
..............................................................................16Advanced installation
3.2.1
....................................................................................................18Product installation via ERA (command line)3.3
....................................................................................................19Product activation3.4
....................................................................................................20Computer scan3.5
....................................................................................................20Upgrading to a more recent version3.6
....................................................................................................21Beginner's guide3.7
..............................................................................21The user interface
3.7.1
..............................................................................23Update setup
3.7.2
....................................................................................................24Common Questions3.8
..............................................................................25How to update ESET Endpoint Antivirus
3.8.1
..............................................................................25How to activate ESET Endpoint Antivirus
3.8.2
..............................................................................26
How to use current credentials to activate a new
product
3.8.3
..............................................................................26How to remove a virus from my PC
3.8.4
..............................................................................26How to create a new task in Scheduler
3.8.5
..............................................................................27How to schedule a scan task (every 24 hours)
3.8.6
..............................................................................27
How to connect ESET Endpoint Antivirus to ESET
Remote Administrator
3.8.7
..............................................................................27How to configure a mirror
3.8.8
..............................................................................28
How do I upgrade to Windows 10 with ESET Endpoint
Antivirus
3.8.9
..............................................................................28How to use Override mode
3.8.10
..............................................................................30How to activate Remote monitoring and management
3.8.11
....................................................................................................32Work with ESET Endpoint Antivirus3.9
..............................................................................33Computer
3.9.1
..................................................................................33Antivirus
3.9.1.1
........................................................................35An infiltration is detected
3.9.1.1.1
..................................................................................36Shared local cache
3.9.1.2
..................................................................................37Real-time file system protection
3.9.1.3
........................................................................38Additional ThreatSense parameters
3.9.1.3.1
........................................................................38Cleaning levels
3.9.1.3.2
........................................................................39Checking real-time protection
3.9.1.3.3
........................................................................39When to modify real-time protection configuration
3.9.1.3.4
........................................................................39What to do if real-time protection does not work
3.9.1.3.5
..................................................................................39On-demand computer scan
3.9.1.4
........................................................................40Custom scan launcher
3.9.1.4.1
........................................................................42Scan progress
3.9.1.4.2
........................................................................43Computer scan log
3.9.1.4.3
..................................................................................43Device control
3.9.1.5
........................................................................44Device control rules editor
3.9.1.5.1
........................................................................45Adding Device control rules
3.9.1.5.2
..................................................................................47Removable media
3.9.1.6
..................................................................................47Idle-state scanning
3.9.1.7
..................................................................................48Host-based Intrusion Prevention System (HIPS)
3.9.1.8
........................................................................50Advanced setup
3.9.1.8.1
........................................................................51HIPS interactive window
3.9.1.8.2
..................................................................................51Presentation mode
3.9.1.9
..................................................................................52Startup scan
3.9.1.10
........................................................................52Automatic startup file check
3.9.1.10.1
..................................................................................52Document protection
3.9.1.11
..................................................................................53Exclusions
3.9.1.12
..................................................................................54ThreatSense engine parameters setup
3.9.1.13
........................................................................59Exclusions
3.9.1.13.1
..............................................................................59Web and email
3.9.2
..................................................................................60Protocol filtering
3.9.2.1
........................................................................60Web and email clients
3.9.2.1.1
........................................................................61Excluded applications
3.9.2.1.2
........................................................................62Excluded IP addresses
3.9.2.1.3
........................................................................62SSL/TLS
3.9.2.1.4
........................................................................63Encrypted SSL communication
3.9.2.1.4.1
........................................................................63List of known certificates
3.9.2.1.4.2
........................................................................64List of SSL/TLS filtered applications
3.9.2.1.4.3
..................................................................................64Email client protection
3.9.2.2
........................................................................64Email clients
3.9.2.2.1
........................................................................65Email protocols
3.9.2.2.2
........................................................................66Alerts and notifications
3.9.2.2.3
..................................................................................67Web access protection
3.9.2.3
........................................................................67Web protocols
3.9.2.3.1
........................................................................68URL address management
3.9.2.3.2
..................................................................................69Anti-Phishing protection
3.9.2.4
..............................................................................70Updating the program
3.9.3
..................................................................................73Update setup
3.9.3.1
........................................................................75Update profiles
3.9.3.1.1
........................................................................75Update rollback
3.9.3.1.2
........................................................................76Update mode
3.9.3.1.3
........................................................................76HTTP Proxy
3.9.3.1.4
........................................................................77Connect to LAN as
3.9.3.1.5
........................................................................78Mirror
3.9.3.1.6
........................................................................80Updating from the Mirror
3.9.3.1.6.1
........................................................................82Troubleshooting Mirror update problems
3.9.3.1.6.2
..................................................................................82How to create update tasks
3.9.3.2
..............................................................................83Tools
3.9.4
..................................................................................84Log files
3.9.4.1
........................................................................85Search in log
3.9.4.1.1