6.5.2 Remove computer from management 96 ...........................................................................................................
6.5.3 Groups 97 .................................................................................................................................................
6.5.3.1 Group Actions 98 ......................................................................................................................................
6.5.3.2 Group Details 99 .......................................................................................................................................
6.5.3.3 Static Groups 100 .....................................................................................................................................
6.5.3.3.1 Create a new Static Group 101 ..................................................................................................................
6.5.3.3.2 Import clients from Active Directory 102 ......................................................................................................
6.5.3.3.3 Export Static Groups 102 .........................................................................................................................
6.5.3.3.4 Import Static Groups 103 .........................................................................................................................
6.5.3.4 Dynamic Groups 104 .................................................................................................................................
6.5.3.4.1 Create a new Dynamic Group 105 ..............................................................................................................
6.5.3.5 Move Static or Dynamic Group 107 ...............................................................................................................
6.5.3.6 Assign Client Task to a Group 108 .................................................................................................................
6.5.3.7 Assign Policy to a Group 109 .......................................................................................................................
6.6 Detections 110 .............................................................................................................................................
6.6.1 Manage Detections 112 ................................................................................................................................
6.6.2 Create Exclusion 113 ...................................................................................................................................
6.6.2.1 ESET security products compatible with detection exclusions 115 .........................................................................
6.6.3 Ransomware Shield 115 ...............................................................................................................................
6.6.4 ESET Enterprise Inspector 116 ........................................................................................................................
6.7 Reports 117 ..................................................................................................................................................
6.7.1 Create a new report template 118 ...................................................................................................................
6.7.2 Generate report 121 ....................................................................................................................................
6.7.3 Schedule a report 122 ..................................................................................................................................
6.7.4 Outdated applications 122 ............................................................................................................................
6.7.5 SysInspector log viewer 123 ..........................................................................................................................
6.7.6 Hardware Inventory 124 ...............................................................................................................................
6.7.7 Audit log 126 .............................................................................................................................................
6.8 Tasks 126 ......................................................................................................................................................
6.8.1 Client Tasks 127 .........................................................................................................................................
6.8.1.1 Client Task Triggers 128 .............................................................................................................................
6.8.1.1.1 Assign Client Task to a Group or Computer(s) 130 ..........................................................................................
6.8.1.2 Anti-Theft Actions 131 ...............................................................................................................................
6.8.1.3 Diagnostics 133 .......................................................................................................................................
6.8.1.4 Display Message 135 .................................................................................................................................
6.8.1.5 End computer isolation from network 136 .......................................................................................................
6.8.1.6 Export Managed Products Configuration 136 ....................................................................................................
6.8.1.7 Isolate computer from network 137 ...............................................................................................................
6.8.1.8 Modules Update 138 ..................................................................................................................................
6.8.1.9 Modules Update Rollback 139 ......................................................................................................................
6.8.1.10 On-Demand Scan 140 ..............................................................................................................................
6.8.1.11 Operating System Update 141 ....................................................................................................................
6.8.1.12 Quarantine Management 142 .....................................................................................................................
6.8.1.13 Product Activation 143 .............................................................................................................................
6.8.1.14 Reset Cloned Agent 144 ...........................................................................................................................
6.8.1.15 Rogue Detection Sensor Database Reset 145 .................................................................................................
6.8.1.16 Run Command 146 ..................................................................................................................................
6.8.1.17 Run SysInspector Script 147 ......................................................................................................................
6.8.1.18 Security Management Center Components Upgrade 148 ...................................................................................
6.8.1.19 Send File to EDTD 149 ..............................................................................................................................
6.8.1.20 Server Scan 149 .....................................................................................................................................
6.8.1.21 Shutdown computer 150 ...........................................................................................................................
6.8.1.22 Software Install 150 .................................................................................................................................
6.8.1.22.1 Upgrade ESET software 153 ....................................................................................................................
6.8.1.22.2 Safetica software 154 ............................................................................................................................
6.8.1.23 Software Uninstall 154 .............................................................................................................................
6.8.1.24 Stop Managing (Uninstall ESET Management Agent) 156 ...................................................................................
6.8.1.25 SysInspector Log Request (Windows only) 156 ................................................................................................