6.2 Computers 96 ...............................................................................................................................................
6.2.1 Computer details 98 .....................................................................................................................................
6.2.2 Remove computer from management 102 .........................................................................................................
6.2.3 Groups 103 ...............................................................................................................................................
6.2.3.1 Group Actions 104 ....................................................................................................................................
6.2.3.2 Group Details 105 .....................................................................................................................................
6.2.3.3 Static Groups 106 .....................................................................................................................................
6.2.3.3.1 Create a new Static Group 107 ..................................................................................................................
6.2.3.3.2 Import clients from Active Directory 108 ......................................................................................................
6.2.3.3.3 Export Static Groups 108 .........................................................................................................................
6.2.3.3.4 Import Static Groups 109 .........................................................................................................................
6.2.3.4 Dynamic Groups 110 .................................................................................................................................
6.2.3.4.1 Create a new Dynamic Group 111 ..............................................................................................................
6.2.3.5 Move Static or Dynamic Group 113 ...............................................................................................................
6.2.3.6 Assign Client Task to a Group 114 .................................................................................................................
6.2.3.7 Assign Policy to a Group 115 .......................................................................................................................
6.3 Detections 116 .............................................................................................................................................
6.3.1 Manage Detections 118 ................................................................................................................................
6.3.2 Create Exclusion 119 ...................................................................................................................................
6.3.2.1 ESET security products compatible with exclusions 121 ......................................................................................
6.3.3 Ransomware Shield 122 ...............................................................................................................................
6.3.4 ESET Enterprise Inspector 122 ........................................................................................................................
6.4 Reports 123 ..................................................................................................................................................
6.4.1 Create a new report template 125 ...................................................................................................................
6.4.2 Generate report 128 ....................................................................................................................................
6.4.3 Schedule a report 129 ..................................................................................................................................
6.4.4 Outdated applications 129 ............................................................................................................................
6.4.5 SysInspector log viewer 130 ..........................................................................................................................
6.4.6 Hardware Inventory 131 ...............................................................................................................................
6.4.7 Audit log report 133 .....................................................................................................................................
6.5 Tasks 133 ......................................................................................................................................................
6.5.1 Client Tasks 134 .........................................................................................................................................
6.5.1.1 Client Task Triggers 135 .............................................................................................................................
6.5.1.1.1 Assign Client Task to a Group or Computer(s) 137 ..........................................................................................
6.5.1.2 Anti-Theft Actions 138 ...............................................................................................................................
6.5.1.3 Diagnostics 140 .......................................................................................................................................
6.5.1.4 Display Message 142 .................................................................................................................................
6.5.1.5 End computer isolation from network 143 .......................................................................................................
6.5.1.6 Export Managed Products Configuration 144 ....................................................................................................
6.5.1.7 Isolate computer from network 145 ...............................................................................................................
6.5.1.8 Modules Update 145 ..................................................................................................................................
6.5.1.9 Modules Update Rollback 146 ......................................................................................................................
6.5.1.10 On-Demand Scan 147 ..............................................................................................................................
6.5.1.11 Operating System Update 149 ....................................................................................................................
6.5.1.12 Quarantine Management 150 .....................................................................................................................
6.5.1.13 Product Activation 151 .............................................................................................................................
6.5.1.14 Reset Cloned Agent 152 ...........................................................................................................................
6.5.1.15 Rogue Detection Sensor Database Reset 153 .................................................................................................
6.5.1.16 Run Command 154 ..................................................................................................................................
6.5.1.17 Run SysInspector Script 155 ......................................................................................................................
6.5.1.18 ESET PROTECT Components Upgrade 156 .....................................................................................................
6.5.1.19 Send File to EDTD 157 ..............................................................................................................................
6.5.1.20 Server Scan 157 .....................................................................................................................................
6.5.1.21 Shutdown computer 158 ...........................................................................................................................
6.5.1.22 Software Install 159 .................................................................................................................................
6.5.1.22.1 Upgrade ESET software 161 ....................................................................................................................
6.5.1.22.2 Safetica software 162 ............................................................................................................................
6.5.1.23 Software Uninstall 163 .............................................................................................................................