[KB7653] Create a permission set in ESET PROTECT (8.0) 0 (0)

Issue You want to create permissions to allow users to view, use and edit objects, tasks and licenses in ESET PROTECT In the example below, we create a permission set for a small office scenario to allow all users to access all tasks and objects except for server settings. You can customize this example to […]

Read More

[KB7798] Install Microsoft SQL Server (database) and ESET PROTECT Server (8.x) on separate computers 0 (0)

Solution Prerequisites Make sure that your system meets the system requirements for ESET PROTECT. Visit the ESET PROTECT All-in-one installer download page, select the appropriate installer file for your system and click Download. When it finishes downloading, extract the .zip file to an easy-to-find location. This solution is divided into three parts, click each part to expand the […]

Read More

[KB7915] Add or remove password protection of ESET security product settings from ESET PROTECT (8.x) 0 (0)

Issue ESET security product settings are not password-protected on client workstations ESET security product settings are password-protected on client workstations Solution  Endpoint users: Perform these steps on individual client workstations ESET PROTECT 8.x User Permissions This article assumes that your ESET PROTECT user has the correct access rights and permissions to perform the tasks below. If […]

Read More

[KB7972] Enable, create, and edit Web control rules in ESET business products using ESET PROTECT (8.x) 0 (0)

Issue Required user permissions This article assumes that you have the appropriate access rights and permissions to perform the tasks below. If you use the default Administrator user or are unable to perform the tasks below (the option is unavailable), create a second administrator user with all access rights. ESET PROTECT users: Create a second administrator user in […]

Read More

[KB8059] Request log files from clients in ESET PROTECT (8.x) 0 (0)

Issue  Home users ESET Technical Support has requested a copy of one of the following log files: Detections Events Computer scan Blocked files Sent files Audit logs HIPS Firewall Network protection Filtered websites Antispam protection Web Control Create a SysInspector log and submit it to ESET Technical Support for analysis Details Your ESET product keeps […]

Read More