Issue You want to create permissions to allow users to view, use and edit objects, tasks and licenses in ESET PROTECT In the example below, we create a permission set for a small office scenario to allow all users to access all tasks and objects except for server settings. You can customize this example to […]
Articles Tagged: eset for business
[KB7798] Install Microsoft SQL Server (database) and ESET PROTECT Server (8.x) on separate computers
Solution Prerequisites Make sure that your system meets the system requirements for ESET PROTECT. Visit the ESET PROTECT All-in-one installer download page, select the appropriate installer file for your system and click Download. When it finishes downloading, extract the .zip file to an easy-to-find location. This solution is divided into three parts, click each part to expand the […]
[KB7809] Create databases and database user accounts for ESET PROTECT
Issue You do not have an appropriate database for your ESET PROTECT Server installation You want to set up a dedicated database user for MS SQL or MySQL Details The creation of an Administrator or root account is required as part of MS SQL or MySQL installation. It is not recommended to use sa / root (database administrator) […]
[KB7915] Add or remove password protection of ESET security product settings from ESET PROTECT (8.x)
Issue ESET security product settings are not password-protected on client workstations ESET security product settings are password-protected on client workstations Solution Endpoint users: Perform these steps on individual client workstations ESET PROTECT 8.x User Permissions This article assumes that your ESET PROTECT user has the correct access rights and permissions to perform the tasks below. If […]
[KB6721] Set up an HTTPS/SSL connection for ESET Security Management Center Web Console (7.x)
Issue ESET business product in Limited Support status This article applies to an ESET product version that is currently in Limited Support status and is scheduled to reach End of Life status soon. For a complete list of supported products and support level definitions, review the ESET End of Life Policy for business products. Upgrade ESET […]
[KB5695] Set an ESET Remote Administrator Web Console running on Linux to use HTTPS (6.x)
Solution ESET business product no longer supported This article applies to an ESET product version that is currently in End of Life status and is no longer supported. The content in this article is no longer updated. For a complete list of supported products and support level definitions, review the ESET End of Life policy for […]
[KB7972] Enable, create, and edit Web control rules in ESET business products using ESET PROTECT (8.x)
Issue Required user permissions This article assumes that you have the appropriate access rights and permissions to perform the tasks below. If you use the default Administrator user or are unable to perform the tasks below (the option is unavailable), create a second administrator user with all access rights. ESET PROTECT users: Create a second administrator user in […]
[KB7969] Log all activity blocked by Web control rules in ESET PROTECT (8.x)
Issue I. Create a new Web control rule that logs blocked websites when visited by endpoints running ESET Endpoint Security II. Create a new Web control logs report template for blocked websites in ESET PROTECT III. Add new Web control logs Dashboard report Solution I. Create a new Web control rule If you have already […]
[KB3056] How do I enable / disable Web control on client workstations from the ESET Remote Administrator Console? (5.x)
Issue A new version has been released Version 6 of ESET Remote Administrator (ERA) and ESET business products were released in North America December 11th, 2014, and globally February 25th, 2015. This article applies to version 5.x and earlier ESET business products. For information about what’s new in the latest version and how to upgrade, […]
[KB8059] Request log files from clients in ESET PROTECT (8.x)
Issue Home users ESET Technical Support has requested a copy of one of the following log files: Detections Events Computer scan Blocked files Sent files Audit logs HIPS Firewall Network protection Filtered websites Antispam protection Web Control Create a SysInspector log and submit it to ESET Technical Support for analysis Details Your ESET product keeps […]