Jump to content

CB530

ESET Staff
  • Posts

    183
  • Joined

  • Last visited

  • Days Won

    6

Posts posted by CB530

  1. Hi Al,

     

    I agree with Marcos. Using default policy settings for ERA, ESET Endpoint Security will block potentially unsafe applications, but will allow potentially unwanted applications. You can make changes in three places in your ESET Remote Administror (ERA) policy for Endpoint Security clients that will block potentially unwanted programs. If you only want to edit settings on an individual client workstation, see our home-side Knowledgebase article. The steps in ESET Endpoint Security and ESET Endpoint Antivirus are very similar. To make policy changes in ERA so that all clients block these applications, see my instructions below. I'll make sure that we make this data available in the Knowledgebase in the future.
     

    To access these settings, open ERA, open Policy Manager (Tools > Policy Manager), select your policy for clients and click Edit. Expand Windows desktop v5 and set your preference in the following four locations:

    (Note: A value of Yes will cause the applications to be allowed while a value of No will block them in real-time file-system protection and during scans.)

    1. Kernel > Scanner > Options > Potentially unwanted applications and Kernel > Scanner > Options > Potentially unsafe applications

     

    2. Computer scan > Scanner (On-demand scanner) Options > Potentially unwanted applications and Kernel > Scanner > Options > Potentially unsafe applications

     

    3. Real-time file system protection > Scanner (Real-time file system protection) > Options > Potentially unwanted applications and Kernel > Scanner > Options > Potentially unsafe applications

     

    4. Document protection > Scanner (Document protection) > Options > Potentially unwanted applications and Kernel > Scanner > Options > Potentially unsafe applications
     

    Hope this helps.

  2. Hi rcmbs,

    I'm not sure if I am interpreting your question correctly, but I believe that you are asking whether it is necessary for you to purchase a new license to continue using ESET after using system restore. Assuming that your license has not expired, you can continue using it after performing a system restore. You may need to re-enter your ESET-issued Username and Password. If you do not have your Username and Password available, visit the lost license page to have them emailed to you.

     

  3. kkay,

     

    I apologize for my late response here. You are correct that you need to install Microsoft AIK (or ADK if you are using a more recent operating system) for the procedure to work. ADK is about 2.0GB but is only recommended if you are using Windows 8/ 7/ Vista (SP2)/Windows Server 2008 or later. It is also self-executing, so it doesn't require the use of an ISO reader the way that AIK does.

  4. Hi Al,

     

    Have you looked at our Knowledgebase article on how to configure a mirror server?  I think you might find the answers to some of your questions there. We do recommend that you use a mirror server, and the only port that you should need open is port 2221 unless you want to use a different port as the default for clients to connect to.

     

    The matter of authentication comes down to your preference. It certainly does add an additional layer of security, should you choose to use it. This article will walk you through the steps to configure HTTP authentication if you want to.

×
×
  • Create New...