advertisement
5. Managed via ESET Remote Administrator
ESET Remote Administrator (ERA) is an application that allows you to manage ESET products in a networked environment from one central location. The ESET Remote Administrator task management system allows you to install ESET security solutions on remote computers and quickly respond to new problems and threats. ESET Remote
Administrator does not provide protection against malicious code on its own, it relies on the presence of ESET security solution on each client.
ESET security solutions support networks that include multiple platform types. Your network can include a combination of current Microsoft, Linux-based, Mac OS and operating systems that run on mobile devices (mobile phones and tables).
The picture below depicts a sample architecture for a network protected by ESET security solutions manged by ERA:
10
NOTE: For more information about ERA, see the
ESET Remote Administrator Online Help
.
5.1 ERA Server
ESET Remote Administrator Server is a primary component of ESET Remote Administrator. It is the executive
application that processes all data received from clients that connect to the Server (through the
ERA Agent
Agent facilitates communication between the client and the server. Data (Client logs, configuration, agent replication, etc.) are stored in a database. To correctly process the data, the ERA Server requires a stable connection to a Database server. We recommend that you install ERA Server and your database on separate servers to optimize performance. The machine on which ERA Server is installed, must be configured to accept all Agent/Proxy/RD
Sensor connections which are verified using certificates. Once ERA Server is installed, you can open
ERA Web
Console
which connects to the ERA Server (as shown in the
diagram
). From the Web Console, all ERA Server
operations are performed when managing ESET security solution within your network.
5.2 Web Console
ERA Web Console a web-based user interface that presents data from
ERA Server
security solutions in your environment. The Web Console can be accessed using a browser. It displays an overview of the status of clients on your network and can be used to deploy ESET solutions to unmanaged computers remotely. If you decide to make the web server accessible from the Internet, then you have the advantage of being able to use ESET Remote Administrator from nearly any place and any device with an active Internet connection.
This is the Web Console Dashboard:
Within the top bar of the Web Console is the Quick Search tool. Select Computer Name, IPv4/IPv6 Address or Threat
Name from the drop-down menu, type your search string into the text field and click the magnifier symbol or press
Enter to search. You will be redirected to the Groups section, where your search result will be displayed - a client or a list of clients. All clients are managed via the Web Console. You can access the Web Console using most common devices and browsers.
NOTE: For more information see
ESET Remote Administrator Online Help
.
5.3 Agent
ERA Agent is an essential part of the ESET Remote Administrator product. An ESET product on a client machine (for example ESET Endpoint security for Windows) communicates with ERA Server through the Agent. This communication allows for the management of the ESET products on all remote clients from a one central location.
The Agent collects information from the client and sends it to the Server. If the Server sends a task for the client, the task is sent to the Agent and the Agent sends this task to the client. All network communication happens between the Agent and the upper part of the ERA network -Server and Proxy.
The ESET Agent uses one of the following three methods to connect to the Server:
1. The Client's Agent is directly connected to the Server.
2. The Client's Agent is connected through a Proxy that is connected to the Server.
3. The Client's Agent is connected to the Server through multiple Proxies.
11
12
The ESET Agent communicates with ESET solutions installed on a client, collects information from programs on that client and passes configuration information received from the Server to the client.
NOTE: The ESET proxy has its own Agent, which handles all communication tasks between clients, other proxies and the Server.
5.4 RD Sensor
RD (Rogue Detection) Sensor is a search tool for computers on the network. RD Sensor is a part of ESET Remote
Administrator and is designed to detect machines on your network. It offers a convenient way of adding new computers to ESET Remote Administrator without the need to add them manually. Every computer that is found on your network is displayed in the Web Console and is added to the default All group. From here, you can take further actions with individual client computers.
RD Sensor is a passive listener that detects computers that are present on the network and sends information about them to the ERA Server. The ERA Server then evaluates whether the PCs found on the network are unknown to ERA server or already managed.
5.5 Proxy
ERA Proxy is another component of ESET Remote Administrator, and serves two purposes. In the case of a mediumsized or enterprise network with many clients (for example, 10,000 clients or more), you can use ERA Proxy to
distribute load between multiple ERA Proxies facilitating the main
ERA Server
. The other advantage of the ERA
Proxy is that you can use it when connecting to a remote branch office with a weak link. This means that the ERA
Agent on each client is not connecting to the main ERA Server directly via ERA Proxy which is on the same local network of the branch office. Therefore freeing up the link to the branch office. The ERA Proxy accepts connections from all local ERA Agents, sums their data up and uploads it to the main ERA Server (or another ERA Proxy). This allows your network to accommodate more clients without compromising the performance of your network and database queries.
Depending on your network configuration, it is possible for ERA Proxy to connect to another ERA Proxy and then connect to the main ERA Server.
For proper function of the ERA Proxy, the host computer where you install ERA Proxy must have an ESET Agent installed and must be connected to the upper level (either ERA Server or an upper ERA Proxy, if there is one) of your network.
NOTE: For example of deployment scenario for ERA Proxy see
ESET Remote Administrator Online Help
.
advertisement
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Related manuals
advertisement
Table of contents
- 3 Table of Contents
- 6 Introduction
- 6 What's new
- 7 System requirements
- 8 Types of protection
- 9 User interface
- 10 Managed via ESET Remote Administrator
- 10 ERA Server
- 11 Web Console
- 11 Agent
- 12 RD Sensor
- 12 Proxy
- 13 Installation
- 14 ESET File Security installation steps
- 18 Product activation
- 19 Terminal server
- 19 ESET AV Remover
- 20 Upgrading to a newer version
- 21 Beginner's guide
- 21 The user interface
- 24 Setting up virus DB update
- 26 Settings protection
- 27 Proxy server setup
- 28 Log files
- 30 Scan
- 32 Update
- 34 Tools
- 35 Running processes
- 36 Watch activity
- 37 Time period selection
- 37 ESET Log Collector
- 38 Protection statistics
- 39 Cluster
- 40 ESET Shell
- 41 Usage
- 45 Commands
- 47 Batch files / Scripting
- 48 ESET SysInspector
- 48 Create a computer status snapshot
- 48 ESET SysInspector
- 48 Introduction to ESET SysInspector
- 49 Starting ESET SysInspector
- 49 User Interface and application usage
- 49 Program Controls
- 51 Navigating in ESET SysInspector
- 52 Keyboard shortcuts
- 53 Compare
- 54 Command line parameters
- 55 Service Script
- 55 Generating Service script
- 55 Structure of the Service script
- 58 Executing Service scripts
- 58 FAQ
- 59 ESET SysRescue Live
- 60 Scheduler
- 62 Submit samples for analysis
- 63 Suspicious file
- 63 Suspicious site
- 63 False positive file
- 63 False positive site
- 64 Other
- 64 Quarantine
- 65 Help and support
- 65 How to
- 66 How to update ESET File Security
- 66 How to activate ESET File Security
- 67 How to create a new task in Scheduler
- 67 How to schedule a scan task (every 24 hours)
- 68 How to remove a virus from your server
- 68 Submit support request
- 68 ESET Specialized Cleaner
- 69 About ESET File Security
- 69 Product activation
- 70 Registration
- 70 Security Admin activation
- 70 Activation failure
- 70 License
- 70 Activation progress
- 70 Activation successful
- 71 Working with ESET File Security
- 72 Server
- 73 Automatic exclusions
- 74 Cluster
- 75 Cluster wizard - page1
- 77 Cluster wizard - page2
- 78 Cluster wizard - page3
- 80 Cluster wizard - page4
- 82 Computer
- 84 Antivirus
- 84 An infiltration is detected
- 85 Shared local cache
- 86 Real-time file system protection
- 87 Exclusions
- 88 Add or Edit exclusion
- 89 Exclusion format
- 89 ThreatSense parameters
- 91 Excluded extensions
- 92 Additional ThreatSense parameters
- 92 Cleaning levels
- 92 When to modify real-time protection configuration
- 93 Checking real-time protection
- 93 What to do if real-time protection does not work
- 93 Submission
- 94 Statistics
- 94 Suspicious files
- 95 On-demand computer scan
- 95 Custom scan launcher
- 97 Scan progress
- 98 Profile manager
- 99 Scan targets
- 99 Advanced scan option
- 100 Pause a scheduled scan
- 100 Idle-state scanning
- 101 Startup scan
- 101 Automatic startup file check
- 101 Removable media
- 102 Document protection
- 103 HIPS
- 104 HIPS rules
- 105 HIPS rule settings
- 107 Advanced setup
- 107 Drivers always allowed to load
- 107 Update
- 109 Update rollback
- 109 Update mode
- 110 HTTP Proxy
- 111 Connect to LAN as
- 112 Mirror
- 113 Updating from the Mirror
- 115 Mirror files
- 115 Troubleshooting Mirror update problems
- 115 How to create update tasks
- 116 Web and email
- 116 Protocol filtering
- 117 Excluded applications
- 118 Excluded IP addresses
- 118 Web and email clients
- 119 SSL protocol checking
- 120 Encrypted SSL communication
- 120 List of known certificates
- 121 Email client protection
- 121 Email protocols
- 122 Alerts and notifications
- 122 MS Outlook toolbar
- 123 Outlook Express and Windows Mail toolbar
- 123 Confirmation dialog
- 123 Rescan messages
- 123 Web access protection
- 124 URL address management
- 125 Create new list
- 125 HTTP addresses
- 126 Anti-Phishing protection
- 126 Device control
- 127 Device control rules
- 128 Adding Device control rules
- 129 Detected devices
- 129 Device groups
- 130 Tools
- 130 ESET Live Grid
- 131 Exclusion filter
- 131 Quarantine
- 132 Microsoft Windows update
- 132 Microsoft NAP
- 132 WMI Provider
- 133 Provided data
- 137 Accessing Provided Data
- 138 Log files
- 138 Log filtering
- 139 Find in log
- 140 Log maintenance
- 141 Proxy server
- 141 Email notifications
- 142 Message format
- 143 Presentation mode
- 143 Diagnostics
- 143 Customer Care
- 144 Cluster
- 145 User interface
- 146 Alerts and notifications
- 148 Access setup
- 148 Password
- 149 Password setup
- 149 Help
- 149 ESET Shell
- 149 Disable GUI on Terminal Server
- 150 Disabled messages and statuses
- 150 Confirmation messages
- 150 Disabled application statuses
- 150 System tray icon
- 151 Pause protection
- 151 Context menu
- 152 Revert all settings in this section
- 152 Revert to default settings
- 152 Import and export settings
- 153 Scheduler
- 153 Task details
- 154 Task timing - Once
- 154 Task timing - Repeatedly
- 154 Task timing - Daily
- 154 Task timing - Weekly
- 154 Task timing - Event triggered
- 154 Task details - Run application
- 155 Skipped task
- 155 Scheduler task details
- 155 Update profiles
- 155 Creating new tasks
- 156 Quarantine
- 157 Quarantining files
- 157 Restoring from Quarantine
- 157 Submitting file from Quarantine
- 157 Operating system updates
- 158 Glossary
- 158 Types of infiltration
- 158 Viruses
- 158 Worms
- 159 Trojan horses
- 159 Rootkits
- 159 Adware
- 160 Spyware
- 160 Packers
- 160 Exploit Blocker
- 160 Advanced Memory Scanner
- 161 Potentially unsafe applications
- 161 Potentially unwanted applications