ESET REMOTE ADMINISTRATOR 4 Instrukcja Instalacji

Przeglądaj online lub pobierz Instrukcja Instalacji dla Oprogramowanie ESET REMOTE ADMINISTRATOR 4. ESET REMOTE ADMINISTRATOR 4 Installation manual Instrukcja obsługi

  • Pobierz
  • Dodaj do moich podręczników
  • Drukuj

Podsumowanie treści

Strona 1 - Remote Administrator 4

ESETRemote Administrator 4 Installation Manual and User Guide

Strona 2 - ESET Remote Administrator 4

10UDP137 (target port from the point of view of ERAS)“Name resolving” during remote install.UDP138 (target port from the point of view of ERAS)“Browsi

Strona 3 - Contents

112.2.2 Before installationBefore installing, the following installation packages should be downloaded from ESET’s website:ESET Remote Administrator

Strona 4

12/qb - No user intervention is possible, but the installation process is indicated by a progress bar.Example: era_server_nt32_ENU.msi /qbParameters a

Strona 5 - 1. Introduction

132.2.3.4 Database types supported by ERA ServerBy default, the program uses the Microsoft Access (Jet Database) engine. ERAS 4.0 also supports the

Strona 6 - 1.2 Program architecture

14This is an example of a complete connection string for Oracle Server:Driver ={Oracle in instantclient10_1}; dbq =hostname: 1521/ESETRADBThis is an e

Strona 7

152.3 Scenario - Installation in an Enterprise environment2.3.1 Environment overview (network structure)Below is a copy of the previous network st

Strona 8 - 2.1 Requirements

162.3.2 Installation2.3.2.1 Installation at headquartersInstallations of ERAS, ERAC and client workstations are very similar to the previous scena

Strona 9

172.3.3 Other requirements for Enterprise environmentsIn larger networks, multiple ERA Servers can be installed to perform remote installs of client

Strona 10

183. Working with ERAC3.1 Connecting to ERASMost features in ERAC are only available after connecting to ERAS. Define the server by name or IP addre

Strona 11

193.2 ERAC - main windowThe current communication status between ERAC and ERAS is displayed in the status bar (1). All necessary data fromERAS is re

Strona 12

ESET Remote Administrator 4Copyright © 2010 by ESET, spol. s r.o.ESET Remote Administrator 4 was developed by ESET, spol. s r.o.For more information v

Strona 13

20Server NameDisplays name of server.ClientsTotal number of clients connecting to or in the database of the selected ERAS.Virus Signature DB RangeVers

Strona 14

21Output only includes clients with names identical to the string entered.Only clients beginning like (?,*)Output will only list clients with names be

Strona 15

223.3.3 View modeIn the Clients tab, the number of columns displayed can be adjusted by using the View mode drop-down menu on thefar right side of t

Strona 16

23If the information cannot be found in the dialog windows of the program, click the Request button (available underActions > Properties > Confi

Strona 17

24AttributeDescriptionProduct Install DateDate that the ESET security product was installed on the clientRoaming UserClients with this attribute will

Strona 18 - 3. Working with ERAC

25Fig.: Detailed information about a client workstation.The Clients tab offers several options after double-clicking on a client:GeneralContains simil

Strona 19 - 3.2 ERAC - main window

263.4.4 Threat Log tabThis tab contains detailed information about individual virus or threat incidents.AttributeDescriptionClient NameName of clien

Strona 20 - 3.3 Information filtering

273.4.7 Scan Log tabThis tab lists results of On-demand computer scans that were started remotely, locally on client computers, or asscheduled tasks

Strona 21

283.4.10 Tasks tabThe meaning of this tab is described in the chapter titled ”Tasks”. The following attributes are available:AttributeDescriptionSta

Strona 22 - 3.4 Tabs in ERAC

293.5.6 Other settings tabFilter settings > Auto apply changesIf enabled, filters in individual tabs will generate new outputs upon each modifica

Strona 23

Contents...5Introduction1...5

Strona 24

303.7 ESET Configuration EditorThe ESET Configuration Editor is an important component of ERAC and is used for several purposes. Some of the mostimp

Strona 25

313.7.2 Key configuration entriesIn this section, we explain several of the key configuration entries for ESET Smart Security and ESET NOD32 Antivir

Strona 26

32be changed remotely. To change the setting remotely the Suppress user settings option must be set to Yes. TheSuppress user settings option is only a

Strona 27

334. Installation of ESET client solutionsThis chapter is dedicated to the installation of ESET client solutions for Microsoft Windows operating syste

Strona 28 - 3.5 ERA Console setup

34anywhere within its contents. Select Manage packages from the context menu.Each installation package is defined by a Name. See (1) in the figure abo

Strona 29 - 3.6 Display modes

35REBOOTPROMPT =””After installation, a dialog window prompting the user to confirm rebooting is displayed (can’t be used along with /qn).ADMINCFG =”p

Strona 30

36embeds this setting in the Advanced installation scenario so you must select Advanced ? Fully customized installationduring the installation.We hig

Strona 31

374.2.3 Remote Push InstallThis method of remote install pushes ESET client solutions to remote target computers. Target computers should beonline.

Strona 32

386) Agent starts as a service under the system account.7) Agent establishes communication with its ”parent” ERAS and downloads the corresponding inst

Strona 33 - 4.2 Remote installation

39Diagnostics of Push InstallationChecks the availability of clients and services to be used during the remote install. For more information, see the

Strona 34

...52Role and purpose of policies in the policy treestructure5

Strona 35

40Attaching the agent (einstaller.exe) to email:1)Click Email… on the Remote Install tab and select the Type and name of the Package you wish to insta

Strona 36

41The username and password of the account under which the installation of the package is to be performed must be anaccount with administrator rights

Strona 37

42The username and password of the account under which the installation of the package is to be performed must be anaccount with administrator rights

Strona 38

434.2.7 Avoiding repeated installationsImmediately after the agent successfully completes the remote installation process, it marks the remote clien

Strona 39

443)Insert an .xml configuration file, which is to be applied to the program, to the same folder. The file should be named cfg.xml. To create a config

Strona 40

455. Administering client computers5.1 TasksClient workstations that are correctly connected to ERAS and displayed in ERAC can be configured and adm

Strona 41

465.1.1 Configuration TaskConfiguration tasks are used to modify protection settings on client workstations. These tasks are delivered to clientwork

Strona 42

474)Click Next to proceed to the dialog windows labeled Select Clients and Task Report which are described in detail inthe Tasks chapter.5)After the

Strona 43

485.1.6 Generate Security Audit Log TaskThis task applies to ESET Mobile Security only.Security Audit checks: battery level, Bluetooth status, free

Strona 44

493)The Protection status field will contain one or more warnings. Click the blue text suggesting a solution at the end ofeach message.4)Click Yes to

Strona 45 - 5.1 Tasks

51. IntroductionESET Remote Administrator (ERA) is an application which allows you to manage ESET’s products in a networkedenvironment, including work

Strona 46

50be displayed with its corresponding clients.Click the Add/Remove button to add or remove clients from groups, or click the Delete button to delete a

Strona 47

51Administrator > ERA Server > Setup > Groups > Active Directory Synchronization options). By default, onlyComputer security groups and Co

Strona 48

525.3.3 Virtual policiesIn addition to created policies, as well as those replicated from other servers (see chapter Replication tab ), the PolicyTr

Strona 49 - 5.2 Group Manager

53selected (for more information, see chapter How to create policies ).Icons with downward arrows – these policies are replicated – the option Down re

Strona 50

545.3.7 Assigning policies to clientsThere are two main rules for assigning policies to clients:1.Local (primary) clients can be assigned any local

Strona 51 - 5.3 Policies

55HAS IP Range (specify) – if client belongs to the group defined by the IP range…HAS (NOT) Defined Policy (specify) – if client does (or does not) ad

Strona 52

565.3.9 Special settingsTwo additional policies are not located in the Policy Manager but in Tools > Server Options > Advanced > Edit Advan

Strona 53

575.3.10.2 Each server is administered individually - policies are managed locally but the Default Parent Policy isinherited from the upper serverTh

Strona 54

585.3.10.3 Inheriting policies from an upper serverThe network model for this scenario is the same as the previous two scenarios. In addition, the m

Strona 55

595.3.10.4 Assigning policies only from the upper serverThis scenario represents a centralized system of policy management. Policies for clients are

Strona 56

6- Mirror for ESET NOD32 Antivirus 2.x- new setup- domain-based filtering option added in Find Unregistered Computers- compression of server logs (zip

Strona 57

605.3.10.6 Using groupsIn some situations, assigning policies to groups of clients can complement previous scenarios. Groups can be createdmanually

Strona 58

615.4.1 Notification ManagerTo open the Notification Manager main window, click Tools > Notification Manager.The main window is divided in two se

Strona 59

62meeting the client filter criteria are taken into consideration. The filtering criteria are:FROM Primary Server – Only clients from primary server;

Strona 60 - 5.4 Notifications

63corresponding level. Otherwise such notification rules would never find a trigger in the server log. The following logentries are available:– ADSI_S

Strona 61

64The notification format can be edited in the Message box in the bottom section of the Notification Manager main window.In the text you can use speci

Strona 62

65not clean at least one infiltration and that client has not been disconnected for more than one week; the rule runs ASAP.Completed task – If there w

Strona 63

66The rule is now active. If there is a problem with the protection status on a client from the HQ group, the rule will be run.The administrator will

Strona 64

67View – Opens the log listed in the top section directly in ESET SysInspectorSave As… – Saves the current log to a file. The Then Run ESET SysInspect

Strona 65

686. Firewall Rules Merge WizardFirewall Rules Merge Wizard allows you to merge the firewall rules for selected clients. This is especially useful whe

Strona 66

697. ReportsThe Reports tab is used to turn statistical information into graphs or charts. These can be saved and processed later in theComma Separate

Strona 67 - 5.6 Centralized quarantine

7ERAC is the client component of ERA and is usually installed on a workstation. This workstation is used by theadministrator to remotely control ESET

Strona 68

70Summary of Combined Top Clients with most Threats/ Top Threats; Combined Top Threats / Threats ComparativeProgress; Threats ProgressComprehensive Ne

Strona 69 - 7. Reports

71Templates placed in the Favorites list can be used later to immediately generate new reports. To move a template toFavorites, right-click the report

Strona 70

728. ESET Remote Administrator Server (ERAS) setup8.1 SecurityVersion 3.x and later ESET security solutions (ESET Smart Security, etc.) offer passwo

Strona 71 - 7.1 Example report scenario

73Deletes all system events older than the specified number of months (or days).Delete scan logs older than X months (days)Deletes all scanner logs ol

Strona 72 - 8.2 Server Maintenance

748.3.1 Operation of the Mirror serverThe computer hosting the Mirror server should always be running, and connected to the Internet or to an upper

Strona 73 - 8.3 Mirror server

758.3.3 How to enable and configure the MirrorIf the Mirror is directly integrated into ERA (a Business Edition component), connect to ERAS using ER

Strona 74

76The Mirror feature is also available directly from the program interface in ESET Smart Security Business Edition and ESETNOD32 Antivirus Business Ed

Strona 75

778.4 ReplicationReplication is used in large networks where multiple ERA Servers are installed (e.g., a company with several branches). Formore inf

Strona 76

78Replicate quarantine logIf these options are selected, all information displayed on the Clients, Threat Log, Firewall Log, Event Log, Scan Log,Mobil

Strona 77 - 8.4 Replication

79copied to the server.The central part of the window displays information about the license key which is currently used by the server. To seedetails

Strona 78 - 8.6 License management

82. Installation of ERA Server and ERA Console2.1 RequirementsERAS works as a service, and therefore requires a Microsoft Windows NT-based operating

Strona 79 - 8.7 Advanced settings

808.8 Other settingsSMTP settingsSome features in ERA require correct SMTP server configuration. Those features include remote email installation an

Strona 80 - 8.8 Other settings

819. ERA Maintenance ToolThe purpose of the ERA Maintenance tool is to execute specific tasks for server operation and maintenance. It can beaccessed

Strona 81 - 9. ERA Maintenance Tool

829.2.4 Database BackupThis tool allows you to create a backup file of the database. The settings in the first window are similar to those in thedat

Strona 82

8310. Troubleshooting10.1 FAQThis chapter contains solutions to the most frequently asked questions and problems related to installation and operati

Strona 83 - 10. Troubleshooting

8410.2.2 Frequently encountered error codes in era.log0x1203 – UPD_RETVAL_BAD_URLUpdate module error – incorrectly entered update server name.0x1204

Strona 84

8511. Hints & tips11.1 SchedulerESET NOD32 Antivirus and ESET Smart Security contain an integrated task scheduler which allows for scheduling re

Strona 85 - 11. Hints & tips

86Change ID – Modifies ID of selected tasksDetails – Summary information about the selected tasksMark for deletion – Application of .xml file will rem

Strona 86

8711.2 Removing existing profilesOccasionally you may come across duplicate profiles (either update or scan profiles) that were created by mistake.

Strona 87

8811.4 Combined update for notebooksIf there are any mobile devices in your local network (i.e., notebooks), we recommend that you configure a combi

Strona 88

89To create a new task, click Add. From the Scheduled task drop-down menu, select Update and click Next. Enter the Taskname (e.g., ”combined update”),

Strona 89

9OverloadIf a server is overloaded (e.g., we connect 20,000 clients to a server only able to service 10,000 clients at an interval ofevery 10 minutes)

Strona 90 - 12. ESET SysRescue

9012. ESET SysRescueESET SysRescue is a utility which enables you to create a bootable disk containing ESET NOD32 Antivirus (EAV) or ESETSmart Securit

Strona 91

9112.2.2 ESET AntivirusFor creating ESET SysRescue CD, you can select two sources of ESET files to be used by the compiler.ESS folder – files alread

Strona 92

9212.3 Working with ESET SysRescueFor the rescue CD/DVD/USB to function effectively, you must boot your computer from the ESET SysRescue boot media.

Komentarze do niniejszej Instrukcji

Brak uwag