Eset Era 63 Era Admin Enu
Eset Era 63 Era Admin Enu
Eset Era 63 Era Admin Enu
REMOTE
ADMINISTRATOR 6
Administration Guide
Click here to navigate to the most recent version of this document
ESET Remote Admi ni s tra tor 6 wa s devel oped by ESET, s pol . s r.o.
For more i nforma ti on vi s i t www.es et.com.
Al l ri ghts res erved. No pa rt of thi s documenta ti on ma y be reproduced, s tored i n a
retri eva l s ys tem or tra ns mi tted i n a ny form or by a ny mea ns , el ectroni c, mecha ni ca l ,
photocopyi ng, recordi ng, s ca nni ng, or otherwi s e wi thout permi s s i on i n wri ti ng from
the a uthor.
ESET, s pol . s r.o. res erves the ri ght to cha nge a ny of the des cri bed a ppl i ca ti on s oftwa re
wi thout pri or noti ce.
Cus tomer Ca re: www.es et.com/s upport
REV. 26/01/2016
Contents
1. Administration
.......................................................6
2.10 Threats
....................................................................................................83
2.11 Reports
....................................................................................................85
2.11.1
Create
..............................................................................86
a new report template
2.11.2
Generate
..............................................................................89
report
2.1 Opening
....................................................................................................8
the ERA Web Console
2.11.3
Schedule
..............................................................................89
a report
2.2 The....................................................................................................9
ERA Web Console login screen
2.11.4
Outdated
..............................................................................89
applications
2.3 Getting
....................................................................................................11
to know ERA Web Console
2.11.5
SysInspector
..............................................................................90
log viewer
2. First Steps
.......................................................7
2.4 Post
....................................................................................................14
Installation Tasks
2.5 Certificates
....................................................................................................15
2.6 Deployment
....................................................................................................15
2.6.1
Add client
..............................................................................15
computer to ERA structure
2.6.1.1
Using
..................................................................................16
Active Directory synchronization
2.6.1.2
Manually
..................................................................................16
typing name/IP
2.6.1.3
Using
..................................................................................17
RD Sensor
2.6.2
Agent..............................................................................19
deployment
2.6.2.1
Deployment
..................................................................................19
steps - Windows
2.6.2.1.1
Agent Live
........................................................................20
Installers
2.6.2.1.2
Deploy Agent
........................................................................22
locally
2.6.2.1.3
Deploy Agent
........................................................................25
remotely
2.6.2.2
Deployment
..................................................................................29
steps - Linux
2.6.2.3
Deployment
..................................................................................30
steps - OS X
2.6.2.4
Agent
..................................................................................30
protection
2.6.2.5
Troubleshooting
..................................................................................30
- Agent deployment
2.6.2.6
Troubleshooting
..................................................................................33
- Agent connection
2.6.3
Agent..............................................................................33
deployment using GPO and SCCM
2.6.3.1
Creating
..................................................................................34
MST file
2.6.3.2
Deployment
..................................................................................38
steps - GPO
2.6.3.3
Deployment
..................................................................................42
steps - SCCM
2.6.4
Product
..............................................................................58
installation
2.6.4.1
Product
..................................................................................60
installation (command line)
2.6.4.2
List
..................................................................................62
of problems when installation fails
2.6.5
Desktop
..............................................................................62
Provisioning
Add computers
..............................................................................63
to groups
2.7.1.1
Static
..................................................................................63
groups
2.7.1.1.1
Add computer
........................................................................64
to a static group
2.7.1.2
Dynamic
..................................................................................65
groups
2.7.1.2.1
New Dynamic
........................................................................66
Group Template
2.7.1.2.2
Create new
........................................................................66
Dynamic Group
2.7.2
Create
..............................................................................68
a new policy
2.7.3
Assign
..............................................................................70
a policy to a group
2.7.4
Mobile
..............................................................................71
Device Enrollment from Groups
2.8 Dashboard
....................................................................................................72
2.8.1
Dashboard
..............................................................................73
settings
2.8.2
Drill down
..............................................................................74
2.8.3
Edit report
..............................................................................75
template
2.8.4
Time..............................................................................78
Zone
3. Mobile
.......................................................92
Device Management
3.1 MDM
....................................................................................................92
configuration profiles
4. Admin
.......................................................94
4.1 Groups
....................................................................................................94
4.1.1
Create
..............................................................................96
new Static Group
4.1.2
Create
..............................................................................98
new Dynamic Group
4.1.3
Assign
..............................................................................99
Task to a Group
4.1.4
Assign
..............................................................................100
a Policy to a Group
4.1.5
Policies
..............................................................................101
and Groups
4.1.6
Dynamic
..............................................................................101
Group Templates
4.1.6.1
New
..................................................................................102
Dynamic Group Template
4.1.6.2
Manage
..................................................................................102
Dynamic Group Templates
4.1.6.3
Dynamic
..................................................................................103
Group template - examples
4.1.7
Static
..............................................................................109
Groups
4.1.7.1
Static
..................................................................................110
Group Wizard
4.1.7.2
Manage
..................................................................................110
Static Groups
4.1.7.3
Add
..................................................................................112
Client Computer to Static Group
4.1.7.4
Import
..................................................................................113
clients from Active Directory
4.1.7.5
Assign
..................................................................................114
a Task to a Static Group
4.1.7.6
Assign
..................................................................................114
a Policy to a Static Group
4.1.7.7
Export
..................................................................................114
Static Groups
4.1.7.8
Import
..................................................................................115
Static Groups
4.1.8
Dynamic
..............................................................................116
Groups
4.1.8.1
Dynamic
..................................................................................116
Group Wizard
4.1.8.2
Create
..................................................................................117
Dynamic Group using existing Template
4.1.8.3
Create
..................................................................................119
Dynamic Group using new Template
4.1.8.4
Manage
..................................................................................119
Dynamic Groups
4.1.8.5
Move
..................................................................................121
Dynamic Group
4.1.8.6
Assign
..................................................................................122
a Policy to a Dynamic Group
4.1.8.7
Assign
..................................................................................122
a Task to a Dynamic Group
4.1.8.8
Rules
..................................................................................122
for a Dymanic Group template
2.9 Computers
....................................................................................................79
2.9.1
Add Computers
..............................................................................81
........................................................................122
description
4.1.8.8.2 Operation
2.9.2
Computer
..............................................................................82
details
........................................................................123
logical connectors
4.1.8.8.3 Rules and
4.1.8.8.4
Template
........................................................................124
rules evaluation
4.4.19.3
Mobile
..................................................................................200
Device ID location
4.1.8.8.5
How to ........................................................................125
automate ESET Remote Administrator
4.4.19.4
Device
..................................................................................201
Enrollment and MDC communication
4.2 User
....................................................................................................126
Management
4.4.20
Display
..............................................................................202
Message
4.2.1
Add..............................................................................128
New Users
4.4.21
Anti-Theft
..............................................................................203
Actions
4.2.2
Edit..............................................................................130
Users
4.4.22
Stop..............................................................................205
Managing (Uninstall ERA Agent)
4.2.3
Create
..............................................................................132
New User Group
4.4.23
Export
..............................................................................207
Managed Products Configuration
4.4.24
Assign
..............................................................................208
Task to Group
4.3 Policies
....................................................................................................133
4.3.1
Policies
..............................................................................134
Wizard
4.4.25
Assign
..............................................................................208
Task to Computer(s)
4.3.2
Flags
..............................................................................135
4.4.26
Triggers
..............................................................................209
4.3.3
Manage
..............................................................................135
Policies
4.3.4
4.5.1
Agent
..............................................................................211
Deployment
4.5.2
Delete
..............................................................................215
not connecting computers
4.3.5
4.5.3
Generate
..............................................................................216
Report
4.3.6
4.5.4
Rename
..............................................................................218
computers
4.5.5
Static
..............................................................................218
Group Synchronization
4.3.7
4.5.5.1
Synchronization
..................................................................................219
mode - Active Directory
4.5.5.2
Static
..................................................................................220
Group Synchronization - Linux Computers
4.3.8
4.5.5.3
Synchronization
..................................................................................221
mode - VMware
4.3.9
How..............................................................................149
Policies are applied to clients
4.5.6
User..............................................................................222
Synchronization
4.3.9.1
Ordering
..................................................................................149
Groups
4.5.7
Triggers
..............................................................................224
4.3.9.2
Enumerating
..................................................................................150
Policies
4.5.7.1
Server
..................................................................................225
Trigger Wizard
4.3.9.3
Merging
..................................................................................151
Policies
4.5.7.2
Scheduling
..................................................................................225
Server Task
4.3.10
Configuration
..............................................................................151
of a product from ERA
4.5.7.3
Throttling
..................................................................................225
4.3.11
Assign
..............................................................................151
a Policy to a Group
4.3.12
Assign
..............................................................................153
a Policy to a Client
4.4 Client
....................................................................................................154
Tasks
4.5 Server
....................................................................................................210
Tasks
........................................................................228
too sensitive
4.5.7.3.1 Trigger is
4.5.7.4
Manage
..................................................................................228
Server Triggers
Trigger Sensitivity
4.5.7.4.1 Manage........................................................................229
........................................................................230
too often
4.5.7.4.2 Trigger fires
4.4.1
Client
..............................................................................155
Tasks executions
4.4.1.1
Progress
..................................................................................157
indicator
4.4.1.2
Status
..................................................................................158
icon
4.4.1.3
Drill
..................................................................................158
down
4.4.1.4
Trigger
..................................................................................160
4.4.2
Shutdown
..............................................................................161
computer
4.4.3
On-Demand
..............................................................................162
Scan
4.4.4
Operating
..............................................................................163
System Update
4.4.5
Quarantine
..............................................................................165
Management
4.4.6
Rogue
..............................................................................166
Detection Sensor Database Reset
4.4.7
Remote
..............................................................................167
Administrator Components Upgrade
4.4.8
Reset
..............................................................................169
Cloned Agent
4.4.9
Run..............................................................................170
Command
4.4.10
Run..............................................................................171
SysInspector Script
4.4.11
Server
..............................................................................172
Scan
4.4.12
Software
..............................................................................173
Install
4.4.13
Software
..............................................................................174
Uninstall
4.4.14
Product
..............................................................................176
Activation
4.4.15
SysInspector
..............................................................................177
Log Request
4.8.1
Users
..............................................................................247
4.4.16
Upload
..............................................................................178
Quarantined File
4.8.1.1
Create
..................................................................................247
a Native User
4.4.17
Virus
..............................................................................179
Signature Database Update
4.8.1.2
Mapped
..................................................................................248
Domain Security Group Wizard
4.4.18
Virus
..............................................................................180
Signature Database Update Rollback
4.8.1.3
Map
..................................................................................249
Group to Domain Security Group
4.4.19
Device
..............................................................................181
Enrollment - Client Task
4.8.1.4
Assign
..................................................................................250
User a Permission Set
4.4.19.1
Device
..................................................................................182
Enrollment Android
4.8.1.5
Two
..................................................................................251
Factor Authentication
4.4.19.2
Device
..................................................................................195
Enrollment iOS
4.8.2
Permission
..............................................................................251
Sets
4.8.2.1
Manage
..................................................................................252
Permission Sets
........................................................................231
4.5.7.4.3 CRON Expression
4.6 Notifications
....................................................................................................231
4.6.1
Notifications
..............................................................................232
Wizard
4.6.2
Manage
..............................................................................232
Notifications
4.6.3
How..............................................................................234
to configure an SNMP Trap Service
4.7 Certificates
....................................................................................................236
4.7.1
Peer..............................................................................236
Certificates
4.7.1.1
Create
..................................................................................237
a new Certificate
4.7.1.2
Export
..................................................................................238
Peer Certificate
4.7.1.3
APN
..................................................................................240
certificate
4.7.1.4
Show
..................................................................................241
revoked
4.7.1.5
Set
..................................................................................242
new ERA Server certificate
4.7.2
Certification
..............................................................................243
Authorities
4.7.2.1
Create
..................................................................................244
a new Certification Authority
4.7.2.2
Export
..................................................................................244
a Public Key
4.7.2.3
Import
..................................................................................245
a Public Key
4.8 Access
....................................................................................................246
Rights
Contents
4.9 Server
....................................................................................................253
Settings
4.9.1
Syslog
..............................................................................254
server
4.9.2
Export
..............................................................................255
logs to Syslog
4.10 License
....................................................................................................257
Management
4.10.1
Activation
..............................................................................259
5. Diagnostic
.......................................................262
Tool
6. FAQ.......................................................263
7. About
.......................................................265
ESET Remote Administrator
1. Administration
This section explaines how to manage and configure ESET Remote Administrator. The following chapters will show
you the recommended initial steps that should be taken after the installation of ESET Remote Administrator.
First steps - start setting things up.
Post Installation Tasks - learn how to get the most from ESET Remote Administrator and complete the
recommended steps for an optimal user experience.
ERA Web Console - the primary user interface for ESET Remote Administrator. Easy to use from any place or
device.
User Management - you can create a new User Group, add new Users, modify existing ones and synchronize with
Active Directory.
License Management - ESET Remote Administrator must be activated using an ESET-issued License key before you
can begin using it. See the License Management section for instructions on how to activate your product, or see
ESET License Administrator Online help for more information about using ESET License Administrator.
A fully customizable Dashboard gives you an overview of the security state of your network. The Admin section of
ESET Remote Administrator Web Console (ERA Web Console) is a powerful and user-friendly tool for managing
ESET products.
ERA Agent deployment - the ERA Agent must be installed on all client users that communicate with the ERA
Server.
Notifications - deliver relevant information in real time and Reports allows you to conveniently sort various types
of data that you can use later.
Mobile Device Management - you can install, enroll and set up your mobile devices.
2. First Steps
After you have successfully installed ESET Remote Administrator you can begin setting things up.
First, open ERA Web Console in your browser and log in.
Getting to know ERA Web Console
Before you begin initial setup, we recommend that you get to know the ERA Web Console, as it is the interface you
will use to manage ESET security solutions.
When you open ERA Web Console for the first time Post Installation Tasks will guide you through the recommended
steps to configure your system.
Creating/settings permissions for new users
During installation you created a default administrator account. We recommend that you save the Administrator
account and create a new account to manage clients and configure their permissions.
Adding client computers, servers and mobile devices on your network to ERA structure
During installation, you can choose to search your network for computers (clients). All clients found will be listed in
the Computers section when you start ESET Remote Administrator. If clients are not shown in the Computers
section, run the Static Group Synchronization task to search for computers and show them in groups.
Deploying an Agent
Once the computers are found, deploy the Agent on the client computers. The Agent provides communication
between ESET Remote Administrator and clients.
Installing ESET product (including activation)
To keep your clients and network secure, install ESET products. This is done using the Software Install task.
Creating/editing groups
We recommend that you sort clients into Groups, either Static or Dynamic, based on various criteria. This makes
managing clients easier and helps you keep an overview of your network.
Creating a new policy
Policies are used to distribute a specific configuration for ESET products running on client computers. They allow you
to avoid configuring ESET products on each client manually. Once you have created a new policy with your custom
configuration, you can assign it to a group (either static or dynamic) to apply your settings to all the computers in
that group.
Assigning a policy to a group
As explained above, a policy must be assigned to a group to take affect. Computers that belong to the group will
have this policy applied to them. The policy is applied and updated every time an Agent connects to ERA Server.
Setting up Notifications and creating Reports
We recommend that you use notifications and reports to monitor the status of client computers in your
environment. For example, if you want to be notified that a certain event occurred or want to view or download a
report.
If this is your first login, please provide the credentials you entered during the Installation process. For more details
about this screen, see Web Console login screen.
NOTE: In the rare case that you do not see the login screen or when the login screen appears to be constantly
loading, restart the ESET Remote Administrator Server service. Once the ESET Remote Administrator Server service is
8
up and running again, restart the Apache Tomcat service. After this, the Web Console login screen will load
successfully.
Change Password / Try different Account - allows you to change password or switch back to login screen. A user
without a permission set is allowed to log into the Web Console, but he will not see any relevant information.
To give a user read/write/modify permissions in Web Console modules, a proper Permission Set must be created
and assigned to the user.
Session management and security measures:
Login IP address lockout
After 10 unsuccessful login attempts from the same IP address, further login attempts from this IP address are
temporarily blocked for approximately 10 minutes. The IP address ban on login attempts does not affect existing
sessions.
Wrong session ID address lockout
After using an invalid session ID 15 times from the same IP address, all further connections from this IP address
are blocked for approximately 15 minutes. Expired session IDs are not counted in. If there is an expired session
ID in the browser, it is not considered an attack. The 15-minute IP address ban is for all actions (including valid
requests).
10
Post-Installation Tasks show you how to get most from ESET Remote Administrator. These will guide you through
the recommended steps.
11
Screens with tree have specific controls. The tree itself is on the left with actions bellow. Click an item from the tree
to display options for that item.
12
Tables allow you to manage units from rows individually or in a group (when more rows are selected). Click a row to
display options for units in that row. Data in tables can be filtered and sorted.
Objects in ERA can be edited using Wizards. All Wizards share the following behaviors:
o Steps are vertically oriented from top to bottom.
o User can return to any step at any time.
o Invalid input data are marked when you move your cursor to a new field. The Wizard step containing invalid
input data is marked as well.
o User can check for invalid data any time by clicking Mandatory Settings.
o Finish is not available until all input data is correct.
13
14
2.5 Certificates
An important part of ESET Remote Administrator are certificates. Certificates are required for ERA components to
communicate with ERA Server.
You can use certificates that were created during ERA installation. Alternatively, you can use your custom
Certification Authority and Certificates. You can also Create Certification Authority (CA) or Import Public Key which
you will use to sign Peer Certificate for each of the components (ERA Agent, ERA Proxy, ERA Server, ERA MDM or
Virtual Agent Host).
2.6 Deployment
After the successful installation of ESET Remote Administrator, it is necessary to deploy the ERA Agent and ESET
Endpoint protection (EES, EEA...) to the computers in the network. Deployment consists of following steps:
1. Add client computers to ESET Remote Administrator groups structure.
2. ERA Agent deployment
3. ESET Endpoint protection deployment
Once the ERA Agent is deployed, you can perform remote installation of other ESET security products on your client
computers. The exact steps for remote installation are described in the Product installation chapter.
15
To start the synchronization process just click the task and choose Run now. If you need to create a new AD
synchronization task, select a group to which you want to add new computers from the AD. Also select objects in the
AD you want to synchronize from and what to do with duplicates. Enter your AD server connection settings and set
the Synchronization mode to Active Directory/Open Directory/LDAP. Follow step-by-step instructions in this ESET
Knowledgebase article.
16
Type the IP address or host name of a machine you want to add and ESET Remote Administrator will search for it on
the network.
Click Add. Computers can be viewed in the list on the right when you select the group they belong to. Once the
computer is added, a pop-up window will open with the option to Deploy Agent.
17
The Rogue computers report on the Dashboard now lists computers found by the RD Sensor. Computers can be
added by clicking the computer you want to Add, or you can Add all displayed items.
If you are adding a single computer, follow the instructions on screen. You can use a preset name or specify your
own (this is a display name that will be used in ERA Web Console only, not an actual host name). You can also add a
description if you want to. If this computer already exists in your ERA directory, you will be notified and can decide
what to do with the duplicate. The available options are: Deploy Agent, Skip, Retry, Move, Duplicate or Cancel. Once
the computer is added, a pop-up window will open with an option to Deploy Agent.
If you click Add all displayed items a list of computers to be added will be displayed. Click X next to the name of a
specific computer if you do not want to include it in your ERA directory at this time. When you are finished removing
computers from the list, click Add. After clicking Add, select the action to take when a duplicate is found (allow for a
slight delay depending on the number of computers in your list): Skip, Retry, Move, Duplicate or Cancel. Once you
have selected an option, a pop-up window listing all added computers will open with an option to Deploy Agents on
those computers.
The results of the RD Sensor scan are written to a log file called detectedMachines.log. It contains a list of
discovered computers on your network. You can find the detectedMachines.log file here:
18
Windows
C:\ProgramData\ESET\Rouge Detection Sensor\Logs\detectedMachines.log
Linux
/var/log/eset/RogueDetectionSensor/detectedMachines.log
You can check the status log on the client machine C:\ProgramData\ESET\RemoteAdministrator\Agent\Logs
\status.html to make sure ERA Agent is working properly.
2. Enter the server hostname or IP address and select the ERA Certification Authority that you created during initial
installation. Enter the Certification Authority passphrase that you created during Server Installation when
prompted for the certificate password.
20
3. Click Get Installers to generate links for Windows, Linux and MAC Agent installer files.
4. Click the Download link next to the installer file(s) that you want to download and save the zip file. Unzip the file
on the client computer where you want to deploy ERA Agent and run EraAgentOnlineInstaller.bat (Windows)
or EraAgentOnlineInstaller.sh script (Linux and Mac) to run the installer. How to deploy the ERA Agent on a
MAC OS X client using the Agent Live Installer see our KB article.
NOTE: If you are running the script on Windows XP SP2, you need to install Microsoft Windows Server 2003
Administration Tools Pack. Otherwise, the Agent Live Installer won't run properly. Once you have installed the
Administration Pack, you can run the Agent Live Installer script.
You can check the status log on the client machine C:\ProgramData\ESET\RemoteAdministrator\Agent\Logs
\status.html to make sure ERA Agent is working properly. If there are problems with the Agent (for example, it is
not connecting to the ERA Server) see troubleshooting.
If you want to deploy ERA Agent using Agent Live Installer from your local shared folder without ESET Repository
Download Server, follow these steps:
1. Edit the EraAgentOnlineInstaller.bat file (Windows) or EraAgentOnlineInstaller.sh script (Linux and Mac).
2. Change lines 28 and 30 to point to the correct local download files. For example:
with !url!
21
Specify the method used for connection to Remote Administrator Server: ERA Server or ERA Proxy Server and ERA
Web Console port and enter your ERA Web Console login credentials: Username and Password.
22
Click Choose custom Static Group and select the Static Group to which the client computer will be added using the
drop-down menu.
23
2. Offline installation:
To perform an Offline installation, enter 2222 in the Server port field, select Offline installation and click Next. For
this method you must specify a Peer certificate and Certification Authority.
For more information about how to export and use a Peer certificate and Certification Authority click here.
NOTE: You can check the status log on a client machine (located at C:\ProgramData\ESET\RemoteAdministrator
\Agent\EraAgentApplicationData\Logs\status.html or C:\Documents and Settings\All Users\Application Data\Eset
\RemoteAdministrator\Agent\EraAgentApplicationData\Logs\status.hmtl) to make sure the ERA Agent is working
properly. If there are problems with the Agent (for example, if it is not connecting to the ERA Server) see
troubleshooting.
24
Basic
25
Enter basic information about the task, such as the Name, Description (optional) and Task Type. The Task Type
defines the settings and behavior of the task.
26
Settings
o Automatic resolution of suitable ERA Agent - If you have multiple operating systems (Windows, Linux, Mac OS)
in your network, select this option and this task will automatically find the appropriate server-compatible Agent
installation package for each system.
o Targets - Click this to select the clients that will be the recipients of this task.
o Username/Password - The username and the password for the user with sufficient rights to perform a remote
installation of the agent.
o Server hostname (optional) - You can enter a server hostname if it is different on the client side and the server
side.
o Peer certificate/ERA Certificate - This is the security certificate and certification authority for the agent
installation. You can select the default certificate and certification authority, or use custom certificates. For
more information, see the Certificates chapter.
o Custom certificate - If you use a custom certificate for authentication, navigate to the certificate and select it
when installing the Agent.
o Certificate passphrase - Password for the certificate, either the password you entered during Server installation
(in the step where you created a certification authority) or the password for your custom certificate.
NOTE: ERA Server can select the appropriate ERA Agent installation package for operating systems automatically.
To choose a package manually, deselect Automatic resolution of suitable Agent and then choose the package you
want to use from the list of available Agents in ERA repository.
Target
The Target window allows you to specify the clients (individual computers or groups) that are the recipients of this
task. Click Add Targets to display all Static and Dynamic Groups and their members.
27
28
ERA Agent and the eraagent.service will be installed in the following location:
/opt/eset/RemoteAdministrator/Agent
Installation parameters
Attribute
Description
--skip-license
--cert-path
--cert-auth-path
--cert-password
--hostname
Connection to the server (or proxy) in one of the following formats: hostname,
IPv4, IPv6 or SRV record
--port
Listening port - both for the Server and the Proxy (2222)
NOTE: When you use a certificate that you created, signed by an authority other than the ERA Certification
Authority, it is necessary to leave the parameter --cert-auth-path out of the installation script, because the other
Certification Authority is already installed on your Linux OS (and also on your Server computer).
NOTE: Should you experience problems when deploying ERA Agent remotely (the Server task Agent deployment
ends with a Failed status) see the Troubleshooting guide.
You can check the status log on the client machine /var/log/eset/RemoteAdministrator/Agent/trace.log or /var/log/
eset/RemoteAdministrator/Agent/status.html to make sure ERA Agent is working properly.
29
The latest ERA Server log file can be found here: C:\ProgramData\ESET\RemoteAdministrator\Server
\EraServerApplicationData\Logs\trace.log
The latest ERA Agent log file can be found here:
C:\ProgramData\ESET\RemoteAdministrator\Agent\EraAgentApplicationData\Logs
C:\Documents and Settings\All Users\Application Data\ESET\RemoteAdministrator\Agent\EraAgentApplicationData
\Logs
To enable full logging, create a dummy file named traceAll without an extension in the same folder as a trace.log.
Restart the ESET Remote Administrator Server service, this will enable full logging into trace.log file.
NOTE: In case of ERA Agent connection problems, see Troubleshooting - Agent connection for more information.
If the installation failed with error 1603, check ra-agent-install.log file. It can be found here: C:\Users\%user%
\AppData\Local\Temp\ra-agent-install.log on the target computer.
2. The table below contains several reasons Agent deployment can fail:
Error message
Could not connect
Access denied
Possible cause
Client is not reachable on the network
Client's host name could not be resolved
Firewall blocks communication
Ports 2222 and 2223 are not open in firewall (on both client and server side)
No password set for administrator account
Insufficient access rights
ADMIN$ administrative share is not available
IPC$ administrative share is not available
Use simple file sharing is enabled
Link to the repository is incorrect
Repository is unavailable
Repository doesnt contain required package
31
o IPC$ administrative share is not available - verify that the client can access IPC by issuing the following from a
command prompt on the client:
net use \\servername\IPC$
32
33
34
6. Click Property.
35
7. Right-click anywhere in the list of property values and select Add Row from the context menu.
8. Add the property P_HOSTNAME and type the hostname or IP address of your ERA Server into the Value field.
9. Repeat steps 7 and 8 to add the property P_PORT, where the value is the port used to connect to your ERA Server
(2222) by default.
10. For ERA Agent, insert the Peer certificate ( .pfx) signed by your Certification Authority stored in ERA Server's
database. Insert the Public key of the Certification Authority ( .der file) which was used to sign your ERA Server
Peer certificate.
There are two ways to insert certificates:
1. You can insert the contents of the certificate and public key encoded in Base64 format (no certificate files will be
needed).
In ERA Web Console, navigate to to Admin > Certificates > Peer Certificate, click Agent Certificate and choose
Export as Base64...
Navigate to Admin > Certificates > Certification Authorities, click ERA Certification Authority and choose
Export
Public Key as Base64
Add the contents of the exported certificate and public key into the Property table in Orca using the following
property names:
Property name
Value
P_CERT_CONTENT
P_CERT_PASSWORD
<password for the peer certificate (dont add this when password is empty)>
P_CERT_AUTH_CONTENT
P_CERT_AUTH_PASSWORD
<password for the Certificate Authority (dont add this when password is empty)>
36
New properties will be highlighted in green, click Transform and select Generate transform... to create a .mst file.
2. You can download the certificate files and make them accessible from the target machine. Export the Agent Peer
Certificate and Public Key file from Certification Authority of ERA Server and place them into a folder accessible
from the target machine where ERA Agent will be installed.
Go to Admin > Certificates > Peer Certificate, click Agent Certificate and choose
Export...
Go to Admin > Certificates > Certification Authorities, click Certification Authority and choose
Use the exported files and add their path into the Properties table with Orca using following property names:
37
Property name
Value
P_CERT_PATH
<path to the exported .pfx certificate> (specify path to the certificate file including
extension)
P_CERT_PASSWORD
<password for the .pfx certificate (dont add this when password is empty)>
P_CERT_AUTH_PATH
P_CERT_AUTH_PASSWORD
<password for the Certificate Authority (dont add this when password is empty)>
The added properties will be highlighted in green, click Transform and select Generate transform... to create a
.mst file.
Command (if you generated a transform file with the name AgentSettings): msiexec
/i Agent-
To create a log from the installation run this command instead: msiexec
/i Agent-6.1.265.0_x64.msi /qn
4. Use an existing Group Policy Object or create a new one (right-click GPO and click New). In the GPMC (Group
Policy Management Console) tree, right-click the GPO you want to use and select Edit...
38
5. In Computer Configuration, navigate to Policies > Software Settings > Software Settings.
6. Right-click Software installation, select New, and click Package... to create a new package configuration.
7. Browse to the location of the ERA Agent .msi file. In the Open dialog box, type the full Universal Naming
Convention (UNC) path of the shared installer package that you want to use. For example \\fileserver\share
\filename.msi
39
NOTE: Make sure that you use the UNC path of the shared installer package.
9. This will allow you to configure deployment options. Select the Modifications tab and browse for the ERA Agent
Installer transform .mst file.
40
NOTE: The path must point to the same shared folder as the one used step 7.
10. Confirm the package configuration and proceed with GPO deployment.
41
4. Open SCCM console and click Software Library. In Application Management right-click Applications and choose
Create Application. Choose Windows Installer (*.msi file) and locate the source folder where you saved the ERA
Agent installer .msi file.
42
5. Specify all required information about the application and click Next.
43
6. Right-click the ESET Remote Administrator Agent Application, click the Deployment Types tab, select the only
deployment there and then click Edit.
44
7. Click the Programs tab and edit the Installation program field so that it reads msiexec/iAgent_x64.msi/qn
TRANSFORMS="Agent_x64.mst (if you are using 32-bit packages, this string will vary slightly as "x32" will appear
where "x64" does in the example).
8. Edit the Uninstall program field so that it reads msiexec/x {424F1755-2E58-458F-8583-4A2D08D8BBA8} /qn /
norestart.
45
9. Click the Requirements tab and then click Add. Select Operating system from the Condition drop-down menu,
select One of from the Operator drop-down menu and then specify the operating systems you will install to by
selecting the appropriate check box(es). Click OK when you are finished and then click OK to close any remaining
windows and save your changes.
46
47
10. In the System Center Software Library, right-click your new application and select Distribute Content from the
context menu. Follow the prompts in the Deploy Software Wizard to complete deployment of the application.
48
49
11. Right-click the application and choose Deploy. Follow the wizard and choose the collection and destination
where you want to deploy the agent.
50
51
52
53
54
55
56
57
Basic
Enter Basic information about the task, such as the Name, optional Description and the Task Type. The Task Type
(see the list above) defines the settings and the behavior for the task.
Target
IMPORTANT: A Client Task must be defined before you can assign it to targets. First, configure the task under
Settings and click Finish. You will then be able to assign targets and configure any Triggers you want to use for this
task.
58
Settings
Click <Choose ESET License> and select the appropriate license for the installed product from the list of available
licenses. Select the check box next to I agree with application End User License Agreement if you agree. See License
Management or EULA for more information.
Click <Choose package> to select an installer package from the repository, or specify a package URL. A list of
available packages where you can select the ESET product you want to install (for example, ESET Endpoint Security)
will be displayed. Select your desired installer package and click OK. If you want to specify an installation package
URL, type or copy and paste the URL (for example file://\\pc22\install\ees_nt64_ENU.msi) into the text field (do not
use a URL that requires authentication).
http://server_address/ees_nt64_ENU.msi - If you are installing from a public web server or from your own HTTP
server.
file://\\pc22\install\ees_nt64_ENU.msi - if you are installing from a network path.
file://C:\installs\ees_nt64_ENU.msi - if you are installing from a local path.
NOTE: Please note that both ERA Server and ERA Agent must have access to the internet to access the repository
and complete the installation. If you do not have internet access, you can install the client software locally.
If you need to, you can specify Installation parameters, otherwise leave this field empty. Select the check box next
to Automatically reboot when needed to force an automatic reboot of the client computer after installation.
Alternatively, you can leave this option unchecked and the decision to restart can be made by someone using the
client computer.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a dialog box will
open. We recommend that you click Create Trigger to specify when this Client Task should be executed and on what
Targets. If you click Close, you can create a Trigger later on.
59
APPDIR=C:\ESET\ ADDLOCAL=DocumentProtection
APPDATADIR=<path>
o path - Valid directory path.
o Application Data installation directory.
MODULEDIR=<path>
o path - Valid directory path.
o Module installation directory.
ADDEXCLUDE=<list>
o The ADDEXCLUDE list is a comma-separated list of all feature names not to be installed, as a replacement for the
obsolete REMOVE.
o When selecting a feature not to install, then the whole path (i.e., all its sub-features) and related invisible
features must be explicitly included in the list.
o For example: ees_nt64_ENU.msi /qn ADDEXCLUDE=Firewall,Network
NOTE: The ADDEXCLUDE cannot be used together with ADDLOCAL.
ADDLOCAL=<list>
o Component installation - list of non-mandatory features to be installed locally.
o Usage with ESET .msi packages: ees_nt64_ENU.msi /qn ADDLOCAL=<list>
o For more information about the ADDLOCAL property see http://msdn.microsoft.com/en-us/library/aa367536%
28v=vs.85%29.aspx
Rules
o The ADDLOCAL list is a comma separated list of all feature names to be installed.
o When selecting a feature to install, the whole path (all parent features) must be explicitly included in the list.
o See additional rules for correct usage.
Feature Presence
o Mandatory - the feature will always be installed.
o Optional - the feature can be deselected for install.
o Invisible - logical feature mandatory for other features to work properly.
o Placeholder - feature with no effect on the product, but must be listed with sub-features.
Feature tree of Endpoint 6.1 is following:
Feature tree
Feature Name
Feature Presence
Computer
Computer / Antivirus and antispyware
Computer
Antivirus
Mandatory
Mandatory
60
RealtimeProtection
Mandatory
Scan
DocumentProtection
Mandatory
Optional
DeviceControl
Network
Firewall
WebAndEmail
ProtocolFiltering
WebAccessProtection
EmailClientProtection
MailPlugins
Antispam
Optional
Placeholder
Optional
Placeholder
Invisible
Optional
Optional
Invisible
Optional
WebControl
UpdateMirror
MicrosoftNAP
Optional
Optional
Optional
Additional rules
o If any of the WebAndEmail feature/s are selected to be installed, the invisible ProtocolFiltering feature must
be included in the list.
o If any of the EmailClientProtection sub-features/s is selected to be installed, the invisible MailPlugins feature
must be explicitly included in the list
Examples:
ees_nt64_ENU.msi /qn ADDLOCAL=WebAndEmail,WebAccessProtection,ProtocolFiltering
ees_nt64_ENU.msi /qn ADDLOCAL=WebAndEmail,EmailClientProtection,Antispam,MailPlugins
63
Type the name of the computer you want to add into the Name field. Use the Conflict Resolution drop-down menu
to select the action to take if a computer you are adding already exists in ERA:
o Ask when conflicts are detected: When a conflict is detected, the program will ask you to select an action (see
the options below).
o Skip conflicting computers: Duplicate computers will not be added.
o Move conflicting computers from other groups: Conflicting computers will be moved from their original groups
to the All group.
o Duplicate conflicting computers: New computers will be added, but with different names.
64
o Click + Add Another to add additional computers. Alternatively, click Import to upload a .csv file containing a list
of computers to add. Optionally, you can enter a Description of the computers. Click Add when you are finished
making changes.
NOTE: Adding multiple computers may take a longer time, reverse DNS lookup may be preformed.
Computers can be viewed in the list on the right when you select the group they belong to. Once the computer is
added, a pop-up window will open with the option to Deploy Agent.
Choose the deployment type you want to use from the available options:
65
See our examples with illustrated step-by-step instructions for samples of how to use Dynamic Groups on your
network.
66
3. Click Admin > Groups > Click the Group button and click New Dynamic Group...
A New Dynamic Group Wizard will appear. For more use-cases how to create new Dynamic Group with rules for
Dynamic Group template.
67
Basic
Enter a Name for the new policy (for example "Agent Connection Interval"). The Description field is optional.
Settings
Select ESET Remote Administrator Agent from the Product drop-down menu.
68
Connection
Select a category in the tree on the left. In the right pane, edit settings as required. Each setting is a rule for which
you can set a flag. To make navigation easier, all rules are counted. The number of rules you have defined in a
particular section will be displayed automatically. Also, you'll see a number next to a category name in the tree on
the left. This shows a sum of rules in all its sections. This way, you'll quickly see where and how many settings/rules
are defined.
You can also use these suggestions to make policy editing easier:
o use
to set Apply flag to all item in current a section
o delete rules using Trashcan icon
Click Change interval.
In the Regular interval field, change the value to your preferred interval time (we recommend 60 seconds) and click
Save.
Once you've created a new Agent Connection Interval policy, assign it to the Static Group you created in step 1.
69
After you are finished with mass deployment testing, edit the ERA Agent Connection Interval policy settings you
created in step 2.
Click Admin > Groups and select the Policies tab. Click Agent Connection Interval policy, choose Edit and then click
Settings > Connection. Click Change Interval and set the connection interval to 20 minutes.
70
In the Policy application order window click Add Policy. Select the check box next to the policy that you want to
assign to this group and click OK.
Click Save. To see what policies are assigned to a particular group, select that group and click the Policies tab to view
a list of policies assigned to the group.
NOTE: For more information about policies, see the Policies chapter.
71
2.8 Dashboard
Dashboard is the default page that is displayed after the user logs into the ERA Web Console for the first time. It
displays pre-defined reports about your network. You can switch between dashboards using the tabs in the top
menu bar. Each dashboard consists of several reports. You can customize your dashboards by adding reports,
modifying existing ones, resizing, moving and re-arranging them. All this gives you a comprehensive overview of
ESET Remote Administrator and its parts (clients, groups, tasks, policies, users, competences, etc.). Four dashboards
come pre-configured in ESET Remote Administrator:
Computers
This dashboard gives you an overview of client machines - their protection status, operating systems, update status,
etc.
Remote Administrator Server
In this dashboard, you can view information about the ESET Remote Administrator server itself - server load, clients
with problems, CPU load, database connections, etc.
Antivirus threats
Here you can see reports from the antivirus module of the client security products - active threats, threats in the last
7/30 days and so on.
Firewall threats
Firewall events of the connected clients - according to their severity, time of reporting, etc.
ESET applications
This dashboard lets you view information about installed ESET applications.
Dashboard functionality:
72
Change Chart Type - click the Chart symbol at the top left corner of a chart and select Pie Chart, Line Chart etc. to
change the chart type.
Click Refresh to refresh the displayed information.
Click Change to view a different report.
Click Edit report template to add or edit a template.
Click Set Refresh interval to define how often the data in a report is refreshed. The default refresh interval is 120
seconds.
Rename/Remove the report.
73
74
Basic
Edit the Basic information about the Template. Review or change the Name, Description and a Category. This
information is pre-defined according to the selected Report type.
Chart
75
In the Chart section, select the Report type. In this example, we leave the Display Table option empty and select
the Display Chart option.
NOTE: Every selected chart type will be displayed in the Preview section. This way, you can see what the report
will look like in real-time.
Selecting a Chart gives you multiple options. For a better overview, we select the Stacked Line Chart type. This chart
type is used when you want to analyze data with different units of measure.
Optionally, you can define a title for the X and Y axis of the chart to make reading the chart and identifying trends
easier.
Data
In the Data section, we enter the information to be displayed on the X and Y axis of the chart. Clicking the respective
symbols opens a window with options. The choices available for the Y axis always depend on the information
selected for the X axis and vice versa, because the chart displays their relation and the data must be compatible.
For the X axis, we select Computer > Computer name to determine what computers are sending spam. The Format
will be set to Value > Absolute. Color and Icons are set by the administrator.
76
For the Y axis, we select Installed software > Size in MB to determine the absolute number of the spam messages.
The Format will be set to Value > Absolute. Color and Icons are set by the administrator.
Sorting
Add sorting to define the relation between the selected data. Select the starting information and then the method,
either Ascending or Descending. It is also possible to sort the data by both options (shown above).
Filter
Options displayed here depend on the settings configured earlier (information for the X and Y axis). Select an
option and a mathematical function to determine how the data will be filtered. For this example, we selected
Installed Software and Application name > is equal to > ESS and Installed Software. Size in MB > is greater than > 50.
Summary
77
In the Summary, review the selected options and information. If they are to your satisfaction, click Finish to create a
Report template.
NOTE: This setting only applies to the user who is currently logged on. Each user can have their own preferred
time settings for ERA Web Console. User-specific time settings are applied to that user regardless of where they
access ERA Web Console from.
IMPORTANT: In some cases, the option to use a different time zone (for example, the local time of a client on
which ERA is running) will be made available. This setting can be particularly pertinent when configuring triggers.
When this option is available, it is indicated in ERA Web Console and you will be able to choose weather to Use local
time or not.
78
2.9 Computers
All client computers that were added to ESET Remote Administrator are shown here and are divided into Groups.
Clicking on a group from the list (on the left) will display the members (clients) of this group in the right pane. You
can filter the clients using the filters at the top of the page, clicking Add Filter shows the available filtering criteria.
There are also a few pre-defined filters that are quickly accessible:
Four icons that let you filter by severity (red - Errors, yellow - Warnings, green - Notices and gray - Unmanaged
computers). The severity icon represents the current status of your ESET product on a particular client computer.
You can use a combination of these icons by turning them on or off. For example, to see only the computers with
warnings, leave only the yellow icon on (the rest if the icons must be turned off). To see both warnings and errors,
leave only these two icons on.
Subgroups check box - show subgroups of the currently selected group.
Unmanaged computers (clients on the network that do not have the ERA Agent or a ESET security product
installed) usually appear in the Lost & Found group.
Using the drop-down menu below the filters, you can limit the displayed clients (computers). There are a few
categories:
All Devices from the drop-down menu to see all the client computers again, without limiting (filtering) displayed
clients. You can use a combination of all the above filtering options when narrowing down the view.
ESET Protected (protected by an ESET product)
Remote Administrator (individual ERA components such as Agent, RD Sensor, Proxy, etc.)
Other (Shared Local Cache, Virtual Appliance). When you make your selection, only the respective clients will be
displayed.
NOTE: In case you are not able to find a particular computer in the list and know it is in your ERA infrastructure,
make sure that all filters are turned off.
icon) to can create Static or Dynamic Group, create New task or select from other
79
Details...
Basic (Name, Parent Group, Device, OS Information, etc.)
Configuration (Configuration, Applied Policies, etc.)
SysInspector - displays SysInspector log Viewer, you need to run SysInspector log request Client Task to see the
output.
Task Executions (Occurred, Task Name, Task Type, Status, etc.)
Installed Applications (Name, Vendor,Version, Agent supports uninstall, etc.)
Alerts (Problem, Status, etc.)
Threats and Quarantine (All Threat Types, Muted, Cause, Threat Name, Threat Type, Object Name, Hash, etc.)
Delete
This will remove the client from the list, but as long as it is in the network it will appear in the Lost & Found group.
Move...
You can move the client to a different group, selecting this option displays a list of available groups.
Rename multiple items
Lets you make a bulk change of computer names shown in ERA Web Console. For example, if displayed name is
john.hq.company.com, type hq\.company into Search for (Regex) field and company into Replace with. Click
Rename button and computers will show up in ERA Web Console as john.eset.com.
Manage Policies...
A Policy can also be assigned directly to a client (multiple clients), not just a group. Select this option to assign the
policy to selected client(s).
Send Wake-Up Call
ERA Server initiates immediate communication with the ERA Agent on a client machine. This useful when you do
not want to wait for the regular interval when the ERA Agent connects to the ERA Server. For example when you
want a Client Task to be run immediately on client(s) or if you want a Policy to be applied right away.
NOTE: When you make a change and want it to be applied, wait about one minute before using Wake-Up Call.
Deploy Agent...
With this option, you can create a New Server Task.
Deactivate Products
When you use this option, a license will be deactivated (for selected client computer) within ESET License
Administrator. ESET security product running on a client computer will find out that the license has been
deactivated next time it connects to the Internet. The advantage of this is that you can deactivate license even for
computers which are no longer managed by ERA.
80
Type the name of the computer you want to add into the Name field. Use the Conflict Resolution drop-down menu
to select the action to take if a computer you are adding already exists in ERA:
o Ask when conflicts are detected: When a conflict is detected, the program will ask you to select an action (see
the options below).
o Skip conflicting computers: Duplicate computers will not be added.
o Move conflicting computers from other groups: Conflicting computers will be moved from their original groups
to the All group.
o Duplicate conflicting computers: New computers will be added, but with different names.
o Click + Add Another to add additional computers. Alternatively, click Import to upload a .csv file containing a list
of computers to add. Optionally, you can enter a Description of the computers. Click Add when you are finished
making changes.
81
NOTE: Adding multiple computers may take a longer time, reverse DNS lookup may be preformed.
Computers can be viewed in the list on the right when you select the group they belong to. Once the computer is
added, a pop-up window will open with the option to Deploy Agent.
Choose the deployment type you want to use from the available options:
82
2.10 Threats
The Threats section gives you an overview of all threats found on computers in your network. On the left side, the
group structure is displayed. Here you can browse groups and view threats on members of a given group. Select the
All group and use the All threats types filter to display all threats found on clients in all groups.
Filtering threats
By default, all threat types from the last 7 days are shown. To add multiple filtering criteria, click Add filter and
select an item from the list - you can filter the results by Computer Muted, Threat Resolved, Name (name of the
threat), Cause (cause of the threat) or the IPv4/IPv6 address of the client that reported this threat. By default, all
threat types are displayed, but you can filter by Anti-virus, Firewall and HIPS threats for a more specific view.
83
On-demand scan
Using this option will run the On Demand Scan task on the client that reported the threat.
Mark as resolved / Marked as Not Resolved
Threats now can be Marked as resolved in the Threats section or under details for a specific client.
Mute
Selecting mute on a specific threat mutes this threat (not the client). This report will no longer be displayed as
active. You can also choose to mute the client (select Mute from the context menu on the threat) that reported this
threat.
Table columns:
Resolved, Object, Process Name, Description, User, Computer Description, Action details, Restart required, Scanner,
Object type, Circumstances, Number of Occurrences, Source Address, Source Port, Target Address, etc.
84
2.11 Reports
Reports allow you to access and filter data from the database in a convenient way. Reports are divided into
categories, each category includes a short description. Click Generate Now at the bottom of the page to create a
report based on a selected template and then display this report.
You can use predefined report templates from the list of Categories & Templates, or you can create a new report
template with custom settings. Click Create a new report template to view settings for each report in detail and
specify custom settings for a new report.
Selecting a report will bring up the Actions context menu, which appears after clicking Report Templates at the
bottom of the page. The following options are available:
Generate now...
Select a report from the list and navigate to Report Templates > Generate Now..., or click Generate now.... The
report will be generated and you can review the output data.
New Category...
Enter a Name and a Description to create a new Report Template category.
New Report Template...
Create a new custom Report Template.
Edit...
Edit an existing Report Template. The same settings and options used for creating a new Report Template apply.
Duplicate
Lets you create a new report based on the selected report, a new name is required for the duplicate.
Delete
Remove the selected report template completely.
Import...d
Select Report Template from the list, click Report Templates > Import, click Choose file and then browse to the file
you want to Import.
85
Export...
Select Report template you want to export from the list and click Report Templates > Export. The Report
Template(s) will be exported to a .dat file. To export multiple Report templates, change the select mode, (see
Modes below). You can also export whole Template category including all its Report Templates.
You can use Modes to change select mode (Single or Multiple). Clicking the arrow in upper right corner and choose
from the context menu:
Single select mode - you can select single item.
Multiple item select mode - lets you use the check boxes to select multiple items.
Refresh - reloads/refreshes displayed information.
NOTE: The Export... feature exports selected Report template, which can then be imported to another ERA Server
using Import. This is useful, for example, when you want to migrate your custom report templates to another ERA
Server.
IMPORTANT: The
Import / Export feature is designed for importing and exporting Report Templates only,
not an actual generated report with data.
Basic
Edit the Basic information about the Template. Enter a Name, Description and Category. This can be either a predefined Category, or you can create a new one (use the New Category option described in the previous chapter).
86
Chart
In the Chart section, select the Report type. Either a Table, where the information is sorted in rows and columns, or
a Chart, that represents data using an X and Y axis.
NOTE: The selected chart type will be displayed in the Preview section. This way, you can see what the report will
look like in real-time.
Selecting a Chart gives you multiple options:
Bar chart - A chart with rectangular bars proportional to the values they represent.
Dots bar chart - In this chart, dots are used to display quantitative values (similar to a bar chart).
Pie chart - A pie chart is a circular chart divided into proportional sectors, representing values.
Doughnut chart - Similar to a pie chart, but the doughnut chart can contain multiple types of data.
Line chart - Displays information as a series of data points connected by straight line segments.
Simple line chart - Displays information as a line based on values without visible data points.
Stacked line chart - This chart type is used when you want to analyze data with different units of measure.
Stacked bar chart - Similar to a simple bar chart, but there are multiple data types with different units of measure
stacked in the bars.
Optionally, you can enter a title for the X and Y axis of the chart to make it easier to read the chart and recognize
trends.
87
Data
In the Data section, select the information you want to display:
a. Table Columns: Information for the table is added automatically based on the selected report type. You can
customize the Name, Label and Format (see below).
b. Chart Axes: Select the data for the X and the Y axis. Clicking the respective symbols opens a window with
options. The choices available for the Y axis always depend on the information selected for the X axis and vice
versa, because the chart displays their relation and the data must be compatible. Select the desired
information and click OK.
You can change the Format in which the data is displayed to any of the following:
Data Bar (only for the bar charts) / Value / Color / Icons
Sorting
Add Sorting to define the relation between the selected data. Select the starting information (sorting value) and
sorting method, either Ascending or Descending. This will define the outcome displayed in the chart.
Filter
Next, define the filtering method. Select the filtering value from the list and its value. This defines what
information will be displayed in the chart.
Summary
In the Summary, review the selected options and information. If they are to your satisfaction, click Finish to create a
new report template.
Every report in the dashboard has its own options for customization - click the wheel symbol in the upper right
corner to view them. Here, you can Refresh the displayed information, Change to a different report, Edit the report
template (see options above), set a new Refresh interval that defines how often the data in this report is refreshed
or Rename/Remove the report. Using the arrows in the symbol below, you can customize the size of the report. You
can make more relevant reports larger, less relevant reports smaller and so on. Click toggle fullscreen to view a
report in fullscreen mode.
88
89
90
Open
91
Short Description
Passcode
Requires end-users to protect their devices with passcodes each time they return from idle
state. This ensures that any sensitive corporate information on managed devices remains
protected. If multiple profiles enforce passcodes on a single device, the most restrictive
policy is enforced.
Restrictions
Restriction profiles limit the features available to users of managed devices by restricting
the use of specific permission related to Device functionality, Application, iCloud, Security
and Privacy.
Wi-Fi profiles push corporate Wi-Fi settings directly to managed devices for instant access.
VPN profiles push corporate virtual private network settings to corporate devices so that
users can securely access corporate infrastructure from remote locations. Connection Name
- View the name of the connection displayed on the device.
Connection type - Choose the type of connection enabled by this profile. Each connection
type enables different capabilities.
Server - Enter the hostname or IP address of the server being connected to.
92
Mail Accounts
Exchange ActiveSync
Accounts
CalDAV - Calendar
Accounts
CalDAV provides configuration options to allow end-users to sync wirelessly with the
enterprise CalDAV server.
CardDAV - Contacts
Accounts
Subscribed Calendars
Accounts
93
4. Admin
The Admin section is the main configuration component of ESET Remote Administrator. This section contains all the
tools that administrator can use to manage client security solutions, as well as the ERA Server settings. You can use
Admin tools to configure your network environment in such a way that it won't require a lot of maintenance. Also,
you can configure notifications and dashboards which will keep you aware of the status of your network.
In this section
Post Installation Tasks
Dynamic Group Templates
Groups
User Management
Policies
Client tasks
Server tasks
Triggers
Notifications
Certificates
Access Rights
Server Settings
License Management
4.1 Groups
Groups allow you to manage and categorize computers. You can then easily apply different settings, tasks or
restrictions to client computers based on their presence in a particular group. You can use pre-defined groups and
group templates or create new ones.
There are two types of client groups:
Static Groups
Static Groups are groups of select client computers (members). Group members are static and can only be added/
removed manually, not based on dynamic criteria. A computer can only be present in one Static Group.
Dynamic Groups
Dynamic Groups are groups of clients where membership in the group is determined by specific criteria. If a client
does not fulfill that criteria, it will be removed from the group. Computers that satisfy the criteria will be added to
the group automatically.
The Groups window is divided into three sections:
1. A list of all groups and their subgroups is displayed on the left. You can select a group and an action for this group
from the context menu ( next to the group name). The options are the same as described below (Group actions
button).
2. Details for the selected group are shown on the right pane (you can switch between tabs):
94
Manage Policies...
Assign a Policy for the selected group.
3. Click Admin > Groups > select a Static Group and click Group.
96
Basic
Enter a Name and Description (optional) for the new Static Group. By default, the parent group is the group you
selected when you started creating the New Static Group. If you want to change its parent group, click Change
Parent Group and select a parent group from the tree. The parent of the New Static Group must be a Static Group.
This is because it is not possible for a Dynamic Group to have Static Groups. Click Finish to create the New Static
Group.
97
3. Click Admin > Groups > Click the Group button and click New Dynamic Group...
98
A New Dynamic Group Wizard will appear. For more use-cases how to create new Dynamic Group with rules for
Dynamic Group template.
The same can be done from Computers, select Static or Dynamic and click
window will open.
>
New task
99
100
In the Policy application order window click Add Policy. Select the check box next to the policy that you want to
assign to this group and click OK.
Click Save. To see what policies are assigned to a particular group, select that group and click the Policies tab to view
a list of policies assigned to the group.
NOTE: For more information about policies, see the Policies chapter.
101
See our examples with illustrated step-by-step instructions for samples of how to use Dynamic Groups on your
network.
102
Click Save as if you want to keep your existing template and create a new one based on the template you are
editing. Specify the name for your new template.
103
Summary
Review the configured settings and click Finish to create the template. This new template will be added to the list
of all templates, and can be used later to create a new Dynamic Group.
104
Summary
Review the configured settings and click Finish to create the template. This new template will be added to the list
of all templates, and can be used later to create a new Dynamic Group.
105
Summary
Review the configured settings and click Finish to create the template. This new template will be added to the list
of all templates, and can be used later to create a new Dynamic Group.
106
4.1.6.3.4 Dynamic Group - a specific version of a software is not installed but other version exists
This Dynamic Group can be used to detect software that is installed but with different version than you are
requesting. This group is useful because you will be able to execute upgrade tasks on those machines where the
required version is missing. Different operators can be used but make sure that version testing is done with negated
operator.
Click New Template under Admin > Dynamic Group Templates.
Basic
Enter a Name and a Description for the new Dynamic Group template.
Expression
Select a logical operator in the Operation menu: AND (All conditions have to be true).
Click + Add Rule and select a condition:
o Installed software > Application name > = (equals) > "ESET Endpoint Security"
o Installed software > Application version >
> "6.2.2033.0"
Summary
Review the configured settings and click Finish to create the template. This new template will be added to the list
of all templates, and can be used later to create a new Dynamic Group.
107
Summary
Review the configured settings and click Finish to create the template. This new template will be added to the list
of all templates, and can be used later to create a new Dynamic Group.
108
4.1.6.3.5.1 Dynamic Group - installed but not activated version of server security product
This Dynamic Group can be used to detect inactive server products. Once these products are detected, you can
assign a Client Task to this group to activate client computers with proper license. In this example only EMSX is
specified, but you can specify multiple products.
Click New Template under Admin > Dynamic Group Templates.
Basic
Enter a Name and a Description for the new Dynamic Group template.
Expression
Select a logical operator in the Operation menu: AND (All conditions have to be true).
Click + Add Rule and select a condition:
o Computer > Managed products mask > in > "ESET protected: Mail Server"
o Functionality/Protection problems > Source > = (equals) > "Security product"
o Functionality/Protection problems > Problem > = (equals) > "Product not activated"
Summary
Review the configured settings and click Finish to create the template. This new template will be added to the list
of all templates, and can be used later to create a new Dynamic Group.
You can create Static Groups in the Group section of the Admin tab by clicking the Groups button and selecting New
Static Group.
110
next
111
Delete
Removes the selected group completely.
Type the name of the computer you want to add into the Name field. Use the Conflict Resolution drop-down menu
to select the action to take if a computer you are adding already exists in ERA:
o Ask when conflicts are detected: When a conflict is detected, the program will ask you to select an action (see
the options below).
o Skip conflicting computers: Duplicate computers will not be added.
o Move conflicting computers from other groups: Conflicting computers will be moved from their original groups
to the All group.
o Duplicate conflicting computers: New computers will be added, but with different names.
112
o Click + Add Another to add additional computers. Alternatively, click Import to upload a .csv file containing a list
of computers to add. Optionally, you can enter a Description of the computers. Click Add when you are finished
making changes.
NOTE: Adding multiple computers may take a longer time, reverse DNS lookup may be preformed.
Computers can be viewed in the list on the right when you select the group they belong to. Once the computer is
added, a pop-up window will open with the option to Deploy Agent.
Choose the deployment type you want to use from the available options:
113
2. Click the Group button at the bottom (a context menu will pop-up).
3. Select Export.
4. The file will be saved in .txt format.
NOTE: Dynamic Groups cannot be exported because Dynamic Groups are only links to computers according to the
criteria defined in Dynamic Group Templates.
114
115
Template
You can either select an existing Dynamic Group template or create a new Dynamic Group template.
116
Summary
Review the configuration to make sure it is correct (if you need to make changes, you can still do so) and click Finish.
Alternatively, the New Dynamic Group... is accessible from Admin > Groups. Select a group (in the Groups pane) and
click Group at the bottom.
A Dynamic Group Wizard will appear. Enter a Name and Description (optional) for the new template. Users can also
change the parent group by clicking Change parent group.
117
Select Dynamic Group Template from the pre-defined templates or select a template you have already created.
Click Choose from existing and select the appropriate template from the list. If you have not created any templates
and none of the pre-defined templates in the list suits you, click New and follow the steps to create a new
template.
The last screen is a summary. The new group appears under the parent Static Group.
118
Once finished, this new template is automatically used. Also, the template will appear in the Dynamic Group
Templates list and can be used to create other Dynamic Groups.
and select
119
icon
3. Admin > Groups > select Dynamic Groups you want to manage and click Group.
120
> Move > select a new parent group from the list and click OK.
NOTE: The Dynamic Group in a new position starts to filter computers (based on the template) without any
relation to its previous location.
121
122
123
OS Name
192.168.1.2
4A-64-3F-10-FC-75
Windows 7
Enterprise
10.1.1.11
2B-E8-73-BE-81-C7
PDF Reader
124.256.25.25
52-FB-E5-74-35-73
Office Suite
6.1.7601
2048
ESET Endpoint
Security
Weather Forecast
Status is made of information groups. One group of data always provides coherent information organized into rows.
The number of rows per group may vary.
Conditions are evaluated per group and per row - if there are more conditions regarding the columns from one
group, only the values on the same row are considered.
Example 1:
For this example consider the following condition:
Network Adapters.IP Address = 10.1.1.11 AND Network Adapters.MAC Address = 4A-64-3F-10-FC-75
This rule matches no computer, as there is no such row where both conditions hold true.
Network Adapters - IP
Address
OS Name
192.168.1.2
4A-64-3F-10-FC-75
Windows 7
Enterprise
10.1.1.11
2B-E8-73-BE-81-C7
PDF Reader
124.256.25.25
52-FB-E5-74-35-73
Office Suite
6.1.7601
2048
ESET Endpoint
Security
Weather Forecast
Example 2:
For this example consider the following condition:
Network Adapters.IP Address = 192.168.1.2 AND Network Adapters.MAC Address = 4A-64-3F-10-FC-75
This time, both conditions matched cells on the same row and therefore, the rule as a whole is evaluated to TRUE. A
computer is selected.
124
Network Adapters - IP
Address
OS Name
192.168.1.2
4A-64-3F-10-FC-75
Windows 7
Enterprise
10.1.1.11
2B-E8-73-BE-81-C7
PDF Reader
124.256.25.25
52-FB-E5-74-35-73
Office Suite
6.1.7601
2048
ESET Endpoint
Security
Weather Forecast
Example 3:
For conditions with the OR operator (at least one condition must be TRUE), such as:
Network Adapters.IP Address = 10.1.1.11 OR Network Adapters.MAC Address = 4A-64-3F-10-FC-75
The rule is TRUE for two rows, as only either of the conditions must be satisfied. A computer is selected.
Network Adapters - IP
Address
OS Name
192.168.1.2
4A-64-3F-10-FC-75
Windows 7
Enterprise
10.1.1.11
2B-E8-73-BE-81-C7
PDF Reader
124.256.25.25
52-FB-E5-74-35-73
Office Suite
6.1.7601
2048
ESET Endpoint
Security
Weather Forecast
125
You can also add or remove Assigned users from within Computers details. When you are in Computers or Groups,
select a computer or mobile device and click Details. The user can be assigned to more than one computer/mobile
device.
You can filter the users using the filter at the top of the page, click Add Filter and select an item from the list.
126
127
Add Users...
Add a new User or Users.
Synchronize
Create a new Server task - User Synchronization.
Edit...
Allows you to edit the selected User or User Group.
Move...
You can select a User or User Group and move it as a subgroup of another User Group.
Delete
Removes the selected User or User Group completely.
128
Type the name of the User you want to add into the User Name field. Use the Conflict Resolution drop-down menu
to select the action to take if a user you are adding already exists in ERA:
Ask when conflicts are detected: When a conflict is detected, the program will ask you to select an action (see
the options below).
o Skip conflicting users: Users with the same name will not be added. This also ensures that existing user's
custom attributes in ERA will be preserved (not overwritten with the data from Active Directory).
o Overwrite conflicting users: Existing user in ERA is overwritten by the user from Active Directory. If two
users have the same SID, the existing user in ERA is removed from its previous location (even if the user
was in a different group).
Click + Add Another to add additional users. If you want to add multiple users at once, click Import to upload a csv
file containing a list of users to be added. Optionally, you can enter a Description of the users for easier
identification.
Click Add when you are finished making changes. Users will appear in the parent group that you specified.
129
Custom Attributes
You can edit existing Custom Attributes or add new attributes. To add new ones, click Add New and select from the
categories:
Wi-Fi Accounts: Profiles can be used to push corporate Wi-Fi settings directly to managed devices.
VPN Accounts: You can setup a VPN along with the credentials, certificates, and other required information to
make the VPN readily accessible for users.
Email Accounts: This is used for any email account that uses IMAP or POP3 specifications. If you use an Exchange
server, use the Exchange ActiveSync settings below.
Exchange Accounts: If your company utilizes Microsoft Exchange, you can create all the settings here to minimize
the setup time for your users' access to mail, calendar, and contacts.
LDAP (Attribute Alias): This is especially useful if your company utilizes LDAP for contacts. You can map the contact
fields to the corresponding iOS contact fields.
CalDAV: This contains the settings for any calendar that uses the CalDAV specifications.
CardDAV: For any contacts that are synced through the CardDAV specification, the information for syncing can be
established here.
Subscribed Calendars: If any CalDAV calendars are setup, this is where you can define read-only access to others'
calendars.
Some of the fields will become an attribute which can then be used when creating a policy for iOS mobile debvice
as a variable (placeholder). For example, Login ${exchange_login/exchange} or Email Address ${exchange_email/
exchange} .
130
Assigned Computers
Here you can select individual Computers/Mobile devices. To do so, click Add Computers - all Static and Dynamic
Groups with their members will be listed. Use check boxes to make your selection and click OK.
Summary
Review the settings of this user account and click Finish.
131
and select
Basic
Enter a Name and Description (optional) for the new User Group. By default, the parent group is the group you
selected when you started creating the new User Group. If you want to change its parent group, click Change Parent
Group and select a parent group from the tree. Click Finish to create the new User Group.
You can assign specific permissions to this User Group from within Access Rights using Permission Sets (see User
Groups section). This way, you can specify which specific ERA Console users can manage which specific User Groups.
You can even restrict access for such users to other ERA functions, if desired. These users will then manage User
Groups only.
132
4.3 Policies
Policies are used to push specific configurations to ESET products running on client computers. This allows you to
avoid configuring each client's ESET product manually. A policy can be applied directly to individual Computers as
well as groups (Static and Dynamic). You can also assign multiple policies to a computer or a group, unlike in ESET
Remote Administrator 5 and earlier where it was only possible to apply one policy to one product or component.
Policy application
Policies are applied in the order that Static Groups are arranged. This is not true for Dynamic Groups, where child
Dynamic Groups are traversed first. This allows you to apply policies with greater impact at the top of the Group tree
and apply more specific policies for subgroups. With properly configured policies with flags, an ERA user with access
to groups located higher in the tree can override the policies of lower Groups. The algorithm is explained details in
How Policies are applied to clients.
Merging policies
A policy applied to a client is usually a result of multiple policies being merged into one final policy.
NOTE: We recommend that you assign more generic policies (for example, general settings such as update
server) to groups that are higher within the groups tree. More specific policies (for example device control settings)
should be assigned deeper in the groups tree. The lower policy usually overrides the settings of the upper policies
when merging (unless defined otherwise with policy flags).
NOTE: When you have a policy in place and decide to remove it later on, the configuration of the client computers
will not automatically revert back to their original settings once the policy is removed. The configuration will remain
according to the last policy that was applied to the clients. The same thing happens when a computer becomes a
member of a Dynamic Group to which a certain policy is applied that changes the computer's settings. These settings
remain even if the computer leaves the Dynamic Group. Therefore, we recommend that you create a policy with
default settings and assign it to the root group (All) to have the settings revert to defaults in such a situation. This
way, when a computer leaves a Dynamic Group that changed its settings, this computer receives the default
settings.
133
Select a category in the tree on the left. In the right pane, edit settings as required. Each setting is a rule for which
you can set a flag. To make navigation easier, all rules are counted. The number of rules you have defined in a
particular section will be displayed automatically. Also, you'll see a number next to a category name in the tree on
the left. This shows a sum of rules in all its sections. This way, you'll quickly see where and how many settings/rules
are defined.
You can also use these suggestions to make policy editing easier:
o use
to set Apply flag to all item in current a section
o delete rules using Trashcan icon
134
4.3.2 Flags
You can set a flag for each setting in a policy. They define how a setting will be handled by the policy:
Apply - settings with this flag will be sent to the client. However, when merging policies it can be overwritten by a
later policy. When a policy is applied to a client computer and a particular setting has this flag, that setting is
changed regardless of what was configured locally on the client. Because the setting is not forced, it can be
changed by other policies later on.
Force - settings with the force flag have priority and cannot be overwritten by a later policy (even if the later
policy has a Force flag). This assures that this setting wont be changed by later policies during merging.
Select a category in the tree on the left. In the right pane, edit settings as required. Each setting is a rule for which
you can set a flag. To make navigation easier, all rules are counted. The number of rules you have defined in a
particular section will be displayed automatically. Also, you'll see a number next to a category name in the tree on
the left. This shows a sum of rules in all its sections. This way, you'll quickly see where and how many settings/rules
are defined.
You can also use these suggestions to make policy editing easier:
o use
to set Apply flag to all item in current a section
o delete rules using Trashcan icon
135
Delete
Removes the selected Policy completely.
Import...
Click Policies > Import..., click Choose File and browse for the file you want to import. To select multiple Policies,
see Modes below.
Export...
Select a Policy you want to export from the list and click Policies button > select Export... The Policy will be exported
to a .dat file. To export multiple Policies, change select mode, see Modes below.
You can use Modes to change select mode (Single or Multiple). Clicking the arrow in upper right corner and choose
from the context menu:
Single select mode - you can select single item.
Multiple item select mode - lets you use the check boxes to select multiple items.
Refresh - reloads/refreshes displayed information.
4.3.4 Create a Policy for ERA Agent to connect to the new ERA Server
This policy lets you change the behavior of ERA Agent by modifying its settings. The following is especially useful
when migrating client machines to a new ERA Server.
Create new policy to set new ERA Server IP address and assign the policy to all client computers. Select Admin >
Policies > create New.
Basic
Enter a Name for your policy. The Description field is optional.
Settings
Select ESET Remote Administrator Agent from the drop-down menu, expand Connection and click Edit server list
next to Servers to connect to.
136
A window will open with a list of ERA Servers the ERA Agent can connect to. Click Add and type the IP address of
your new ERA Server into the Host field. If you are using different port than the default ERA Server port 2222, to
specify your custom port number.
You can use arrow buttons to change priority of ERA Servers in case you have multiple entries in the list. Make sure
your new ERA Server is at the top by clicking double-up arrow button and then click Save.
Assign
Here you can specify the clients (individual computers/mobile devices or whole groups) that are the recipients of
this policy.
Click Assign to display all Static and Dynamic Groups and their members. Select your desired clients and click OK.
137
Summary
Review the settings for this policy and click Finish.
138
Assign
Here you can specify the clients (individual computers/mobile devices or whole groups) that are the recipients of
this policy.
Click Assign to display all Static and Dynamic Groups and their members. Select your desired clients and click OK.
139
Summary
Review the settings for this policy and click Finish.
140
Click Add and specify the details of your Exchange ActiveSync account. You can use variables for certain fields (select
from the drop-down list), such as User or Email Address. These will be replaced with actual values from User
Management when a policy is applied.
141
Account name - Enter name of the Exchange account. This is only for the user or administrator to identify what
Mail/Contacts/Calendar account it is.
Exchange ActiveSync Host - Specify the Exchange Server hostname or its IP address.
Use SSL - This option is enabled by default. It specifies whether the Exchange Server uses Secure Sockets Layer
(SSL) for authentication.
Domain - This field is optional. You can enter the domain this account belongs to.
User - Exchange login name. Select the appropriate variable from the drop-down list to use attribute from your
Active Directory for each user.
Email Address - Select the appropriate variable from the drop-down list to use an attribute from your Active
Directory for each user.
Password - Optional. We recommend that you leave this field empty. If it is left empty users will be prompted to
create their own passwords.
Past Days of Mail to Sync - Select the number of past days of mail to sync from the drop-down list.
Identity certificate - Credentials for connection to ActiveSync.
Allow messages to be moved - If enabled, messages can be moved from one account to another.
Allow recent addresses to be synced - If this option is enabled, the user is allowed to sync recently used
addresses across devices.
Use Only in Mail - Enable this option if you want to allow only the Mail app to send outgoing email messages from
this account.
Use S/MIME - Enable this option to use S/MIME encryption for outgoing email messages.
Signing Certificate - Credentials for signing MIME data.
Encryption Certificate - Credentials for encryption MIME data.
Enable per-message encryption switch - Allow the user to choose whether to encrypt each message.
142
NOTE: If you do not specify a value and leave the field blank, mobile device users will be prompted to enter this
value. For example a Password.
Add certificate - You can add specific Exchange certificates (User Identity, Digital Signature or Encryption
Certificate) if required.
NOTE: Using the steps above, you can add multiple Exchange ActiveSync Accounts, if desired. This way, there will
be more accounts configured on one mobile device. You can also edit existing accounts if necessary.
Assign
Here you can specify the clients (individual computers/mobile devices or whole groups) that are the recipients of
this policy.
Click Assign to display all Static and Dynamic Groups and their members. Select your desired clients and click OK.
143
Summary
Review the settings for this policy and click Finish.
4.3.7 Create a Policy to enforce restrictions on iOS and add Wi-Fi connection
You can create a policy for iOS mobile devices to enforce certain restrictions. You can also define multiple Wi-Fi
connections so that, for example, users will automatically be connected to the corporate Wi-Fi network at different
office locations. The same applies to VPN connections.
Restrictions that you can apply to iOS mobile device are listed in categories. For example, you can disable FaceTime
and the use of camera, disable certain iCloud features, fine-tune Security and Privacy options or disable selected
applications.
NOTE: Restrictions that can or cannot be applied depend on the version of iOS used by client devices. iOS 8.x and
newer are supported.
144
The following is an example of how to disable the camera and FaceTime apps and add Wi-Fi connection details to
the list in order to have the iOS mobile device connect to a Wi-Fi network whenever the network is is detected. If
you use the auto Join option, iOS mobile devices will connect to this network by default. The policy setting will
override a user's manual selection of a Wi-Fi network.
Basic
Enter a Name for this policy. The Description field is optional.
Settings
Select ESET Mobile Device Management for iOS, click Restrictions to see categories. Use the switch next to Allow
use of camera to disable it. Since the camera is disabled, FaceTime will automatically be disabled as well. If you
wish to disable FaceTime only, leave the camera enabled and use the switch next to Allow FaceTime to disable it.
145
After you've configured Restrictions, click Others and then click Edit next to Wi-Fi connection list. A window with
the list of Wi-Fi connections will open. Click Add and specify connection details for the Wi-Fi network you want to
add. Click Save.
Click Assign to display all Static and Dynamic Groups and their members. Select your desired clients and click OK.
146
Summary
Review the settings for this policy and click Finish.
4.3.8 Create a Policy for MDC to activate APNS for iOS enrollment
This is an example of how to create a new policy for ESET Mobile Device Connector to activate APNS (Apple Push
Notification Services) and iOS device Enrollment feature. This is required for iOS device Enrollment. Before
configuring this policy, create a new APN certificate and have it signed by Apple on the Apple Push Certificates
Portal so that it becomes a signed certificate or APNS Certificate. For step-by-step instructions see the APN
certificate section.
Basic
Enter a Name for this policy. The Description field is optional.
Settings
Select ESET Remote Administrator Mobile Device Connector from the drop-down list. Under General, go to Apple
Push Notification Service and upload the APNS Certificate and a APNS Private Key.
NOTE: Type your actual organization's name over the Organization string. This is used by the enrollment profile
generator to include this information in the profile.
147
APNS Certificate (signed by Apple) - click the folder icon and browse for the APNS Certificate to upload it.
APNS Private Key - click the folder icon and browse for the APNS Private Key to upload it.
Assign
Here you can specify the clients (individual computers/mobile devices or whole groups) that are the recipients of
this policy.
Click Assign to display all Static and Dynamic Groups and their members. Select the Mobile Device Connector
instance that you want to apply an APNS Certificate on and click OK.
Summary
Review the settings for this policy and click Finish.
148
As shown above, the root (Static Group called All) is listed as Rule 1. Since there are no more groups at the same
level as the All group, policies from groups at the next level are evaluated next.
149
The Lost & Found, SG 1 and SG 2 Static Groups are evaluated next. The computer is actually only a member of the
All/SG 2/SG 3 Static Groups and therefore there is no need to traverse the Lost & Found and SG 1 groups. SG 2 is the
only group at this level that will be evaluated, so it goes into the list and traversal goes deeper.
At the third level, the algorithm finds SG 3, DG 1 and DG 2. According to Rule 2, Static Groups are listed first.
Traversal adds SG 3 and, since it is the last Static Group at level 3, moves to DG 1. Before moving on to DG 2 at level
3, the children of DG 1 must be listed.
DG 3 is added. It has no children, so traversal steps up.
DG 2 is listed. It has no children. At level 3, there are no more groups left. Traversal steps to level 4.
Only Dynamic Group DG 4 and the computer itself are on level 4. Rule 6 says that the computer goes last, hence DG 4
is picked up. DG 4 has two children that must be processed before going any further.
DG 5 and DG 6 are added to the list. They both lack children and traversal has nothing more to process. It adds
Computer and ends.
We ended up with the list:
1. All
2. SG 2
3. SG 3
4. DG 1
5. DG 3
6. DG 2
7. DG 4
8. DG 5
9. DG 6
10.Computer
This is the order in which the Policies are applied.
150
Policy 1
Policy 2
Policy 1
Policy 2
Policy 3
151
In the Policy application order window click Add Policy. Select the check box next to the policy that you want to
assign to this group and click OK.
Click Save. To see what policies are assigned to a particular group, select that group and click the Policies tab to view
a list of policies assigned to the group.
NOTE: For more information about policies, see the Policies chapter.
152
Select your target client computer(s) and click OK. The policy will be assigned to all computers you have selected.
153
154
Mobile
Anti-Theft Actions
Device Enrollment
Display Message
Export Managed Products Configuration
On-Demand Scan
Product Activation
Software Install
Stop Managing (Uninstall ERA Agent)
Virus Signature Database Update
155
Client Task action (click the Client Task to see context menu):
Details...
The Client Task Detail displays Summary information about the Task, click the Executions tab to switch view to see
each execution result. You can Drill down to view details for a given Client Task. If there are too many executions,
you can filter the view to narrow down the results.
NOTE: When installing older ESET products, the Client Task report will display: Task delivered to the managed
product.
Edit...
Allows you to edit the selected Client Task. Editing existing tasks is useful when you only need to make small
adjustments. For more unique tasks, you might prefer to create a new task from scratch.
Duplicate...
Lets you create a new task based on the selected task, a new name is required for the duplicate.
Delete
Removes the selected task(s) completely.
Run on...
Add a new Trigger and select Target computers or groups for this task.
Rerun on failed
Creates a new Trigger with all computers that failed during previous Task execution set as targets. You can edit the
task settings if you prefer, or click Finish to rerun the task unchanged.
sign to expand the Client Task to see its Executions/Triggers, click the Trigger to get
Edit...
Allows you to edit the selected Trigger.
Rerun ASAP
You can run the Client Task again (ASAP) using an existing Trigger straight away with no modification.
156
Delete
Removes the selected trigger completely.
Duplicate...
Lets you create a new Trigger based on the selected one, a new name is required for the duplicate.
When you click the color bar, you can select from execution results and take further actions if necessary, see Drill
down for more details.
IMPORTANT: The progress indicator shows the status of a Client Task when it was last executed. This information
comes from the ERA Agent. The progress indicator shows exactly what the ERA Agent is reporting from client
computers.
157
You can also drill down deeper, for example by selecting History to see details about the Client Task execution
including the time when it Occurred, current Status, Progress and Trace message (if available). You can click
Computer name or Computer description and take further actions if necessary, or view Computer Details for a
specific client.
158
NOTE: If you do not see any entries in the Executions history table, try setting the Occurred filter to longer
duration.
159
4.4.1.4 Trigger
A Trigger must be assigned to a Client Task for it to be executed. To defining a Trigger, select the Target computers
or groups on which a Client task should be executed. With your target(s) selected, set the trigger conditions to
execute the task at a particular time or event. Additionally, you can use Advanced settings - Throttling to further
fine-tune the Trigger, if required.
Basic
Enter basic information about the Trigger in the Description field and then click Target.
Target
The Target window allows you to specify the clients (individual computers or groups) that are the recipients of this
task. Click Add Targets to display all Static and Dynamic Groups and their members.
160
NOTE: For more information about triggers, proceed to the Triggers chapter.
Advanced settings - Throttling - Throttling is used to restrict a task from being executed if a task is triggered by a
frequently occurring event, for example the Event Log Trigger or the Joined Dynamic Group Trigger (see above). For
more information, see the Throttling chapter.
Click Finish when you have defined the recipients of this task and the triggers that execute the task.
Settings
Reboot computer(s)- select this check box if you want to reboot following task completion. If you want to
shutdown computer(s), leave it deselected.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
161
Settings
Shutdown after scan - If you select this check box, the computer will shut down after scanning is finished
162
Scan profile - You can select the profile you want from the drop-down menu:
In-depth Scan - This is a pre-defined profile on the client, it is configured to be the most thorough scan profile and
checks the whole system but also requires the most time and resources.
Smart scan - Smart scan allows you to quickly launch a computer scan and clean infected files with no need for
user intervention. The advantage of Smart scan is it is easy to operate and does not require detailed scanning
configuration. Smart scan checks all files on local drives and automatically cleans or deletes detected infiltrations.
The cleaning level is automatically set to the default value.
Scan From Context Menu - Scans a client using a pre-defined scan profile, you can customize the scan targets.
Custom Profile - Custom scan lets you specify scanning parameters such as scan targets and scanning methods.
The advantage of a Custom scan is the ability to configure the parameters in detail. Configurations can be saved to
user-defined scan profiles, which make it easy to repeat the scan using the same parameters. A profile must be
created prior to running the task with the custom profile option. Once you select a custom profile from the dropdown menu, type the exact name of the profile into the Custom profile field.
Cleaning
By default, Scan with cleaning is selected. This means that when infected objects are found, they are cleaned
automatically. If this is not possible, they will be quarantined.
Scan Targets
This option is also selected by default. Using this setting, all targets specified in the scan profile are scanned. If you
deselect this option, you need to manually specify scan targets in the Add Target field. Type the scan target into the
text field and click Add. The target will be displayed in the Scan targets field below.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
163
Settings
Automatically Accept EULA - select this check box if you want to accept the EULA automatically. No text will be
displayed to the user.
Install Optional Updates - this option applies to Windows operating systems only, updates that are marked as
optional will also be installed.
Allow Reboot - this option applies to Windows operating systems only and causes the client computer to reboot
once the updates are installed.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
164
Settings
Quarantine management settings
Action - Select the action to be taken with the object in Quarantine.
o Restore Object(s) (restores the object to its original location, but it will be scanned and if the reasons for the
Quarantine persist, the object will be quarantined again)
o Restore Object(s) and Exclude in Future (restores the object to its original location and it will not be
quarantined again).
o Delete Object(s) (deletes the object completely).
Filter type - Filter the objects in the Quarantine based on the criteria defined below. Either based on the Hash string
of the object or Conditions.
165
166
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
167
Settings
Select the check box next to I agree with application End User License Agreement if you agree. See License
Management or EULA for more information.
Reference Remote Administrator Server - Select ERA Server version from the list. All ERA components will be
upgraded to versions compatible with the selected server.
Automatically reboot when needed - You can force a reboot of the client operating system, if the installation
requires so.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
168
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
169
Settings
Command line to run - Enter a command line you want to run on the client(s).
Working directory - Enter a directory where the command line above will be executed.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
170
Settings
SysInspector Script - Click Browse to navigate to the service script. The service script needs to be created prior to
running this task.
Action - You can either Upload to, or Download a script from the ERA Console.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
171
NOTE: You can use the Server Scan task scan to perform a Hyper-V scan on ESET File Security 6, as well as Ondemand mailbox database scan and Hyper-V scan on ESET Mail Security 6. Other scan methods are currently not
available.
172
Settings
Select the check box next to I agree with application End User License Agreement if you agree. See License
Management or EULA for more information.
Click <Choose ESET License> and select the appropriate license for the installed product from the list of available
licenses.
Click <Choose package> to select a installer package from the repository or specify a package URL. A list of available
packages where you can select the ESET product you want to install (for example, ESET Endpoint Security) will be
displayed. Select your desired installer package and click OK. If you want to specify a URL where the installation
package is located, type or copy and paste the URL (for example file://\\pc22\install\ees_nt64_ENU.msi) into the text
field (do not use a URL that requires authentication).
http://server_address/ees_nt64_ENU.msi - If you are installing from a public web server or from your own HTTP
server.
file://\\pc22\install\ees_nt64_ENU.msi - if you are installing from network path.
file://C:\installs\ees_nt64_ENU.msi - if you are installing from local path.
173
NOTE: Please note, that both ERA Server and ERA Agent require access to the internet to access the repository
and perform installation. If you do not have internet access, you can install the client software locally.
If you need to, you can specify Installation parameters, otherwise leave this field empty. Select the check box next
to Automatically reboot when needed to force an automatic reboot of the client computer after installation.
Alternatively, you can leave this option deselected and the the client computer can be restarted manually.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
174
Settings
Software Uninstallation Settings
Uninstall - Application from list:
Package name - Select an ERA component or a client security product. All packages installed on the selected client(s)
are displayed in this list.
Package version - You can either remove a specific version (sometimes, a specific version can cause problems) of
the package, or uninstall all versions of a package.
Automatically reboot when needed - You can force a reboot of the client operating system if it is required for
uninstallation.
Uninstall - Third party antivirus software (Built with OPSWAT) - For a list of compatible AV Software, see our
Knowledgebase article. This removal is different from the Add or Remove Programs uninstallation. It uses
alternative methods to remove third party antivirus software thoroughly including any residual registry entries or
other traces.
Follow the step-by-step instructions in this article How do I remove third-party antivirus software from client
computers using ESET Remote Administrator? (6.x) to send a task to remove third-party antivirus software from
client computers.
If you want to allow uninstallation of password-protected applications see our Knowledgebase article. (see step
12.)
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
175
NOTE: In case the ESET security product uninstallation does not finish successfully, for example if you get
error
message, this is because there is a password protection setting enabled in ESET security product. Apply a policy to
the client computer(s) you want to uninstall ESET security product from in such a way, that the password protection
is disabled, which otherwise prevents the uninstallation.
Product: ESET Endpoint Security -- Error 5004. Enter a valid password to continue uninstallation.
Settings
Product activation settings - Select a license for the client from the list. This license will be applied to products
already installed on the client. If you do not see any licenses listed, go to License Management to add licenses.
176
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
177
Settings
Store log on client - Select this if you want to store the SysInspector log on the client as well as on the ERA Server.
For example, when a client has ESET Endpoint Security installed, the log is usually stored under C:\Program Data
\ESET\ESET Endpoint Antivirus\SysInspector.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
178
Settings
Quarantined object - Select a specific object from the quarantine.
Object password - Enter a password to encrypt the object for security reasons. Please note that password will be
displayed in the corresponding report.
Upload path - Enter a path to a location where you want to upload the object.
Upload username/password - In case the location requires authentication (network share,etc.), enter the
credentials to access this path.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
179
Settings
Clear Update Cache - This option deletes the temporary update files in the cache on the client, and can often be
used to repair failed virus signature database update errors.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
Settings
Here you can customize virus signature database update rollback settings.
Action
180
Enabled Updates - Updates are enabled and the client will receive the next virus signature database update.
Rollback and Disable Updates for Next - Updates are disabled for the specific time period in the Disable interval
drop-down menu - 24/36/48 hours or until revoked. Be careful when using the Until revoked option, as this
presents a security risk.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
181
Settings
Type the Name of the mobile device (this name will be shown in the list of Computers), and optionally a
Description.
Enter the IMEI number for the mobile device you want to add. We also recommend that you enter the Email address
associated with the mobile device (the enrollment link will be sent to this email address).
Click + Add Another if you want to add another mobile device, you can add multiple devices at the same time.
Alternatively, click Import to upload a .csv file containing a list of mobile devices to add. Click Browse Existing and
select existing mobile devices.
Specify an Action by selecting the check box next to Display enrollment link and/or Send enrollment link (the URL
will be sent to the email address(es) associated with the device). If you want to send an enrollment link
(recommended) to the mobile device, edit the Subject and Message contents, but make sure to keep the
enrollment URL unchanged.
182
Summary
All configured options are displayed here. Review the settings and click Finish if they are ok. The task is now created
and ready to be used.
After you click Finish, the enrollment link (URL) will be displayed. If you do not specify an email address and did not
select Send enrollment link, you must either type the URL into the web browser on the mobile device manually, or
send this URL to the mobile device by other means.
There are two scenarios for enrollment when ESET Endpoint Security for Android (EESA) is activated on the mobile
device. You can activate EESA on the mobile device using a Product Activation task (recommended). The other
scenario is for mobile devices with the ESET Endpoint Security for Android app already activated.
EESA not activated yet - follow the steps below to activate the product and enroll your Device:
1. Tap the enrollment link URL (including the port number) received via email, or type it into the browser manually
(for example, https://eramdm:9980/enrollment). You might be asked to accept an SSL certificate, click Accept if
you agree and then click Connect.
183
2. If you do not have ESET Endpoint Security installed on the mobile device, you will automatically be redirected to
the Google Play store, where you can download the app.
184
NOTE: If you receive the notification Couldn't find an app to open this link, try opening the enrollment link in the
default Android web browser.
185
186
187
6. At this point, you can exit the ESET Endpoint Security for Android app on the mobile device and open ERA Web
Console.
188
7. In ERA Web Console, go to Admin > Client Tasks > Mobile > Product Activation and click New.
8. Select the mobile device by clicking Add targets.
9. Under Settings, click <Choose ESET license> , select the appropriate license and click Finish.
It might take some time for the Product Activation client task to run on the mobile device. Once the task is
successfully executed, the ESET Endpoint Security for Android app is activated and the mobile device can be
managed by ERA. The user will now be able use the ESET Endpoint Security for Android app. When the ESET
Endpoint Security for Android app is open, the main menu will be displayed:
189
EESA already activated - follow the steps below to enroll your device:
1. Tap the enrollment link URL (including the port number) received via email, or type it into the browser manually
(for example, https://eramdm:9980/enrollment). You might be asked to accept an SSL certificate, click accept if
you agree and then click Connect.
190
191
NOTE: If you do not have ESET Endpoint Security installed on the mobile device, you will automatically be
redirected to the Google Play store, where you can download the app.
NOTE: If you receive the notification Couldn't find an app to open this link, try opening the enrollment link in the
default Android web browser.
2. Check your connection details (Mobile Device Connector server address and port) and click Connect.
192
3. Type the ESET Endpoint Security admin mode password into the blank field and tap Enter.
193
194
195
Summary
All configured options are displayed here. Review the settings and click Finish if they are ok. The task is now created
and ready to be used.
After you click Finish, the enrollment link (URL) will be displayed. If you do not specify an email address and did not
select Send enrollment link, you must either type the URL into the web browser on the mobile device manually, or
send this URL to the mobile device by other means. Alternatively, you can use a QR code.
196
197
After installing the new profile, the Signed by field will display that the profile is Not Signed. This is a standard
behavior for any MDM enrollment. The profile is actually signed with a certificate, despite this it is shown as "not
signed". This is because iOS does not yet recognize the certificate.
198
This enrollment profile allows you to configure devices and set security policies for users or groups.
IMPORTANT: Removing this enrollment profile removes all company settings (Mail, Calendar, Contacts, etc.) and
the iOS mobile device will not be managed. If a user removes the enrollment profile, ERA will not be aware of this
and the device's status will change to and later to . This will happen after 14 days because iOS mobile device is
not connecting. No other indication that the enrollment profile has been removed will be given.
199
200
Device ID - the IMEI/MEID/IMSI can be found on the device's status page, press Menu > Settings > About Phone >
Status. Alternatively, you can dial *#06# and the ID will automatically be displayed. See http://
www.wikihow.com/Find-the-IMEI-or-MEID-Number-on-a-Mobile-Phone for more information.
201
The following diagram demonstrates communication between ESET Remote Administrator components and a
mobile device:
202
Settings
You can enter a Title and type in your Message.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
203
Target
IMPORTANT: It is not possible to add Targets while creating a Client Task. You will be able to add Targets after the
task has been created. Configure Settings for the task and click Finish to create the task and then create a Trigger to
specify Targets for the task.
Settings
Find - The device will reply with a text message containing its GPS coordinates. If a more precise location is
available after 10 minutes, the device will re-send the message. Received information is displayed in the
Computer details.
Lock - The device will be locked. The device can be unlocked using the Administrator password or the unlock
command.
Unlock - The device will be unlocked so it can be used again. The SIM card currently in the device will be saved as
a Trusted SIM.
Siren - The device will be locked and it will play a very loud sound for 5 minutes (or until unlocked).
Wipe - All accessible data on the device will be erased (files will be overwritten). ESET Endpoint Security will
remain on the device. This can take up to several hours.
Enhanced Factory Reset - All accessible data on the device will be erased (file headers will be destroyed) and the
device will be reset to its default factory settings. This can take several minutes.
204
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
205
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
206
Settings
Export managed products configuration settings
Product - Select an ERA component or a client security product for which you want to export the configuration.
Summary
Review the summary of configured settings and click Finish. The Client Task is now created and a pop-up window
will open. We recommend you to click Create Trigger to specify when this Client Task should be executed and on
what Targets. If you click Close, you can create a Trigger later on.
207
The same can be done from Computers, select Static or Dynamic and click
window will open.
New Task...
208
New task...
>
New task
3. Admin> Groups > select computer(s) > Tasks button, select action and click
New task...
4.4.26 Triggers
Triggers can be used on both the ERA Server and Agents (clients).
209
To start creating your new task, click Admin > Server Tasks > New.
Basic
Enter basic information about the task, such as a Name, Description (optional) and the Task Type. The Task Type
defines the settings and the behavior of the task. Select the check box next to Run task immediately after finish to
have the task run automatically after you click Finish.
210
Basic
211
Enter basic information about the task, such as the Name, Description (optional) and Task Type. The Task Type
defines the settings and behavior of the task. Select the check box next to Run task immediately after finish to have
the task run automatically after you click Finish.
212
Settings
Automatic resolution of suitable Agent - If you have multiple operating systems (Windows, Linux, Mac OS) in your
network, select this option and this task will automatically find the appropriate server-compatible Agent
installation package for each system.
Targets - Click this to select the clients that will be the recipients of this task.
Username/Password - The username and the password for the user with sufficient rights to perform a remote
installation of the agent.
Server hostname (optional) - You can enter a server hostname if it is different on the client side and the server
side.
Peer certificate/ERA Certificate - This is the security certificate and certification authority for the agent
installation. You can select the default certificate and certification authority, or use custom certificates. For more
information, see the Certificates chapter.
Custom certificate - If you use a custom certificate for authentication, navigate to the certificate and select it
when installing the Agent.
Certificate passphrase - Password for the certificate, either the password you entered during Server installation
(in the step where you created a certification authority) or the password for your custom certificate.
NOTE: ERA Server can select the appropriate Agent installation package for operating systems automatically. To
choose a package manually, deselect Automatic resolution of suitable Agent and then choose the package you want
to use from the list of available Agents in ERA repository.
Target
The Target window allows you to specify the clients (individual computers or groups) that are the recipients of this
task. Click Add Targets to display all Static and Dynamic Groups and their members.
213
215
Settings
Report template - Choose a report template from the list.
216
Send to - Enter the email address(-es) of recipients for report emails. Separate multiple addresses with a comma
(,). It is also possible to add CC and BCC fields; these work exactly as they do for mail clients.
Subject - Subject of the report message. Enter a distinctive subject, so that incoming messages can be sorted. This
is an optional setting, but we recommend that you do not leave it empty.
Message contents - Define the body of the report message.
Send mail if report is empty - use this option if you want the report to be sent even though there is no data in it.
Print options
Click Show print options to display the following settings:
Output format - Select the appropriate file format. The generated report will be attached to the message and can
be printed later.
Output language - Select the language for the message. The default language is based on the language selected
for the ERA Web Console.
Page size/Resolution/Paper orientation/Color format/Margin units/Margins - These options are relevant if you
want to print the report. Select the appropriate options based on your print preferences. These options only apply
to the PDF and PS format, not to the CSV format.
NOTE: The Generate report task allows you to select from several output file formats. Selecting CSV results in the
date and time values in your report to be stored in the UTC format. When you select either of the two remaining
output options (PDF, PS) the report will use the local server time.
SAVE TO FILE
File options
Relative file path - The report will be generated in a specific directory, for example:
C:\Users\All Users\ESET\RemoteAdministrator\Server\EraServerApplicationData\Data\GeneratedReports\
Save file if report is empty - use this option if you want the report to be saved even though there is no data in it.
Print options
Click Show print options to display the following settings:
Output format - Select the appropriate file format. The generated report will be attached to the message and can
be printed later.
Output language - Select the language for the message. The default language is based on the language selected
for the ERA Web Console.
Page size/Resolution/Paper orientation/Color format/Margin units/Margins - These options are relevant if you
want to print the report. Select the appropriate options based on your print preferences. These options only apply
to the PDF and PS format, not to the CSV format.
NOTE: The Generate report task allows you to select from several output file formats. Selecting CSV results in the
date and time values in your report to be stored in the UTC format. When you select either of the two remaining
output options (PDF, PS) the report will use the local server time.
Triggers
Select an existing trigger for this task, or create a new trigger. It is also possible to Remove or Modify a selected
trigger.
Summary
All configured options are displayed here. Review the settings and click Finish if they are ok. The task is now created
and ready to be used.
NOTE: The Ubuntu Server Edition requires X Server and xinit installed for the correct function of the Report
Printer (PDF Reports).
217
219
Use LDAP Parameters - If you want to use LDAP, select check box Use LDAP instead of Active Directory and enter
specific attributes to match your server, or you can select a Presets by clicking Custom... and the attributes will
be populated automatically:
o Active Directory - Click Browse next to Distinguished Name. Your Active Directory tree will be displayed. Select
the top entry to sync all groups with ERA, or select only the specific groups that you want to add. Click OK when
you are finished.
o Mac OS X Server Open Directory (Computer Host Names)
o Mac OS X Server Open Directory (Computer IP Addresses)
o OpenLDAP with Samba computer records - setting up the parameters DNS name in Active Directory.
Synchronization settings:
Distinguished name - Path (Distinguished Name) to the node in the Active Directory tree. Leaving this option
empty will synchronize the entire AD tree.
Excluded distinguished name(s) - You can choose to exclude (ignore) specific nodes in the Active Directory tree.
Ignore disabled computers (only in active directory) - You can select to ignore computers disabled in active
directory, the task will skip these computers.
Triggers
Select an existing trigger for this task, or create a new trigger. It is also possible to Remove or Modify a selected
trigger.
Summary
Review the configuration information displayed here and if it is ok, click Finish. The task is now created and ready to
be used.
220
221
222
NOTE: If you use custom attributes for a user set User creation collision handling to Skip. Otherwise the user (and
all details) will be overwritten with the data from Active Directory loosing custom attributes. If you want to
overwrite the user, change User extinction handling to Skip.
Server connection settings:
o Server - Type the Server name or IP address of your domain controller.
o Login - Type the login credentials for your domain controller in the format DOMAIN\username.
o Password - Type the password used to log on to your domain controller.
Use LDAP Parameters - If you want to use LDAP, select the check box next to Use LDAP instead of Active
Directory and enter the information for your server. Alternatively you can select Presets by clicking Custom...
and the attributes will be populated automatically:
o Active Directory
o Mac OS X Server Open Directory (Computer Host Names)
o Mac OS X Server Open Directory (Computer IP Addresses)
o OpenLDAP with Samba computer records - setting up the parameters DNS name in Active Directory.
Synchronization settings:
Distinguished name - Path (Distinguished Name) to the node in the Active Directory tree. Leaving this option empty
will synchronize the entire AD tree.
User group and user attributes:
A users default attributes are specific to the directory to which the user belongs.
Advanced user attributes:
If you want to use advanced custom attributes select Add New. This field will inherit the user's information, which
can be addressed in a policy editor for iOS MDM as a placeholder.
Triggers
Select an existing trigger for this task, or create a new trigger. It is also possible to Remove or Modify a selected
trigger.
Summary
Review the configuration information displayed here and if it is ok, click Finish. The task is now created and ready to
be used.
223
4.5.7 Triggers
Triggers are basically sensors that react to certain events in a pre-defined way. They are used to execute an action
(in most cases, to run a task). They can be activated by the scheduler (time events) or when a certain system event
occurs.
A trigger executes all tasks assigned to the trigger at the moment when the trigger is activated. The trigger does not
run newly assigned tasks immediatelythey are ran as soon as the trigger is fired. Trigger sensitivity to events can
be reduced further using throttling.
Server Trigger Types:
Dynamic Group Members Changed - This trigger is invoked when the contents of a Dynamic Group change. For
example, if clients join or leave a Dynamic Group called Infected.
Dynamic Group Size Changed According to Compared Group - This trigger is invoked when the number of clients
in an observed Dynamic Group change according to a compared group (static or dynamic). For example, if more
than 10% of all computers are infected (the group All compared to the group Infected).
Dynamic Group Size Changed According to Threshold - This trigger is invoked when the number of clients in a
Dynamic Group becomes higher or lower than the specified threshold. For example, if more than 100 computers
are in the group Infected.
Dynamic Group Size Changed Over the Time Period - This trigger is invoked when the number of clients in a
Dynamic Group changes over a defined time period. For example, if the number of computers in the group
Infected increases by 10% in an hour.
Event Log Trigger - This trigger is invoked when a certain event occurs in logs. For example, if there is a threat in
the Scan log.
Scheduled Trigger -This trigger is invoked at a certain time and date.
Server Started - Is invoked when the server starts. For example, this trigger is used for the Static Group
Synchronization task.
Duplicate lets you create a new Trigger Types based on the selected triggers, a new name is required for the
duplicate task.
224
4.5.7.3 Throttling
Under defined circumstances, throttling may prevent a trigger from firing. Time-based conditions take precedence
over statistical conditions.
If any of the conditions are met, all state information of all observers is reset (observation starts from scratch). This
holds for Time-Based as well as Statistical conditions. State information for observers is not persistant, they are
reset even if the Agent or Server is restarted.
Any modification made to a trigger causes a reset of its status.
There are several ways to control triggering:
Statistical
Statistical triggers fire based on any combination of the following parameters:
S1: Trigger should fire every N occurrences of the triggering event (modulo N) starting with last event in a
series (for example, from start, wait for the Nth event)
S2: Trigger if N events occur within X time (the time can be chosen from a pre-defined set) [N <= 100] in
floating total sense only the count of events during the last X time is taken into account. Firing of the trigger
causes a buffer reset
S3: N events with unique symbol S occur [N <= 100] in a row. The buffer is reset if the trigger is fired and there
is an event already in buffer. The Buffer is in the mode floating window FIFO queue. The new symbol is
compared with every symbol in the buffer.
Note: A missing value (n/a) is considered as not unique and therefore the buffer is reset
since last triggered
These conditions can be combined with the AND operator (all of the set ones must be satisfied) or the OR operator
(whichever occurs first).
225
Time based
All of the following conditions must be satisfied simultaneously (if set):
T1: The trigger may run within X time range. Range is given as a repeated series of marginal times (for
example, between 13:00 14:00 OR 17:00 23:30)
T2: The trigger can be executed at most once every X time.
Additional Properties
As stated above, not every event will cause a trigger to fire. Actions taken for non-firing events can be:
If there is more than one event skipped, group the last N events into one (store data of suppressed ticks) [N
<= 100]
for N == 0, only the last event is processed (N means history length, the last event is always processed)
All non-firing events are merged (merging the last tick with N historical ticks)
Examples:
S1: Criterion for occurrences (allow every 3rd tick)
Time
0 01
0
02
03
04
05
06
Ticks
S1
trigger is modified
07 08 09 10
11
12
13
14
15
S2: Criterion for occurrences within time (allow if 3 ticks occur within 4 seconds)
Time
00
Ticks
01
02
03
04
05
S2
06
trigger is modified
07
08
09
10
11
12
13
S3: Criterion for unique symbol values (allow if 3 unique values are in a row)
Time
00
01
02
03
04
05
06
Value
S3
trigger is modified
07
08
09
10
11
12
13
n/a
S3: Criterion for unique symbol values (allow if 3 unique values are since the last tick)
Time
00
01
02
03
04
05
06
07
Value
S3
trigger is modified
08
09
10
11
12
13
14
n/a
T1: Allow a tick in certain time ranges (allow every day starting at 8:10, duration 60 seconds)
Time
8:09:50
8:09:59
8:10:00
8:10:01
Ticks
x
1
T1
trigger is modified
8:10:59
8:11:00
8:11:01
This criterion has no state; therefore trigger modifications have no effect on the results.
226
T2: Allow a single tick in a time interval (allow at most once every 5 seconds)
Time
00
Ticks
T2
01
02
03
04
05
06
trigger is modified
07
08
09
10
11
12
13
S1+S2 combination
S1: every 5th tick
S2: 3 ticks within 4 seconds
Time
00
01
02
03
04
Ticks
05
06
07
08
09
10
11
12
S1
13
14
15
16
S2
Result
8:07:50
8:07:51
8:07:52
8:07:53
8:08:10
8:08:11
8:08:19
8:08:54
8:08:55
8:09:01
Ticks
S1
T1
Result
1
1
1
1
8:07:50
8:07:51
8:07:52
8:07:53
8:08:10
8:08:11
8:08:19
8:08:54
8:08:55
8:09:01
Ticks
S2
T1
1
1
Result
1
1
227
Time:
00
01
02
03
04
05
06
07
Ticks
S2
T2
Result
1
1
16
17
18
19
20
21
22
23
24
Specify the Number of ticks to aggregate. This will define how many ticks (trigger hits) are needed in order to
activate the trigger. For more specific information, see the Throttling chapter.
Summary
Review the settings of your new trigger, make adjustments and click Finish. Your trigger is now saved on the server
and ready to be used. You can also view triggers that you have created in the list on the right. To edit or delete the
trigger, simply click the trigger in the list and select the appropriate action from the context menu. To delete
multiple triggers at once, select the check boxes next to the triggers you want to remove and click Delete.
229
Aggregate invocations during time period - You can allow a hit once every X seconds. If you set this option to 10
seconds and during this time 10 invocations occur, only 1 will be counted.
Time ranges - Allow ticks only within the defined time period. You can add multiple time ranges to the list, they
will be sorted chronologically.
Statistical criteria
Statistical criteria application - This option defines the method by which the statistical criteria will be evaluated.
Either all of them need to be met (AND), or at least one (OR).
Triggered every No of occurrences - Allow only every X tick (hit). For example, if you enter 10, only each 10th tick
will be counted.
No of occurrences within a time period - Allow only tick(s) within the defined time period. This will define the
frequency. For example, allow the execution of the task if the event is detected 10x in an hour.
o Time period - Define the time period for the option described above.
Number of events with symbol - Record a tick(hit) if X events with the specific symbol are provided. For example,
if you enter 10, a tick will be counted for every 10th installation of a certain application.
o Applies when number of events - Enter a number of events in a row after the last tick to count another tick. For
example, enter 10 and a tick will be counted after 10 events from the last tick.
Applies when number of events - The trigger is applied when the ticks are either Received in a Row (trigger
execution is not taken into account), or Received Since Last Trigger Execution (when the trigger is executed, the
number is reset to 0).
230
Required
Value
Seconds
Yes
0-59
,-*/
Minutes
Yes
0-59
,-*/
Hours
Yes
0-23
,-*/
Yes
1-31
,-*/ L W C
Month
Yes
0-11 or JAN-DEC
,-*/
Yes
1-7 or SUN-SAT
,-*/ L C #
Year
No
empty or 1970-2099
,-*/
4.6 Notifications
Notifications are essential for keeping track of the overall state of your network. When a new event occurs (based
on your configuration), you will be notified using a defined method (either an SNMP Trap or email message), and
you can respond accordingly.
All notification templates are displayed in the list, and can be filtered by Name or Description.
Click Add Filter to add filtering criteria and/or enter a string into the Name/Notification field.
Selecting an existing notification gives you the option to Edit it or Delete it completely.
To create a new notification, click New notification on the bottom of the page.
Duplicate lets you create a new notification based on the selected notification, a new name is required for the
duplicate task.
231
Basic
You can edit a Notification Name and Description to make it easier to filter between different notifications.
232
Notification template
Existing Dynamic Group - An existing Dynamic Group will be used to generate notifications. Select a Dynamic Group
from the list and click OK.
Dynamic Group Size Changed According to Compared Group - If the number of clients in an observed Dynamic Group
changes according to a compared group (either static or dynamic), the notification will be invoked.
Other Event Log Template
This option is used for notifications not associated with a Dynamic Group, but based on system events filtered out
from the event log. Select a Log type on which the notification will be based and a Logical operator for filters.
Tracked State - This option notifies you of object state changes in relation to your user-defined filters.
NOTE: You can change Tracked state and + Add Filter or Logical operator for filters.
Configuration
Notify every time the Dynamic Group content changes - Enable this to be notified when members of a Dynamic
Group are added, removed or changed.
Notification time period - Define the time period (in minutes, hours or days) for the comparison with the new state.
For example, 7 days ago the number of clients with outdated security products was 10 and the Threshold (see
below) was set to 20. If the number of clients with an outdated security product reaches 30, you will be notified.
Threshold - Define a threshold that will trigger the sending of a notification. You can either define a number of
clients, or a percentage of clients (members of the Dynamic Group).
Generated message - This is a pre-defined message that will appear in the notification. It contains configured
settings in a text form.
Message - Beside the pre-defined message, you can add a custom message (it will appear at the end of the predefined message above). This is optional, but it is recommended for better filtering of notifications and overview.
NOTE: Available options depend on the selected notification template.
Advanced settings - Throttling
Time-Based Criteria
Specify the Number of ticks to aggregate. This will define how many ticks (trigger hits) are needed in order to
activate the trigger. For more specific information, see the Throttling chapter.
Statistical criteria
233
Statistical criteria application - This option defines the method by which the statistical criteria will be evaluated.
Either all of them need to be met (AND), or at least one (OR).
Triggered every No of occurrences - Allow only every X ticks (hits). For example, if you enter 10, only each 10th
tick will be counted.
No of occurrences within a time period - Only allow ticks within the defined time period. For example, allow the
execution of the task if the event is detected 10x in an hour. Time period - Define the time period for the option
described above.
Number of events with symbol - Allow a tick(hit) if X events with the specific symbol are provided. For example, if
you enter 10, a tick will be counted for every 10 installations of a certain software. Applies when number of
events - Enter a number of events in a row after the last tick to count another tick. For example, enter 10 and a tick
will be counted 10 events after the previous tick was counted.
Applies when number of events - The trigger is applied when the ticks are either Received in succession (trigger
execution is not taken into account), or Received Since Last Trigger Execution (when the trigger is executed, the
number is reset to 0).
Distribution
Subject - The subject of a notification message. This is optional, but also recommended for better filtering or when
creating rules to sort messages.
Distribution
Send SNMP Trap - Sends an SNMP Trap. The SNMP Trap notifies the Server using an unsolicited SNMP message.
For more information, see How to configure an SNMP Trap Service.
Send email - Sends an email message based on your email settings.
Send syslog - You can use ERA to send notifications and event messages to your Syslog server. Also, it is possible
to export logs from a client's ESET security product and send them to the Syslog server.
Email addresses - Enter the email addresses of the recipients of the notification messages, separate multiple
addresses with a comma (",").
Syslog severity - Choose severity level from the drop-down list. Notifications will then appear with such severity on
the Syslog server.
Click Save as to create a new template based on the template you are editing. You will be required to enter a name
for the new template.
234
Press the Windows key + R to open a run dialog box, type Services.msc into the Open field and press Enter. Search
for the SNMP Service.
Open the Traps tab, type public into the Community name field and click Add to list.
Click Add, type the Host name, IP or IPX address of the computer where the SNMP trapping software is installed
into the appropriate field and click Add.
Proceed to the Security tab. Click Add to display the SNMP Service Configuration window. Type public into the
Community name field and click Add. Rights will be set to READ ONLY, this is ok.
Make sure that Accept SNMP packets from any hosts is selected and click OK to confirm. The SNMP service is not
configured.
SNMP Trap Software configuration (Client)
The SNMP Service is installed and doesn`t need to be configured.
Install AdRem SNMP Manager or AdRem NetCrunch.
AdRem SNMP Manager: Start the application and select Create New SNMP Node List. Click Yes to confirm.
Check the network address of your subnet (displayed in this window). Click OK to search your network.
Wait for the search to finish, the search results will be displayed in the Discovery results window. The IP address
of the ERA Server should be displayed in this list.
Select the IP address of the server and click OK. Your server address is displayed in the Nodes section.
Click Trap Receiver Stopped and select Start. Trap Receiver Started will be displayed. Now you can receive SNMP
messages from your ERA Server.
LINUX
1. Install the snmpd package by running one of the following command:
apt-get install snmpd snmp (Debi a n, Ubuntu di s tri buti ons )
yum install net-snmp (Red-Ha t, Fedora di s tri buti ons )
2. Open the /etc/default/snmpd file and make the following attribute edits:
#SNMPDOPTS='-Lsd -Lf /dev/null -u snmp -g snmp -I -smux -p /var/run/snmpd.pid'
5. Open the /etc/snmp/snmptrapd.conf file and add the following line at the end of the file:
authCommunity log,execute,net public
6. Type the following command to start the SNMP manager services and logging of incoming traps:
/etc/init.d/snmpd restart
or
service snmpd restart
7. To check if the trap is working and catching the messages, run the following command:
tail -f /var/log/syslog | grep -i TRAP
235
4.7 Certificates
Certificates are an important part of ESET Remote Administrator , they are required for ERA components to
communicate with ERA Server. To make sure all components can communicate correctly, all Peer Certificates need
to be valid and signed to the same Certification Authority.
You can create a new Certification Authority and Peer Certificates in ERA Web Console, follow the instructions in
this guide to:
Create a new Certification Authority
o Import a Public Key
o Export a Public Key
o Export a Public Key in BASE64 format
236
IMPORTANT: The revoke action is irreversible, you will not be able to use a certificate that has been revoked.
Make sure there are no ERA Agents left using this certificate before you revoke it. This will prevent loss of
connection to client computers or servers (ERA Server, ERA Proxy, Mobile Device Connector, Virtual Agent Host).
Show Revoked - shows you all revoked certificates.
Agent certificate for server assisted installation - This certificate is generated during server installation, provided
that you have selected the Generate certificates option.
Sign
The signing method should be Certification authority.
Select the ERA Certification Authority created during the initial installation.
Skip the custom .pfx file option, this option only applies to self-signed pfx certification authorities.
237
Summary
Review the certificate information you entered and click Finish. The certificate is now successfully created and
will be available in the Certificates list to use when installing the Agent.
238
NOTE: If you are using custom certificates that are not in Base64 format, they will need to be converted to Base64
format (alternatively, you can export these certificates as described above). This is the only format accepted by ERA
components to connect to ERA Server. For more details about how to convert certificates see http://linux.die.net/
man/1/base64 and https://developer.apple.com/library/mac/documentation/Darwin/Reference/ManPages/man1/
base64.1.html. For example:
'cat ca.der | base64 > ca.base64.txt' a 'cat agent.pfx | base64 > agent.base64.txt'
239
Download
Download your CSR (Certification Signing Request) and a Private Key.
Certificate
Open the Apple Push Certificates Portal and log in using your Apple ID. Follow the on-screen instruction on the
portal page and use the CSR file to get the APN Certificate signed by Apple (APNS).
240
Upload
Once you have completed all the steps above, you can create a Policy for MDC to activate APNS for iOS enrollment.
You can then Enroll any iOS device the same way as an Android device - by visiting https://
<mdmcore>:<enrollmentport>/enrollment from the device's browser.
241
The certificate will disappear from the list of Peer Certificates. To see previously revoked certificates, click Show
revoked button.
Select Custom certificate, select the ERA Server certificate (.pfx) file you exported from the old server and then
click OK.
Restart the ERA Server service, see our Knowledgebase article.
243
New..., or
Certification Authority
Enter a Description of the Certification Authority and select a Passphrase. This Passphrase should contain at least 12
characters.
Attributes (Subject)
1. Enter a Common name (name) of the Certification Authority. Select a unique name to differentiate multiple
Certificate Authorities.
Optionally, you can enter descriptive information about the Certification Authority.
2. Enter the Valid from and Valid to values to ensure that the certificate is valid.
3. Click Save to save your new Certification Authority. It will now be listed in the Certification Authority list under
Admin > Certificates > Certification Authority, and is ready to be used.
To manage the Certification Authority, select the check box next to the Certification Authority in the list and use the
contact menu (left-click the Certification Authority) or the Action button on the bottom of the page. Available
options are Edit the Certification Authority (see the steps above), Delete it completely or Import Public Key and
Export a Public key.
NOTE: If you are using custom certificates that are not in Base64 format, they will need to be converted to Base64
format (alternatively, you can export these certificates as described above). This is the only format accepted by ERA
components to connect to ERA Server. For more details about how to convert certificates see http://linux.die.net/
man/1/base64 and https://developer.apple.com/library/mac/documentation/Darwin/Reference/ManPages/man1/
base64.1.html. For example:
'cat ca.der | base64 > ca.base64.txt' a 'cat agent.pfx | base64 > agent.base64.txt'
Choose file to upload: click Browse and navigate to the file you want to import.
245
Enter a Description for the certificate and click Import. The Certification Authority is now successfully imported.
246
4.8.1 Users
ERA Web Console can have users of various Permission Sets. The user with the most permissions is the
Administrator, with full rights and permissions. To ease usage in Active Directory, users from Domain Security
Groups can be allowed to log into ERA. Such users can exist next to ERA Native Users, however, the Permission Sets
are set for the Active Directory security group (instead of for individual users, as in the Native User case).
User management is part of the Admin section of the ERA Web Console.
NOTE: A fresh ERA installation has the Administrator (Native User) as the only account.
247
Basic
Enter a Username and an optional Description for the new user.
Authentication
The password for the user should have at least 8 characters. The password should not contain the username.
Account
Leave Enabled selected unless you want the account to be inactive (if you intend to use it later).
Leave Have to change password deselected (selecting this will force the user to change their password the first
time that they log into the ERA Web Console).
The Password expiration option defines the number of days that the password is valid, it needs to be changed
after that.
The Autologout(min) option defines the idle time period (in minutes), after which the user is logged out of Web
Console.
Full Name, Email contact and Phone contact can be defined to help identify the user.
Permission set
Assign competences (rights) for the user. You can select a pre-defined competence: Reviewer permission set
(similar to read-only rights) or Administrator permission set (similar to full access) or Server assisted installation
permission set (similar to read-only rights) or you can use a custom Permission set.
Summary
Review the settings configured for this user and click Finish to create the account.
Basic
Domain group
Enter a Name for the group, you can also enter a group Description. The group will be defined by a Group SID
(security identifier). Click Select to select a group from the list and then click OK to confirm.
Account
248
Basic
Domain group
Enter a Name for the group, you can also enter a group Description. The group will be defined by a Group SID
(security identifier). Click Select to select a group from the list and then OK to confirm.
Account
Leave Enabled selected to make the user active.
The Autologout (min) option defines the idle time period (in minutes), after which the user is logged out of the
Web Console.
Mail contact and Phone Contact are optional and can be used to identify the user.
249
Permission set
Assign competences (rights) for the user. You can use a pre-defined competence: Reviewer permission set (similar
to read-only rights), Administrator permission set (similar to full access) or Server assisted installation permission
set (permission to perform ERA Agent installation locally on a client computer ) , or you can use a custom permission
set.
Summary
Review the settings configured for this user and click Finish to create the group.
In the Users section, edit a specific user by clicking Edit... and select the check box next to a specific permission set
in the Unassigned (Available) Permission Sets section.
250
251
Functionality
Select individual modules for which you want to grant access. The user with this competence will have access to
these specific tasks. It is also possible to Grant all modules read-only and Grant all modules full access, but such
competences already exist - Administrator competence (full access) and Reviewer competence (read only).
Granting Write/Execute rights automatically grants Read rights.
Static Groups
You can add a Static Group (or multiple Static Groups) that will take this competence (and take over the rights
defined in the Modules section), grant all Static Groups read-only access or grant all Static Groups full access. You
can only add Static Groups, because the granted permissions sets are fixed for certain users or groups.
User Groups
You can add a User Group (or multiple User Groups) of ESET Mobile Device Management for iOS.
Users
All available users are listed on the left. Select specific users or select all users using the Add All button. Assigned
users are listed on the right.
Summary
Review the settings configured for this competence and click Finish.
Click Save as to create a new template based on the template you are editing. You will be required to enter a name
for the new template.
252
253
Syslog messages will be sent to the Syslog server via UPD (User Datagram Protocol). If you also want to have client
computer logs/events sent to your Syslog server, use the switch next to Export logs to Syslog to enable it. Click Save.
NOTE: The regular application log file is constantly being written to. Syslog only serves as a medium to export
certain asynchronous events such as notifications or various client computer events.
254
Exported events
This section contains details on the format and meaning of attributes of all exported events. The event message is
in the form of a JSON object with some mandatory and some optional keys. Each one exported event will contain
the following key:
event_type
string
ipv4
string
ipv6
string
source_uuid
string
occurred
string
severity
string
ThreatEvent
All Threats events generated by managed endpoints will be forwarded to Syslog. Threat event specific key:
threat_type
string
threat_name
string
threat_type
string
threat_flags
string
scanner_id
string
optional Scanner ID
scan_id
string
optional Scan ID
engine_version
string
object_type
string
object_uri
string
action_taken
string
action_error
string
threat_handled
bool
need_restart
bool
username
string
processname
string
circumstances
string
string
source_address
string
source_address_type string
source_port
number
target_address
string
target_address_type string
target_port
number
protocol
string
optional Protocol
account
string
process_name
string
rule_name
string
rule_id
string
optional Rule ID
inbound
bool
threat_name
string
aggregate_count
number
optional How many exact same messages were generated by the endpoint
between two consecutive replications between ERA Server and
managing ERA Agent
256
Events from Host-based Intrusion Prevention System are filtered on severity before they are sent further as Syslog
messages. Only events with severity levels Error, Critical and Fatal are sent to Syslog. HIPS specific attributes are as
follows:
application
string
operation
string
optional Operation
target
string
optional Target
action
string
optional Action
rule_name
string
rule_id
string
optional Rule ID
aggregate_count
number
optional How many exact same messages were generated by the endpoint
between two consecutive replications between ERA Server and
managing ERA Agent
257
258
4.10.1 Activation
Navigate to Admin > License Management and click Add Licenses.
Type or copy and paste the License key you received when you purchased your ESET security solution in to the
License Key field. If you are using legacy license credentials (a Username and password), convert the credentials
to a license key. If the license is not registered, it will trigger the registration process, which will be done on the
ELA portal (ERA will provide the URL valid for registration based on the origin of the license).
Enter the Security Admin account credentials (ERA will display all delegate licenses later in ERA License Manager).
259
Enter the Offline license file - you need to export using the ELA portal and include the information about
product(s) ERA is able to manage. You will need to enter a specific License file token into ESET License
Administrator portal when generating an offline license file, otherwise the license file won't be accepted by ESET
Remote Administrator.
260
Go back to ERA License Management, click Add licenses, Browse for the offline license file you've exported in ELA
and then click Upload.
261
5. Diagnostic Tool
Diagnostic tool is a part of all ERA components. It is used to collect and pack logs that are used by developers to
solve problems with product components. Run the Diagnostic tool, select a root folder where the logs will be saved,
and then select the actions to be taken (see Actions below).
Location of the Diagnostic Tool:
Windows
Folder C:\Program Files\ESET\RemoteAdministrator\<product>\ , a file called Diagnostic.exe.
Linux
Path on the server: /opt/eset/RemoteAdministrator/<product>/ , there is a Diagnostic<product> executable (one
word, for example, DiagnosticServer, DiagnosticAgent)
Actions
Dump logs - A logs folder is created where all logs are saved.
Dump process - A new folder is created. A process dump file is generally created in cases where a problem was
detected. When a serious problem is detected, a dump file is created by system. To check it manually, go to the
folder %temp% (in Windows) or folder /tmp/ (in Linux) and insert a dmp file.
NOTE: Service (Agent, Proxy, Server, RD Sensor, FileServer) must be running.
General application information - The GeneralApplicationInformation folder is created and inside it the file
GeneralApplicationInformation.txt. This file contains text information including the product name and product
version of the currently installed product.
Action configuration - A configuration folder is created where file storage.lua is saved.
262
6. FAQ
Q: V5 has a Custom Client Info field. This is helpful for our MSPs to determine which client belongs to each of their
customers. Does this exist in v6?
A: Dynamic Groups, which are little bit different (evaluated on agent level) do not allow for the creation of custom
parameters / tagging". You can, however, generate a report to display custom client data.
Q: How do you resolve the error Login Failed, Connection has failed with the state of 'Not connected'?
A: Check if ERA Server service is running or MS SQL Server service.If not, start it. If it is running, restart the service,
refresh web console and then try to log in again.
Q: What is the group "Lost and Found" used for?
A: Each computer that connects to ERA server and is not a member of any static group is automatically displayed in
this group. You can work with the group and the computers inside it as with computers in any other static group. The
group can be renamed or moved under another group but it can't be deleted.
Q: How do you create a dual update profile?
A: See our ESET Knowledgebase article for step-by-step instructions.
Q: How do you refresh the information on a page or in a section of the page without refreshing the entire browser
window?
A: Click refresh in the context menu at the top right of a section of the page.
Q: How do you perform a silent installation of the ERA Agent?
A: You can use a GPO as a Startup script to achieve this. At this time it is not possible to perform a silent installation
from Web Console.
Q: Rogue Detection Sensor does not detect all clients on network.
A: RD sensor passively listens to network communication on the network. If PCs are not communicating, they are
not listed by RD Sensor. Check your DNS settings to make sure that issues with DNS lookup are not preventing
communication.
Q: How do I reset the Active threats count shown in ERA after cleaning threats.?
A: To reset the number of active threats, a full (In-depth scan) needs to be started via ERA on the target
computer(s). If you have cleaned a threat manually, you can mute the appropriate alert.
Q: How do I set up CRON expression for the ERA Agent connection interval?
A: P_REPLICATION_INTERVAL accepts a CRON expression.
Default is "R R/20 * * * ? *" which means connecting at random second (R=0-60) every random 20th minute (for
example 3, 23, 43 or 17,37,57). Random values should be used for load balancing in time. So every ERA Agent is
connecting in different random time. If an accurate CRON is used, for example "0 * * * * ? *", all Agents with this
setting will connect at the same time (every minute at :00 second) there will be load peaks on server in this time.
Q: How do I create new Dynamic Group for automatic deployment?
A: See our Knowledgebase article for step-by-step instructions.
Q: When importing a file containing a list of computers to add to ERA, what is the format required for the file?
A: File with following lines:
All\Group1\GroupN\Computer1
All\Group1\GroupM\ComputerX
All is the required name of root group.
Q: Which 3rd party certificates can be used to sign ERA certificates?
A: The certificate has to be CA (or intermediate CA) certificate with the 'keyCertSign' flag from 'keyUsage' constraint.
This means that it can be used for signing other certificates.
263
Q: How do I reset the Administrator password for Web Console (The password entered during set up on Windows
Operating Systems)?
A: It is possible to reset the password by running the server installer and choosing Repair. Note that you may require
the password for the ERA database if you did not use Windows Authentication during creation of the database.
NOTE: Please be careful, some of the repair options can potentially remove stored data.
Q: How do I reset the Administrator password for Web Console (Linux, entered during set up)?
A: If you have another user in ERA with sufficient rights, you should be able to reset the administrator account
password. However, if administrator is the only account (as it is created upon installation) in the system, you cannot
reset this password.
You reinstall ERA, search for the DB entry for the Administrator account, and update the old DB according to this
entry. In general the best practice is to back up credentials for Administrator in a safe location and create new
users with upir desired set of privileges. The Administrator account should ideally not be used for purposes other
than creating other users or resetting their accounts.
Q: How to troubleshoot if RD Sensor is not detecting anything?
A: If your OS is detected as a network device, it won't be sent to ERA as a computer. Network devices (printers,
routers) are filtered out. RD Sensor was compiled with libpcap version 1.3.0, please verify that you have this version
installed on your system. The second requirement is a bridged network from your virtual machine where RD Sensor
is installed. If these requirements are met, run nmap with OS detection (http://nmap.org/book/osdetectusage.html) to see whether it can detect the OS on your computer.
264
265