ESET Virtual Appliance Remotely Manages Network Endpoint Security

By Frank Ohlhorst  |  Posted 2015-08-16 Print this article Print
ESET Network Security

They could even use a link in an email sent out to the end user. Finally, administrators also have the option of conducting what is referred to as a "remote installation," which can be a major time-saver on enterprise networks.

The remote installation is executed via the ERA management console's Server Task menu as a function of the agent deployment wizard—which is then used to identify target systems. The administrator will need to provide the suitable credentials for the target endpoints. However, that should not be difficult on a managed network, especially a Windows network using Active Directory.

Speaking of Active Directory, it is important to note that ERA v6 offers full integration with AD, allowing the product to query critical information, such as users, computers that are members of the domain and so on. That AD integration further simplifies deployment as well as management of security settings on various PCs throughout the enterprise.

ERA v6: Critical Features

ERA v6 offers several critical features that help secure enterprise networks. First and foremost is the product's ability to administer ESET Endpoint V6 security components. Simply put, ERA v6 offers full control of the settings, policies, updates and deployment of security on the endpoint, while also providing the tools to monitor and report on those endpoints.

ERA v6 brings to the table several other features that are quickly becoming a must-have for security administrators today. Of particular note is the rogue system detection capability, which looks for and reports on unprotected systems connecting to the network. That's critical on today's networks, where spyware and malware can infect complete networks when a new device connects to the network.

Advanced reporting features are also readily apparent in the product. Administrators can use the integrated report writer to build custom reports if the hundreds provided do not meet their specific needs.

Reports can include graphical elements, such as charts and diagrams, which bring a visual perspective to those that may not quickly understand plain-vanilla text and numbers. Numerous filters and sort options are also part of the reporting engine.

Arguably, one of the most important features is the ability to create custom policies. Administrators can use the product's wizard-based tools to create and enforce policies that include everything from security settings, to software deployment, to executing scripted tasks—really anything one can imagine. Furthermore, policies can be applied to specific machines, groups, domains or ERA v6 can execute policies based on Boolean logic.

While full automation is nice to have in a network security product, nothing beats staying informed. Here, ERA v6 offers a notification system that uses a wizard to define what events should be reported to administrators and how those notifications are delivered. For example, notifications can be sent via email, Short Message Service (SMS) or other methods, such as a security incident event management system.


Submit a Comment

Loading Comments...
Manage your Newsletters: Login   Register My Newsletters

Rocket Fuel