In this section, we explain several of the key configuration
entries for ESET Smart Security and ESET NOD32 Antivirus, available
through the ESET Configuration Editor:
·
|
ESET Smart Security, ESET NOD32 Antivirus > ESET
Kernel > Setup >
Remote administration
Here you can enable communication between client computers and the
ERAS (Connect to Remote Administrator
server). Enter the name or IP address of ERAS (Server address). The Interval between connections to server
option should be left at the default value of five minutes. For
testing purposes, this value can be decreased to 0, which will
establish a connection every ten seconds. If a password is set, use
the one which was specified in ERAS. For more information, see the
Password for Clients option in
the Security tab chapter.
Additional information on password configuration can also be found
in this section. |
·
|
ESET Kernel > Setup > License keys
Client computers require no license keys to be added or managed.
License keys are only used for server products. |
·
|
ESET Kernel > Setup > ThreatSense.Net
This branch defines the behavior of the ThreatSense.Net Early
Warning System, which allows submission of suspicious files for
analysis to ESETs labs. When deploying ESET solutions to
a large network, the Submit suspicious files and Enable submission of anonymous statistical information
options are particularly important: If these are set to
Do not submit or No, respectively, the ThreatSense.Net System is
completely disabled. To submit files automatically without user
interaction, select Submit without asking
and Yes, respectively. If a proxy
server is used with the Internet connection, specify the connection
parameters under ESET Kernel > Setup
> Proxy server.
By default, the client products submit suspicious files to ERAS,
which submits them to ESETs servers. Therefore, the proxy server
should be correctly configured in ERAS (Tools
> Server Options > Advanced >
Edit Advanced Settings > ERA Server > Setup
> Proxy server). |
·
|
Kernel > Setup > Protect setup
parameters
Allows the administrator to password-protect the setup parameters.
If a password is established, it will be required in order to
access the setup parameters on client workstations. However, the
password will not affect any changes to the configuration made from
ERAC. |
·
|
Kernel > Setup > Scheduler /
Planner
This key contains the Scheduler/Planner options, which allow the
administrator to schedule regular antivirus scans, etc. |
NOTE: By default, all ESET security
solutions contain several predefined tasks (including regular
automatic update and automatic check of important files on
startup). In most cases, it should not be necessary to edit or add
new tasks.
·
|
ESET Kernel > Setup > Default user interface
values
The settings under Default user interface values (i.e.,
Show splash screen/Dont show splash screen) only apply modifications to
the clients default settings. The clients settings can then be
managed on a per-user basis and cannot be changed remotely. To
change the setting remotely the Suppress user settings option must be set
to Yes. The Suppress user settings option is only
available for clients running 4.0 or later ESET security
products. |
·
|
Update
This branch of the Configuration Editor allows you to define how
update profiles are applied. Normally, it is only necessary to
modify the predefined profile My profile and change the Update server, Username and Password
settings. If Update server is set to Choose Automatically, all updates will be
downloaded from ESETs update servers. In this case, please specify
the Username and Password parameters which were provided at the time
of purchase. For information on setting client workstations to
receive updates from a local server (Mirror), please see the
chapter titled Mirror server. For
more information on using the scheduler, see chapter Scheduler. |
NOTE: On portable devices such as
notebooks, two profiles can be configured one to provide updating
from the Mirror server and the other to download updates directly
from ESETs servers. For more information, see chapter Combined update for notebooks at the end
of this document.
|