Allows you to define processes which are ignored by the real-time protection module – especially useful for backup or live virtual machine migration.
Allows you to choose to install only those components you need:
- Real-Time File System Protection
- Web and Email
- Device Control
- Graphical User Interface (GUI)
- ESET Log Collector
- and more
ESET Security solutions come fully manageable via ESET Remote Administrator, delivering a perfect “look & see” overview of the network security status.
ESET Log Collector
Collects all logs relevant for troubleshooting into one archive, which can be emailed or uploaded to a shared network drive to speed up the troubleshooting process.
Optimized for the Virtual Environment
ESET Shared Local Cache stores the metadata of scanned files so replica files on one machine are not scanned again on other virtual machines.
Native Clustering Support
Interconnect several installed nodes of ESET Security for Microsoft SharePoint Server within a cluster and manage them as one, eliminating the need to replicate changes in configuration manually.
Windows Management Instrumentation (WMI) Provider
Monitors key functionalities of ESET Security via WMI framework. This allows integration of ESET Security solution into third-party management and SIEM software.
Updates and program modules can be stored outside of the default location – so updates and modules don’t have to be downloaded every time a virtual machine is reverted to an earlier snapshot.
Database scan queries can be parallelized into multiple scanning threads to significantly improve on-demand scanning time.
Antivirus and Antispyware Protection
Eliminates all types of threats, including viruses, rootkits, worms and spyware with optional cloud-powered scanning for even better performance and detection.
Exploit Blocker - Fighting Targeted Attacks
New detection technology that strengthens protection against targeted attacks and previously unknown exploits – i.e. zero-day attacks.
Content processing rules
Customize and chain object scanning rules, e.g. real file type, file size, corrupted or password-protected archives and match the rules towards a specific action.