ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows



Similar documents
ESET Mobile Security Business Edition for Windows Mobile

Table of Contents. Introduction...9. Installation Program Tour The Program Components...10 Main Program Features...11

NetWrix USB Blocker. Version 3.6 Administrator Guide

NetWrix USB Blocker Version 3.6 Quick Start Guide

BitDefender Security for Exchange

Kaspersky Endpoint Security 10 for Windows. Deployment guide

Kaspersky Small Office Security User Guide

Best Practices for Deploying Behavior Monitoring and Device Control

AVG File Server. User Manual. Document revision ( )

Symantec Endpoint Protection Small Business Edition Implementation Guide

ESET CYBER SECURITY PRO for Mac Quick Start Guide. Click here to download the most recent version of this document

Configuration Information

Kaspersky Internet Security

Securing Your Business s Bank Account

ESET SMART SECURITY 9

2. Installation and System requirements

How McAfee Endpoint Security Intelligently Collaborates to Protect and Perform

Single Product Review - Bitdefender Security for Virtualized Environments - November 2012

Trusteer Rapport. User Guide. Version April 2014

SecuraLive ULTIMATE SECURITY

Sophos Endpoint Security and Control Help

WildFire. Preparing for Modern Network Attacks

Microsoft Forefront Endpoint Protection 2010 Evaluation Guide

AVG File Server User Manual. Document revision (8/19/2011)

Kaspersky Security for Business

KASPERSKY SECURITY FOR BUSINESS

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

Advanced Endpoint Protection Overview

HoneyBOT User Guide A Windows based honeypot solution

Spyware Doctor Enterprise Technical Data Sheet

Net Protector Admin Console

ESET NOD32 Antivirus. Table of contents

Attix5 Pro Server Edition

F-Secure Client Security. Administrator's Guide

Getting Ahead of Malware

What Do You Mean My Cloud Data Isn t Secure?

Basic Setup Guide. Remote Administrator 4 NOD32 Antivirus 4 Business Edition Smart Security 4 Business Edition

Kaspersky Total Security User Guide

Kaspersky Internet Security User Guide

Office 365 Windows Intune Administration Guide

Locking down a Hitachi ID Suite server

Sophos Computer Security Scan startup guide

Charter Business Desktop Security Administrator's Guide

Endpoint protection for physical and virtual desktops

Getting Started with Symantec Endpoint Protection

Installation Notes for Outpost Network Security (ONS) version 3.2

Kaspersky Endpoint Security 10 for Windows Administrator's Guide

SYMANTEC ENDPOINT PROTECTION SMALL BUSINESS EDITION

Introduction. PCI DSS Overview

Compulink Advantage Online TM

An Oracle Technical White Paper May How to Configure Kaspersky Anti-Virus Software for the Oracle ZFS Storage Appliance

End-user Security Analytics Strengthens Protection with ArcSight

Sophos Endpoint Security and Control Help. Product version: 11

BitDefender Client Security Workstation Security and Management

ESET Mobile Security Windows Mobile. Installation Manual and User Guide

Contents. Hardware Configuration Uninstalling Shortcuts Black...29

TANDBERG MANAGEMENT SUITE 10.0

ESET Mobile Security Windows Mobile

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

ESET SMART SECURITY 6

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

ES Exchange Server - How to Remove XMON

Endpoint Protection Administrator Guide

Remote Support Jumpoint Guide: Unattended Access to Computers in a Network 3. Requirements and Considerations to Install a Jumpoint 4.

Quickstart Guide. First Edition, Published September Remote Administrator / NOD32 Antivirus 4 Business Edition

ESET Mail Security 4. User Guide. for Microsoft Exchange Server. Microsoft Windows 2000 / 2003 / 2008

AVG File Server User Manual. Document revision (11/13/2012)

Data Sheet: Endpoint Security Symantec Endpoint Protection The next generation of antivirus technology from Symantec

SOS Suite Installation Guide

HOW TO PROTECT YOUR VIRTUAL DESKTOPS AND SERVERS? Security for Virtual and Cloud Environments

AVG 8.5 Anti-Virus Network Edition

McAfee Endpoint Protection for SMB. You grow your business. We keep it secure.

Configuration Information

Total Defense Endpoint Premium r12

Symantec Protection Suite Small Business Edition

Kaseya White Paper. Endpoint Security. Fighting Cyber Crime with Automated, Centralized Management.

ESET NOD32 ANTIVIRUS 9

NOD32 Antivirus 3.0. User Guide. Integrated components: ESET NOD32 Antivirus ESET NOD32 Antispyware. we protect your digital worlds

ESET MOBILE SECURITY FOR ANDROID

Host-based Intrusion Prevention System (HIPS)

Feature List for Kaspersky Security for Mobile

Symantec Endpoint Protection Small Business Edition Getting Started Guide

KASPERSKY LAB. Kaspersky Administration Kit version 6.0. Administrator s manual

Cyber Security: Software Security and Hard Drive Encryption

For Businesses with more than 25 seats.

F-Secure Internet Gatekeeper Virtual Appliance

ESET NOD32 Antivirus 4

Product Guide. McAfee Endpoint Security 10

ESET SHARED LOCAL CACHE

Endpoint Protection Small Business Edition 2013?

Ekran System Help File

Maintenance Guide. Outpost Firewall 4.0. Personal Firewall Software from. Agnitum

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice.

WildFire Reporting. WildFire Administrator s Guide 55. Copyright Palo Alto Networks

Additionally, you can run LiveUpdate manually to check for the latest definitions directly from Symantec:

Transcription:

ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details

ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity and lets the user or admin know if there is something out of order. The 6th generation of our Endpoint security with ESET Remote Administrator management console makes it a powerful solution for businesses of all sizes. 1. NEW FEATURES Anti-Phishing Anti-Phishing technology protects users from attempts to acquire passwords, banking data and other sensitive information by fake websites masquerading as legitimate ones. When user s computer attempts to access an URL, ESET systems compare it against our database of known phishing sites. If a match is found, connection to the URL is aborted and a warning message is displayed. At this point, user has as well the option to proceed to the URL at his/her own risk or report the URL to us as a potentially false positive warning. Exploit Blocker Exploit Blocker has been designed to fortify often exploited application types on users systems, such as web browsers, PDF readers, email clients or MS Office components. It adds another layer of protection, one step closer to attackers, by using a completely different technology compared to techniques focusing on detection of malicious files themselves. Instead, it monitors behavior of processes and watches for suspicious activity typical for exploits. When triggered, the behavior of the process is analyzed. If considered suspicious, the threat may be blocked immediately on the machine, with further metadata about the attack being sent to ESET LiveGrid cloud-reputation system which gives Exploit Blocker the potential to protect users against targeted attacks and previously unknown exploits, so called zero-day attacks. Advanced Memory Scanner Advanced Memory Scanner couples nicely with Exploit Blocker, as it is also designed to strengthen the protection against modern malware. In an effort to evade detection, malware writers extensively use file obfuscation or/and encryption. This causes problems with unpacking such threats and might pose a challenge to bypass for ordinary antimalware techniques, such as emulation or heuristics. To tackle this problem, the Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in the memory. This allows for effective infection prevention even from heavily obfuscated malware. Unlike Exploit Blocker, this is a post-execution method, which means that there is a risk that some malicious activity could have been performed already. However, it steps into the protection chain as a last resort when all other detection techniques have been bypassed. Vulnerability Shield Vulnerability shield is an extension of Two-way Firewall that improves detection of known vulnerabilities on the network level. By implementing detections for common vulnerabilities in widely used protocols, such as SMB, RPC and RDP, it constitutes another important layer of protection against spreading malware, network-conducted attacks and exploitations of vulnerabilities for which a patch has not been released or deployed yet.

Specialized cleaners This functionality is a bundle of most relevant critical malware standalone cleaners for malware which commonly cause problems. Specialized cleaners help with malware that cannot be removed by regular cleaner. This bundle will be updated as needed and placed in Help and Support page. ESET Shared Local Cache ESET Endpoint solutions are now optimized for deployment in virtual environments. ESET Shared Local Cache adds value when scanning for threats on the same virtual environment. It caches metadata of already scanned clean files and compares every single scan data with the cached information. As the communication happens over the same physical hardware, there is practically no delay in scanning. Caching boosts the performance up to 40-80% depending on network topology (preliminary data, achieved on ESET internal network). Optimization for revert to default snapshot state When virtualized it is a common practice that machines are often reverted to their default snapshot state, even in case of a simple shut down. In this case data is stored on a different (logical) drive. ESET improves its detection technologies over time and provides frequent modular updates. These files together with virus signature files are stored outside of the default location to prevent repetitive downloads and updating from the same data after each revert as the amount of data downloaded rises with the increasing age of the default snapshot. Configuring this will be available during the initial installation of the program. This feature cannot be pre-configured before installation. User selects different folders for data and folder structures may vary. Idle-State Scanner Idle-State Scanner will aid system performance by performing full scan proactively when the computer is not in use. It helps to speed up next scanning by populating local cache. First Scan after Installation Performing low priority on-demand scan 20 minutes after installation, First scan after installation assures protection from the beginning. Ease of use The new architecture of advanced setup tree, new user interface and easier to find and use actions contribute to improved user experience that addresses addresses users needs. The new version has simple navigation and together with ESET Remote Administrator v6, it creates one family with unified look and feel. Optimization for virtual environments ESET will provide agentless solution for platforms supporting such approach. ESET also modified the existing solutions for virtual environments, so that customers can install resource-effective solution without compromises. The new ESET Endpoint solution is optimized for working within virtual environment. It is capable of storing already scanned files in ESET Shared Local Cache so it does not have to scan the same files over and over again. In addition, virtual machines with revert to default snapshot state function enabled will not have to download whole virus signature database every time after restart.

New Licensing System New licensing framework integrations simplify the deployment and long-term usage of ESET security software. Licenses are now automatically updated in all products regardless of changes made. The customer is able to exchange license information for simple to remember e-mail address with his custom password. With new licensing system featuring new format of license keys and automatic license update (upon renewal / or any other license operation), customers can be sure that they stay protected. The optional licensing portal and possibility of license rights authorization towards e-mail based license account simplify license management, deployment, merging of licenses or delegation of licenses towards other entities (even a 3rd party, without losing control over the license). 2. NEW GRAPHIC USER INTERFACE Completely redesigned graphic user interface (GUI) of ESET endpoint security solutions makes it easy to use them and manage them. Information that was previously difficult to find is now easily accessible. Touch screens support ESET introduces support for touch screens and high resolution displays. The following features contribute towards improved usability of our products on tablets and ultra-books running Windows 8: Optimization and modification of the main GUI to fit the high-resolution screen. More padding to main GUI elements. Rearrangement of GUI elements to with respect to the touch interface. Basic frequently used actions accessible from tray menu. Hide GUI The new version of the ESET Endpoint solution fulfills the needs of virtually any organization. Based on the users roles in the organization it is now possible to decide whether the GUI of the security solution will be hidden from the end user or displayed to the end user. By hiding GUI partially or completely the presence of Endpoint solution may be lowered to minimum. Even without tray icon and process egui.exe which results in lower hardware resources consumption. Most commonly, system administrators want the security solution to be as transparent to the end users as possible. The security of endpoints in the network is mainly the concern of system administrator rather than end user. Therefore, notifications are more relevant within the remote management console, visible to administrator. Advanced setup redesign Alongside the main product user interface, ESET has redesigned also the advanced setup. Thetructure has been reengineered together with layout. The overall format now matches its counterpart in ESET Remote Administrator. The main goal was to simplify the usage, improve the navigation and user understanding.

3. IMPROVED FEATURES Device Control Improvements which make the feature easier to navigate and configure were implemented. Creation of rules, especially by allowing the enumeration of a connected device or creation of a single rule to multiple devices is now simplified. In addition, user will be able to import the list of device Vendors, Models and Serials from a file. ESET also introduces a soft blocking rule - warning, allowing notifying the end user that the device is blocked as a result of company policy. Despite the fact, the end user will have an option to use the device anyway while activity will be logged. Web Control To a certain level, warning or blocking pages may be customized. Administrator may include a short message or contact so the user knows who to contact in order to solve the situation. As in Device Control, a soft blocking rule was implemented. It notifies the end user that the website is blocked as a result of company policy. End user has an option to access the website anyway while activity will be logged. Firewall Aside from simplifying configuration and creation of firewall rules (with pre-defined default values, which solve most common use-cases), the functionality should allow for firewall profiles to be assigned to network interfaces, as well as to the combination of network locations and network interfaces. However, this feature is only supported on Windows Vista SP1 and newer systems. Older systems keep old behavior only one global active profile. Administrators interested in configuring the client firewall to more detail will be able to review all rules that are applied to network traffic in order to be able to modify them if necessary. The following features will contribute to enhanced user experience of firewall: Rules can be created directly from a log Rules evaluation - rules will be evaluated from top to bottom and can be simply reordered to change importance Troubleshooting wizard This wizard will guide the user through a set of questions resulting in identification of the rule that the user might have experienced problem with. The user will be able to create new rules that fit the needs directly from the wizard. In addition, the concept of Profiles, Zones, Network interfaces, Trusted zone, Subnets was simplified and reworked. ESET introduces Known networks for easier and understandable use. Installation The new installer will offer standard functionality of detecting and uninstalling competitive solutions before migration to ESET Endpoint solution. Wide range of supported competitive solutions on 32 and 64-bit systems can be uninstalled by ESET installer. When installing the new generation of ESET Endpoint solutions, migration of settings will be available to help migration to the new product generation.

Update of Virus Signature Database or Modules ESET introduces Resume failed download functionality. When an update of Virus Signature Database or update of Modules is interrupted, new ESET Endpoint solutions will resume the failed download and it would not have to be downloaded from scratch. This will contribute to lower use of bandwidth and faster updates. Log files Automatic scrolling function when generating Log files was bothering many of our customers. In the improved Log files section, we have placed a switch to turn automatic scrolling off closer to the customer, right where he needs it. 4. SYSTEM REQUIREMENTS For the seamless operation of ESET Endpoint Solution for Windows 6th gen. the system should meet the following hardware and software requirements: Processor: Intel or AMD x86-x64, Operating Systems: Microsoft Windows 8.1/8/7/Vista/XP