General
How to Generate and Use an Access Token in Swagger UI for ESET APIs
Swagger is an open-source software framework that helps developers design, build, document, and consume RESTful Web services. Using the Swagger UI, you can interact directly with live APIs through a web-based interface, making it easier to test and ...
Creating a Dedicated API User and Assigning Permission Sets in ESET PROTECT Console
Requirements and limitations Only the Root or Superuser can create a user with access to API endpoints. We recommend creating a dedicated API user to separate your regular account from API activities. Log in as a Superuser (or Root) to your ESET ...
Delete Non-connecting Computers - ESET Protect
Open ESET PROTECT On-Prem in your web browser and log in. Click Tasks, expand Server Tasks and then select Delete Not Connecting Computers. Click New → Server Task. Figure 1-1 In the Basic section, type a Name for the task (Tags and Description field ...
Create a second Administrator in ESET Protect
Log in to ESET PROTECT Hub or ESET Business Account. Create a new ESET PROTECT user that needs Administrative access. Alternatively, you can edit the existing user. Click User management, hover the mouse cursor next to the name of an existing user ...
ESET Bridge (ESET Proxy) Configuration
ESET Bridge requirements and supported products: https://help.eset.com/ebe/4/en-US/?requirements_and_supported_products.html Installation on Windows (standalone installer) Install ESET Bridge on a computer running a supported OS. 1.Visit the ESET ...
Exclude Files or Folder from Real-time scanning - ESET Protect
Add a Performance exclusion Open ESET PROTECT On-Prem in your web browser and log in. Click Policies, select your desired policy for client computers and click Edit. Figure 1-1 Click Settings → Detection Engine, expand Exclusions, and then click Edit ...
Add and modify Device Control Policy/rules. - ESET Protect
I. Add a Device control rule on client workstations using a policy in ESET PROTECT On-Prem Endpoint users: Perform these steps on individual client workstations In this example, we block access to all Bluetooth devices for all users. Open ESET ...
Enable, Create, and Edit Web Control Rules - ESET Protect
Enable and edit Web control Endpoint users: Perform these steps on individual client workstations Open ESET PROTECT On-Prem in your web browser and log in. Click Policies and select the Built-in policy that you want to modify. Select the check box ...
Restore and Exclude Quarantined files - ESET Protect
1. Go to ESET Protect. Click More> Quarantine Tab 2. Select specific Hash you want to Restore and exclude, click three dots icon and click Restore and Exclude. Selected Hash/file will be restored and excluded from scanning. Note: Only restorable and ...
Reset the ESET Protect On-Prem Password
Click Start → Windows System → Control Panel. Figure 2-1 Click Programs and Features. Figure 2-2 Right-click ESET PROTECT Server and select Change from the context menu. Figure 2-3 Click Next. Figure 2-4 Click Repair. Figure 2-5 Complete all required ...
How to fix installation failed error for ESET management agent
1. Click Windows + R 2. Type appwiz.cpl then click Ok 3. Find the existing ESET Management Agent, right-click, then click Change 4. Click Next 5. Click Remove 6. Input the password or if the password was not set, click Next 7. Click Remove 8. Wait ...
UNBLOCKING OF WEBSITE WITH REVOKED/EXPIRED CERTIFICATE - ESET Protect
1. Go to Policies Tab and Click New Policy: 2. Go to Settings> Protections> Web Access Protection> URL List Management> Edit 3. Select the List of Allowed Addresses and Click Edit. 4. Add URL of the Website you want to unblock. Once done click ok and ...
How to Submit a Request for Technical Support
Kindly provide the following details: Company name : Contact person: Contact number : Email address : Product and Version : License Details (Public ID): No. of Seats: Operating system (if possible): Description of the issue or request (screenshot of ...