32
The second configuration (shown in the figure below) sent to clients will ensure that previous modifications are
preserved, including the username
EAV- 12345678
and password. This configuration will also allow the use of a proxy
server and defines its address and port.
3.7.2 Key configuration entries
In this section, we explain several of the key configuration entries for ESET Smart Security and ESET NOD32 Antivirus,
available through the ESET Configuration Editor:
ESET Smart Security
,
ESET NOD32 Antivirus
>
ESET Kernel
>
Setup
>
Remote administration
Here you can enable communication between client computers and the ERAS (
Connect to Remote Administrator
server
). Enter the name or IP address of ERAS (
Server address
). The
Interval between connections to server
option
should be left at the default value of five minutes. For testing purposes, this value can be decreased to 0, which will
establish a connection every ten seconds. If a password is set, use the one which was specified in ERAS. For more
information, see the
Password for Clients
option in the
Security tab
chapter. Additional information on password
configuration can also be found in this section.
ESET Kernel
>
Setup
>
License keys
Client computers require no license keys to be added or managed. License keys are only used for server products.
ESET Kernel
>
Setup
>
ThreatSense.Net
This branch defines the behavior of the ThreatSense.Net Early Warning System, which allows submission of
suspicious files for analysis to ESET’s labs. When deploying ESET solutions to a large network, the
Submit suspicious files
and
Enable submission of anonymous statistical information
options are particularly
important: If these are set to
Do not submit
or
No
, respectively, the ThreatSense.Net System is completely disabled.
To submit files automatically without user interaction, select
Submit without asking
and
Yes
, respectively. If a proxy
server is used with the Internet connection, specify the connection parameters under
ESET Kernel > Setup >
Proxy server
.
By default, the client products submit suspicious files to ERAS, which submits them to ESET’s servers. Therefore, the
proxy server should be correctly configured in ERAS (
Tools > Server Options > Advanced > Edit Advanced Settings
> ERA Server > Setup > Proxy server
).
Kernel
>
Setup
>
Protect setup parameters
Allows the administrator to password-protect the setup parameters. If a password is established, it will be required in
order to access the setup parameters on client workstations. However, the password will not affect any changes to
the configuration made from ERAC.
Kernel
>
Setup
>
Scheduler / Planner
This key contains the Scheduler/Planner options, which allow the administrator to schedule regular antivirus scans,
etc.
NOTE:
By default, all ESET security solutions contain several predefined tasks (including regular automatic update and
automatic check of important files on startup). In most cases, it should not be necessary to edit or add new tasks.
74