27
•
Password for ESET Remote Installer (Agent)
Sets password for the installer agent to access the ERAS. Relevant for remote installations
•
Enable unauthenticated access for Clients (ESET Security Products)
Enables access to ERAS for those clients which do not have a valid password specified (if current password is
different from
Password for Clients
).
•
Enable unauthenticated access for Replication
Enables access to ERAS for clients of lower ERA Servers which do not have a valid password for replication
specified.
•
Enable unauthenticated access for ESET Remote Installer (Agent)
Enables access to ERAS for those installer agents, which do not have a valid password for replication specified.
NOTE:
If authentication is enabled both in ERAS and on all [generation 3.x] clients, the option
Enable unauthenticated
access for Clients
can be disabled.
4.6.3
Server Maintenance tab
If correctly configured in the
Server Maintenance
tab, the ERAS database will be automatically maintained and
optimized, with no need for further configuration. By default, entries and logs older than six months are deleted,
and the
Compact & repair
task is performed every fifteen days.
For more detailed configuration, the
Server Maintenance
tab offers the following options:
•
Only keep the latest X threats for each client
Keeps only the specified number of virus incidents for each client
•
Only keep the latest X firewall logs for each client
Keeps only the specified number of firewall logs for each client
•
Only keep the latest X events for each client
Keeps only the specified number of system events for each client
•
Only keep the latest X scan logs for each client
Keeps only the specified number of scanner logs for each client
•
Delete clients not connected for the last X months (days)
Deletes all clients that have not connected to ERAS form more than the specified number of months (or days)
•
Delete threat logs older than X months (days)
Deletes all virus incidents older than the specified number of months (or days)
•
Delete firewall logs older than X months (days)
Deletes all firewall logs older than the specified number of months (or days)
•
Delete event logs older than X months (days)
Deletes all system events older than the specified number of months (or days)
•
Delete scan logs older than X months (days)
Deletes all scanner logs older than the specified number of months (or days)
4.6.4
Logging tab
During operation, ERAS creates a log (
Log filename
) about its activity which is configurable (
Log verbosity
). If the
Log to text file
option is selected, new log files will be created (
Rotate when greater than X MB
) and deleted on
a daily basis (
Delete rotated logs older than X days
).
The
Log to OS application log
option allows information to be copied to the system event viewer log (accessible via
Windows
Control Panel > Administrative Tools > Event viewer
).
The
Debug Log
option should be disabled under normal circumstances.
By default, the text file output is saved to the following location:
%ALLUSERSPROFILE%\Application Data\Eset\Eset Remote Administrator\Server\logs\era.log
NOTE:
We recommend leaving the
Log verbosity
set to
Level 2 – Above + Session Errors
.
Change the log level only if you are
experiencing problems, or if you are advised to do so by ESET’s Customer Care specialists.
4.6.5
Replication tab
The concept of “Replication” has been already mentioned in the section 2.1.2, “ERAS hierarchy at large networks.”
Replication is used primarily in large networks where multiple ERA Servers are installed throughout an
organization, in various branches / departments.
The options in the
Replication
tab are divided into two sections: