background image

55

after the name of an imported policy.

5.3.5   Viewing policies

Policies in the Policy Tree structure can be viewed directly in the Configuration Editor by clicking 

View...

 or

View Merged...

.

View Merged

 – Displays the merged policy created as a result of inheritance (the process of inheriting applies settings

from the parent policy). This option is displayed by default, because the current policy is already a merged policy.

View

 – Displays the original policy before it was merged with a parent policy.

On lower servers, the following options are available for policies inherited from upper servers:

View Merged

 – Same as above

View Override Part

 – This button applies for policies with the attribute Override any child policy. This option only

shows the forced part of the policy – i.e. the one which has priority over other settings in child policies.

View Non-force part

 – Has opposite effect of View Override Part – only displays active items, to which Override… is

not applied.

5.3.6   Importing/Exporting policies

The Policy Manager allows you to import/export policies and policy rules. Existing policies can be imported/exported
from/to an 

.xml

 file by clicking the 

Import Policies.../Export Policies...

 button. The policies can furthermore be

imported from groups by clicking the 

Import from Groups...

 button. Policy rules can be imported/exported by clicking

the 

Import.../Export...

 button and, in addition, they can be created using the 

Policy Rules Wizard

.

Name conflicts (the existing and the imported policy names are identical) are solved during the import by adding a
random string to the name of the imported policy. If a conflict cannot be resolved in this fashion (usually due to the new
name being too long) the import finishes with the warning 

Unresolved policy name conflict

. The solution is to delete or

rename the conflicting policies or policy rules.

5.3.7   Assigning policies to clients

There are two main rules for assigning policies to clients:

1. Local (primary) clients can be assigned any local policy or any policy replicated from upper servers.

2. Clients replicated from lower servers can be assigned any local policy with the 

Down replicable

 attribute or any

policy replicated from upper servers. They cannot be forced to adopt policies from their own primary server (to do so,
you must connect to that server with ERAC).

An important feature is that each client is assigned some policy (there is no such thing as clients with no policy). Also,
you cannot take a policy away from a client. You can only replace it with another policy. If you do not want to apply
a configuration from any policy to a client, create an empty policy.

5.3.7.1   Default Primary Clients Policy

One method of assigning policies is automatic application of the Default Primary Clients Policy, a virtual policy that is
configurable in Global Policy Settings. This policy is applied to primary clients, i.e. those directly connected to that ERAS.
For more information see chapter 

Virtual policies

.

5.3.7.2   Manual assigning

There are two ways to manually assign policies: Right-click a client in the 

Clients

 pane and select 

Add Policy

 from the

context menu, or click 

Add Clients

 > 

Add/Remove

 in the Policy Manager.

Clicking 

Add Clients

 in the Policy Manager opens the 

Add/Remove

 dialog window. Clients are listed on the left in the

format Server/Client. If the 

Down replicable policy

 is selected, the window will also list clients replicated from lower

servers. Select clients to receive the policy by using the drag-and-drop method or clicking 

>>

 to move them to

Selected items

. Newly selected clients will have a yellow asterisk and can still be removed from 

Selected items

 by

clicking the 

<<

 or 

C

 button. Click 

OK

 to confirm the selection. 

NOTE:

 After confirming, if you reopen the 

Add/Remove

 dialog window, clients cannot be removed from

Selected items

, you can only replace the policy. 

54

Содержание REMOTE ADMINISTRATOR 4

Страница 1: ...ESET Remote Administrator 4 Installation Manual and User Guide...

Страница 2: ...ay be reproduced stored in a retrieval systemor transmitted in any formor by any means electronic mechanical photocopying recording scanning or otherwise without permission in writingfromthe author ES...

Страница 3: ...Colors tab 3 5 3 29 Paths tab 3 5 4 29 Date Time tab 3 5 5 30 Other settings tab 3 5 6 30 Display modes 3 6 31 ESET Configuration Editor 3 7 31 Configuration layering 3 7 1 32 Key configuration entrie...

Страница 4: ...10 1 1 85 What is the meaningof the GLEerror code 10 1 2 85 Frequently encountered error codes 10 2 85 Error messages displayed when usingESET Remote Administrator to remotely install ESET Smart Secu...

Страница 5: ...osoft Exchange Server support for Linux Mac desktop security solution ESET NOD32 Antivirus 4 support for ESET Mobile Security New features Remote Installation new design Group Management new design St...

Страница 6: ...tion MAC address added extended remote installation support of msi and custom packages security enhancements encryption possibility for all new server clients performance improvements compression in c...

Страница 7: ...tasks remote installation requests etc are created through the ERA Console ERAC ERAS is a meeting point between ERAC and client computers a place where all information is processed maintained or modi...

Страница 8: ...ervicing hundreds of clients However there is a 2GB size limit for the database Consequently you will need to activate cleanups on the server and define an interval under Tools Server Options Server M...

Страница 9: ...ransferred will be approximately 50 smaller in size i e about 120 kilobytes per connection The data includes direct client connections omitting replicated connections Replication occurs much less ofte...

Страница 10: ...remote install TCP 2846 ERAS listening ERAS replication TCP 139 target port from the point of view of ERAS Copying of the agent einstaller exe from ERAS to a client using the share admin UDP 137 targ...

Страница 11: ...dition ESET Smart Security Business Edition Suppose all clients are Microsoft Windows 2000 XP Vista 7 workstations and notebooks networked within a domain The server named GHOST is online 24 7 and can...

Страница 12: ...select the correct database to which ERAS information will be stored For more information see the chapter titled Database types supported by ERA Server Important Recent versions of Microsoft Windows...

Страница 13: ...you must disable the cluster node before uninstalling 2 2 3 2 Installation of ERA Console Install the ESET Remote Administrator Console to the administrator s PC notebook At the end of the Advanced in...

Страница 14: ...ired to activate CASE INSENSIVITY CI To activate For MS SQL and MySQL a COLLATE must be set up with the CI activated For ORACLE a NLS_SORT must be set up with the CI activated For MS Access no action...

Страница 15: ...ing the connection string 2 Directly using a complete connection string All required parameters must be specified driver server and name of database This is an example of a complete connection string...

Страница 16: ...ompatible with the current version To cancel installation of ERAS and analyze the database manually click Cancel 2 3 Scenario Installation in an Enterprise environment 2 3 1 Environment overview netwo...

Страница 17: ...e master server which is the IP address of the server GHOST 2 3 2 3 Branch office Installation of HTTP Mirror server The Mirror server installation configuration in the previous scenario can also be u...

Страница 18: ...the administrator will only need to connect to a central ERAS the communication marked by the letter A in the figure below There is no need to use VPN to access individual departments the communicatio...

Страница 19: ...y and then click the Change button to the right of Password for Console When entering a password you can check the Remember password option Please consider the possible security risks associated with...

Страница 20: ...be processed you can limit them by using the Items to show drop down menu and the browse page by page buttons Select the View mode to display attributes according to your need for further details see...

Страница 21: ...ow you to efficiently sort and filter information about the connected clients 3 3 1 Filter Filter allows the administrator to display only information related to specific servers or client workstation...

Страница 22: ...ion allows you to right click on any attribute and automatically select highlight all other workstations or servers with the same attribute The string is automatically replaced by the value of the cur...

Страница 23: ...Flags Reset New Flag The client s icon will change to the one shown in the figure below and the value in the New User column will switch to No NOTE The Comment attribute is optional in all three tabs...

Страница 24: ...Primary Server Name of ERAS with which a client is communicating Domain Domain group name to which a client belongs these are not groups created in ERAS IP IP address Product Name Name of ESET securit...

Страница 25: ...RAS including time that the system information was submitted SysInspector Clients with versions containing the ESET SysInspector tool can submit logs from this complementary application Custom Info Cu...

Страница 26: ...ain how xml files can be used to create a configuration template for new modified xml configuration files For more information see chapter Tasks Protection Status This is a general status statement re...

Страница 27: ...ibute Description Client Name Name of client reporting the event Computer Name Workstation server name hostname MAC Address MAC address network adapter Primary Server Name of ERAS with which a client...

Страница 28: ...dress network adapter Primary Server Name of the ERA Server a client is communicating with Date Received Time at which the event was logged by ERAS Date Occurred Time at which the event took place on...

Страница 29: ...on from ERAC to ERAS For more detail see chapter Connecting to ERAS 3 5 2 Columns Show Hide tab This tab allows you to specify which attributes columns are displayed in individual tabs Changes will be...

Страница 30: ...recommend that you select the Show on taskbar when minimized option and leave the Console minimized when inactive If a problem occurs the icon in the notification area will turn red which is a signal...

Страница 31: ...configuration in a tree like structure The template is stored in the cfgedit exe file That is why we recommend that ERAS and ERAC be updated regularly Warning The Configuration Editor allows you to m...

Страница 32: ...r of the ThreatSense Net Early Warning System which allows submission of suspicious files for analysis to ESET s labs When deploying ESET solutions to a large network the Submit suspicious files and E...

Страница 33: ...cessary to modify the predefined profile My profile and change the Update server Username and Password settings If Update server is set to Choose Automatically all updates will be downloaded from ESET...

Страница 34: ...msi installation file means the digital signature of this file will no longer be valid In addition the steps from version 3 x apply to version 4 x as well Version 3 x Download the installation file e...

Страница 35: ...om package This is particularly useful if you want to run various scripts and executables on the remote machine including uninstall tools for third party security products or standalone cleaning tools...

Страница 36: ...MFC libraries for the Microsoft Windows 9x operating system that are required for ERA to function correctly This parameter can always be used even if the MFC libraries are available Under Create Sele...

Страница 37: ...to explore the network Console The Console view provides standard NetBios search from the computer on which ERAC is installed It shows all available domains and workgroups which can be un checked in...

Страница 38: ...nt with administrator rights You can still add clients to the list in this step by using the Add Clients Special feature 3 Select the desired install package to deliver to target workstations 4 Set th...

Страница 39: ...mmand line parameters are also applied 9 Immediately after the installation is complete the agent sends a message back to ERAS Some ESET security products require a reboot and will prompt you if neces...

Страница 40: ...requires intervention on the part of the user who must launch the einstaller exe agent from the email attachment If launched repeatedly einstaller exe will not trigger another installation of ESET cli...

Страница 41: ...ses 3 Enter a Subject in the corresponding field 4 Type a message into the Body 5 Check the Send compressed as zip file option if you wish to send the agent as a zipped package 6 Click Send to send th...

Страница 42: ...r username password domain from ERAS For more information see the end of this chapter The einstaller exe file can be obtained as follows From the Computers tab in the Remote Install tab right click an...

Страница 43: ...Logon on the ERAS is not transferred and the agent attempts to install the package under the current user On the operating systems Microsoft Windows 9x Me the administrative share cannot be used there...

Страница 44: ...will be denied The agent records the following error to the installer log located in TEMP einstaller log Eset Installer was told to quit by the server X 2224 To prevent repeated installations from bei...

Страница 45: ...th installation_package msi and click Open Do not use the Browse option to locate the installation package because it will be displayed as a local network path rather than a UNC network path 8 In the...

Страница 46: ...have to perform the task specific actions described in each of the chapters see links above Stage III Select Clients 4 You can modify your client selections in the Select Clients window which will app...

Страница 47: ...rvers or Groups Click Next to proceed to the next step 9 The last dialog window Task Report shows a preview of the configuration task Enter a name or description for the task optional The Apply task a...

Страница 48: ...workstation 2 Click View Edit to adjust the script 3 Click Next to proceed to the Select Clients and Task Report dialog windows which are described in detail in the Tasks chapter 4 After the task fin...

Страница 49: ...Clients pane and select New Task Show Notification from the context menu 2 Type the notification Title and message Body in the appropriate fields and select the notification Verbosity 3 Click Next to...

Страница 50: ...ESET Smart Security ESET NOD32 version 3 and later 5 2 Group Manager Group Manager is a powerful tool for managing your clients separating them into different groups and applying different settings ta...

Страница 51: ...Add Special button for more options Select the Add clients loaded in the Clients pane option to add all clients displayed in the client section or select the Only selected option To add clients that a...

Страница 52: ...s to be synchronized will be added to the existing AD groups AD groups import or if the existing AD groups will be completely replaced by those to be synchronized AD groups synchronize The Synchronize...

Страница 53: ...ed on the server you are currently connected to via ERAC To create a policy on a lower server you need to connect directly to that server Each policy has two basic attributes Override any child policy...

Страница 54: ...r to clients connected to the server It can also serve as a parent policy for another policy from the same server Icons with blue targets Policy was also created on the server however the option Overr...

Страница 55: ...es or policy rules 5 3 7 Assigning policies to clients There are two main rules for assigning policies to clients 1 Local primary clients can be assigned any local policy or any policy replicated from...

Страница 56: ...belongs to the group defined by the IP range HAS NOT Defined Policy specify if client does or does not adopt the policy Product Name NOT IN if product name is Product Version IS NOT if product versio...

Страница 57: ...policies As a replacement you can use any policy from the given server or the N A flag New default policy for primary clients If the deleted policy serves as a virtual policy see section Global Polic...

Страница 58: ...ocal administrators Each administrator decides which policies are to be assigned to which clients within their servers The main administrator does not intervene in the configurations made by the local...

Страница 59: ...wever Server A has the Default Policy for Lower Servers enabled and policies on the lower servers inherit the configuration of the Default Parent Policy from the master server In this scenario the loc...

Страница 60: ...d serve as parent policies on the lower servers For Policy 1 see the figure below the attribute Override any child policy is activated The local administrator still has a large degree of autonomy but...

Страница 61: ...ning policies based on policy rules This method is complementary and should be used in combination with previously described scenarios rather than as a standalone scenario If each server is managed by...

Страница 62: ...o the condition 5 In the next step define the policy that will be applied to clients matching the rule condition s and press OK to save the rule NOTE Steps 3 5 can be replaced by using the Policy Rule...

Страница 63: ...ion In each rule you can specify the criteria known as a Trigger which activates the rule The following triggers are available Client State Rule will be run if there is a problem on some of the client...

Страница 64: ...Previous Virus signature database is one version older than the current one Older or N A Virus signature database is more than one version older than the current one Older than 5 versions or N A Virus...

Страница 65: ...number of clients in the license fall below the number or actual clients in the server database to send a notification if expiration will cause the number of clients in the license to fall below the n...

Страница 66: ...t ASAP the task should run within 10 minutes If a specific time period is selected from this menu the action will automatically be performed after the time period has elapsed provided that the rule co...

Страница 67: ...o run effectively the SNMP protocol must be correctly installed and configured on the same computer as ERAS Start Control Panel Add or Remove programs Add Remove Windows Components The SNMP service sh...

Страница 68: ...SysInspector log from that client To do this right click the client in the Clients pane and select Request data Request SysInspector Information Logs can only be obtained from generation 4 x products...

Страница 69: ...ing deleting restoring quarantined files and excluding them from further scanning simpler tasks It is accessible via the Quarantine window in the main console panel or client properties The main quara...

Страница 70: ...ht clicking selected clients the selected clients are then automatically added to the selected items in the first step NOTE To perform this action successfully all the selected clients must have the l...

Страница 71: ...s Combined Top Threats Threats Progress Combination of the above mentioned types Combined Top Threats Threats Comparative Progress Combination of the above mentioned types Clients of Groups Shows clie...

Страница 72: ...ated on the following Wednesday after Saturday In the Interval tab select Completed and 1 Weeks Remove Add also the current period In the Scheduler tab set Frequency to Weekly and select Wednesday The...

Страница 73: ...rantine group verify that the Sticky option is disabled The computer will be assigned dynamically and removed once the conditions are no longer met Create the Quarantine Computers report To create a r...

Страница 74: ...tion Enables access to ERAS for clients of lower ERA Servers which do not have a valid password for replication specified Enable unauthenticated access for ESET Remote Installer Agent Enables access t...

Страница 75: ...rror server to always be connected to the internet Warning A Mirror server which performed a program component upgrade PCU and has not been rebooted may cause an outage In this scenario the server wou...

Страница 76: ...ble for Everyone and the current user can access them too Also please use UNC paths to define the network path to the local server Using the DISK format is not recommended If you decide to use the sha...

Страница 77: ...te Administrator and can be changed to an absolute path according to your needs To enable update via http select the Provide update files via internal HTTP server option HTTP server will be available...

Страница 78: ...nternal HTTP server option 5 Enter the full directory path to the folder Folder to store mirrored files where update files are to be stored 6 The Username and Password serve as authentication data for...

Страница 79: ...ERA Server Setup Mirror for NOD32 version 2 To minimize the volume of downloaded data only select language versions that are present on your network 8 4 Replication Replication is used in large networ...

Страница 80: ...ded on demand by clicking the Request button NOTE Some logs are automatically replicated while detailed logs and client configuration logs are only replicated on demand This is because some logs conta...

Страница 81: ...to confirm 4 Verify that the license key information is correct and select Upload to Server 5 Click OK to confirm The Upload to Server button is only active if you have selected a license key using t...

Страница 82: ...ion of clients Disable this option if there are multiple entries for one PC We also recommend disabling this option if a client is identified as the same client after the MAC address has been changed...

Страница 83: ...Server service 9 2 2 Start ERA Server This task starts the ESET Remote Administrator Server service 9 2 3 Database Transfer This task allows you to convert the database format The tool can convert bet...

Страница 84: ...import a file from a different database type as selected in the previous step Allow import from a different type of database as well as to stop ESET Remote Administrator Server during database restor...

Страница 85: ...he following chapters outline the most frequently encountered error codes when performing push installs as well as errors that can be found in the ERAS log 10 2 1 Error messages displayed when using E...

Страница 86: ...ely Webwasher proxy 0x2104 UPD_RETVAL_SERVER_ERROR Update module error indicating an HTTP error code higher than 500 If the ESET HTTP server is being used error 500 indicates a problem with memory all...

Страница 87: ...d by default runs every 60 minutes Usually there is no reason to modify its parameters The only exception is for notebooks since their owners often connect to the Internet outside of the local network...

Страница 88: ...ch Friday etc or it can be triggered by an event after a successful update the first time the computer starts each day etc The last step of the task On demand computer scans shows the special settings...

Страница 89: ...Selected items column on the right Click Next and then click Finish 11 3 Export and other features of client XML configuration From ERAC select any clients in the Clients tab Right click and select C...

Страница 90: ...ew update task or modify an existing update task through the Scheduler Tools Scheduler from the main program window of ESET Smart Security or ESET NOD32 Antivirus The configuration can be made directl...

Страница 91: ...tom install package must be in the msi format The remote installation of custom packages can be performed using a process very similar to the one described in chapter Remote installation The main diff...

Страница 92: ...website If you already have one of the ESET security products installed you can run ESET SysInspector directly from the Start Menu Programs ESET Please wait while the application inspects your system...

Страница 93: ...entries in your system By adjusting the slider you can filter items by their Risk Level If the slider is set to the utmost left Risk Level 1 then all items are displayed By moving the slider to the r...

Страница 94: ...h file path beginning with Those symbols provide pre launch optimization for those processes they are safe for the system and as such are correct Network connections The Description Window contains a...

Страница 95: ...between the compared logs Items marked by a can only be found in the active log and were not present in the opened comparative log Items marked by a on the other hand were present only in the opened l...

Страница 96: ...After the export you can mark unwanted objects for deletion Then you can run the modified log to delete marked objects Service Script is suited for advanced users with previous experience in diagnosi...

Страница 97: ...Windows system32 module32 exe CF8A In this example a process module32 exe was selected marked by a character the process will end upon execution of the script 02 Loaded modules This section lists cur...

Страница 98: ...ion Run Google Update C Users antoniak AppData Local Google Update GoogleUpdate exe c Category Internet Explorer 7 items HKLM Software Microsoft Internet Explorer Main Default_Page_URL http thatcrack...

Страница 99: ...n you open a script the program will prompt you with the following message Are you sure you want to run the service script Scriptname After you confirm your selection another warning may appear inform...

Страница 100: ...e equal level or higher Ctrl 0 filtering mode equal level only View Ctrl 5 view by vendor all vendors Ctrl 6 view by vendor only Microsoft Ctrl 7 view by vendor all other vendors Ctrl 3 displays full...

Страница 101: ...ning it as a Standard User or a Restricted User will result in it collecting less information about your operating environment Does ESET SysInspector create a log file ESET SysInspector can create a l...

Страница 102: ...gy The Anti Stealth technology provide effective rootkits detection If the system is attacked by malicious code that behaves as a rootkit the user is exposed to the risk of damaging losing or stealing...

Страница 103: ...4 Windows Server 2003 Service Pack 2 Windows XP Service Pack 2 with KB926044 Windows XP Service Pack 3 13 2 How to create rescue CD If the minimum requirements for the creation of ESET SysRescue CD ar...

Страница 104: ...r We recommend using automatic introduction only if ESET SysRescue is used on a computer that has the same network adapter as the computer on which the ESET SysRescue CD was created When the ESET SysR...

Страница 105: ...leaned not even in Safe mode Explorer exe as one of the essential Windows processes is launched in Safe mode as well ESS EAV cannot perform any action on the file and it consequently remains infected...

Отзывы: