


You can drill down each one of them to oversee the status of computers, along with the threats or quarantined items.īut first you’ll have to deploy the ESET agent to the endpoints. There’s one that gives you an overview of the security incidents, another specifically for virus detections, another for events blocked by the firewall, and more. It contains several dashboards that help visualize different aspects of the network. The cloud interface on the other hand, helps you deploy endpoints, rollout specific tasks to them, and get notifications and reports about incidents. All of these features are accessible and can be tweaked from the endpoint clients or from the smartphone clients installed on the individual devices.
