4.4 Computer 88 ................................................................................................................................................
4.4.1 Computerdetails 89 .....................................................................................................................................
4.4.2 Computer aus Verwaltung entfernen 93 ............................................................................................................
4.5 Bedrohungen 94 ..........................................................................................................................................
4.5.1 Enterprise Inspector 97 .................................................................................................................................
4.6 Berichten 98 .................................................................................................................................................
4.6.1 Erstellen eines neuen Bericht-Templates 100 .....................................................................................................
4.6.2 Bericht generieren 103 .................................................................................................................................
4.6.3 Planen eines Berichts 103 .............................................................................................................................
4.6.4 Veraltete Anwendungen 104 ..........................................................................................................................
4.6.5 SysInspector-Loganzeige 105 .........................................................................................................................
4.6.6 Hardware-Inventur 106 .................................................................................................................................
4.7 Client-Tasks 108 ..........................................................................................................................................
4.7.1 Computer herunterfahren 108 ........................................................................................................................
4.7.2 Diagnose 109 .............................................................................................................................................
4.7.3 On-Demand-Prüfung 110 ..............................................................................................................................
4.7.4 Betriebssystem-Update 112 ...........................................................................................................................
4.7.5 Rogue Detection Sensor-Datenbank zurücksetzen 113 ..........................................................................................
4.7.6 Quarantäneverwaltung 113 ...........................................................................................................................
4.7.7 Upgrade von Security Management Center-Komponenten 114 ................................................................................
4.7.8 Geklonten Agenten zurücksetzen 115 ..............................................................................................................
4.7.9 Befehl ausführen 116 ...................................................................................................................................
4.7.10 SysInspector-Skript ausführen 117 .................................................................................................................
4.7.11 Datei an EDTD senden 118 ..........................................................................................................................
4.7.12 Server-Scan 118 .......................................................................................................................................
4.7.13 Software-Installation 119 .............................................................................................................................
4.7.13.1 ESET-Software aktualisieren 121 .................................................................................................................
4.7.14 Software-Deinstallation 122 .........................................................................................................................
4.7.15 Produktaktivierung 123 ...............................................................................................................................
4.7.16 SysInspector-Loganfrage (nur Windows) 124 ....................................................................................................
4.7.17 Quarantänedatei hochladen 124 ...................................................................................................................
4.7.18 Modul-Update 125 .....................................................................................................................................
4.7.19 Rollback für Modul-Update 125 .....................................................................................................................
4.7.20 Anzeigen einer Meldung 126 ........................................................................................................................
4.7.21 Anti-Theft-Aktionen 127 ..............................................................................................................................
4.7.22 Verwaltung beenden (ESET Management Agent deinstallieren) 129 ........................................................................
4.7.23 Konfiguration verwalteter Produkte exportieren 130 ...........................................................................................
4.7.24 Zuweisen eines Task zu einer Gruppe 130 .......................................................................................................
4.7.25 Zuweisen eines Tasks zu Computern 131 .........................................................................................................
4.7.26 Trigger für Client-Tasks 133 .........................................................................................................................
4.7.27 Ausgeführte Client-Tasks 134 .......................................................................................................................
4.7.27.1 Fortschrittsanzeige 137 ............................................................................................................................
4.7.27.2 Status-Symbol 138 ..................................................................................................................................
4.7.27.3 Detailinformationen 138 ...........................................................................................................................
4.7.27.4 Trigger 140 ...........................................................................................................................................
4.8 Installationsprogramme 141 .....................................................................................................................
4.9 Policies 144 ..................................................................................................................................................
4.9.1 Assistent für Policies 145 ..............................................................................................................................
4.9.2 Markierungen 146 .......................................................................................................................................
4.9.3 Verwalten von Policies 147 ............................................................................................................................
4.9.4 Anwenden von Policies auf Clients 148 .............................................................................................................
4.9.4.1 Ordnen von Gruppen 148 ...........................................................................................................................
4.9.4.2 Aufzählen von Policies 150 ..........................................................................................................................
4.9.4.3 Zusammenführen von Policies 152 ................................................................................................................
4.9.4.3.1 Beispielszenario für das Zusammenführen von Policies 153 ...............................................................................
4.9.5 Konfiguration von ESMC-Produkten 156 ............................................................................................................
4.9.6 Zuweisen einer Policy zu einer Gruppe 156 ........................................................................................................
4.9.7 Zuweisen einer Policy zu einem Client 158 ........................................................................................................