1 Über die Hilfe 1 ...............................................................................................................................................
2 Installation/Upgrade 2 .................................................................................................................................
2.1 Neue Funktionen in ESET PROTECT 8.0 2 ...............................................................................................
2.2 Architektur 3 ................................................................................................................................................
2.2.1 Server 3 ....................................................................................................................................................
2.2.2 Web-Konsole 4 ............................................................................................................................................
2.2.3 HTTP-Proxy 5 ..............................................................................................................................................
2.2.4 Agent 7 .....................................................................................................................................................
2.2.5 Rogue Detection Sensor 8 ..............................................................................................................................
2.2.6 Mobile Device Connector 9 .............................................................................................................................
2.2.7 Apache HTTP-Proxy 10 ..................................................................................................................................
2.3 Unterschiede zwischen Apache HTTP Proxy, Mirror-Tool und Direktverbindung 14 .......................
2.3.1 Wann sollte ich den Apache HTTP Proxy verwenden? 15 ........................................................................................
2.3.2 Wann sollte ich das Mirror-Tool verwenden? 15 ...................................................................................................
3 Systemanforderungen und Größenbemessung 16 .....................................................................
3.1 Unterstützte Betriebssysteme 16 ............................................................................................................
3.1.1 Windows 16 ...............................................................................................................................................
3.1.2 Linux 18 ....................................................................................................................................................
3.1.3 macOS 18 .................................................................................................................................................
3.1.4 Mobilgerät 19 .............................................................................................................................................
3.2 Unterstützte Umgebungen für die Desktopbereitstellung 20 .............................................................
3.3 Größenbemessung für Hardware und Infrastruktur 21 ........................................................................
3.3.1 Bereitstellungsempfehlungen 22 .....................................................................................................................
3.3.2 Bereitstellung für 10.000 Clients 23 .................................................................................................................
3.4 Datenbank 24 ...............................................................................................................................................
3.5 Unterstützte Versionen von Apache Tomcat und Java 26 ....................................................................
3.6 Unterstützte Webbrowser, ESET-Sicherheitsprodukte und Sprachen 26 ..........................................
3.7 Netzwerk 28 .................................................................................................................................................
3.7.1 Verwendete Ports 29 ....................................................................................................................................
4 Installationsprozedur 32 .............................................................................................................................
4.1 All-in-One-Installation unter Windows 33 ...............................................................................................
4.1.1 Installieren des ESET PROTECT Servers 34 .........................................................................................................
4.1.2 Installation des ESET PROTECT Mobile Device Connector (Standalone) 46 ..................................................................
4.2 Installation in Microsoft Azure 52 ............................................................................................................
4.3 Komponenteninstallation unter Windows 53 .........................................................................................
4.3.1 Serverinstallation 54 ....................................................................................................................................
4.3.1.1 Servervoraussetzungen – Windows 60 ............................................................................................................
4.3.2 Microsoft SQL Server – Anforderungen 61 ..........................................................................................................
4.3.3 MySQL Server – Installation und Konfiguration 61 ................................................................................................
4.3.4 Speziell eingerichtetes Datenbankkonto 63 ........................................................................................................
4.3.5 Installation des Agenten 63 ............................................................................................................................
4.3.5.1 Servergestützte Installation des Agenten 66 ....................................................................................................
4.3.5.2 Offline-Installation des Agenten 66 ................................................................................................................
4.3.5.3 Agent – Deinstallation und Fehlerbehandlung 66 ...............................................................................................
4.3.5.4 ESET Remote Deployment Tool 67 .................................................................................................................
4.3.6 Installation der Web-Konsole 68 ......................................................................................................................
4.3.6.1 Web-Konsole mit dem All-in-One-Installationsprogramm installieren 68 ...................................................................
4.3.6.2 Web-Konsole manuell installieren 72 ..............................................................................................................
4.3.7 Installation des HTTP-Proxy 74 ........................................................................................................................
4.3.8 Rogue Detection Sensor-Installation 75 .............................................................................................................
4.3.8.1 Rogue Detection Sensor-Voraussetzungen 75 ...................................................................................................
4.3.9 Mirror-Tool - Windows 76 ...............................................................................................................................
4.3.10 Mobile Device Connector-Installation 80 ..........................................................................................................
4.3.10.1 Mobile Device Connector-Voraussetzungen 82 ................................................................................................
4.3.10.2 Mobile Device Connector-Aktivierung 84 ........................................................................................................