eset endpoint security 6 eset endpoint antivirus 6 · eset endpoint security 6 protects company...

6
ESET Endpoint Security 6 ESET Endpoint Antivirus 6 for Windows Products Details

Upload: others

Post on 04-Aug-2020

39 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: ESET Endpoint Security 6 ESET Endpoint Antivirus 6 · ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

ESET Endpoint Security 6

ESET Endpoint Antivirus 6for Windows

Products Details

Page 2: ESET Endpoint Security 6 ESET Endpoint Antivirus 6 · ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

ESET Endpoint Security 6, ESET Endpoint Antivirus 6

ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity and lets the user or admin know if there is something out of order. The 6th generation of our Endpoint security with ESET Remote Administrator management console makes it a powerful solution for businesses of all sizes.

1. NEW FEATURES

Anti-PhishingAnti-Phishing technology protects users from attempts to acquire passwords, banking data and other sensitive information by fake websites masquerading as legitimate ones. When user’s computer attempts to access an URL, ESET systems compare it against our database of known phishing sites. If a match is found, connection to the URL is aborted and a warning message is displayed. At this point, user has as well the option to proceed to the URL at his/her own risk or report the URL to us as a potentially false positive warning.

Exploit BlockerExploit Blocker has been designed to fortify often exploited application types on users’ systems, such as web browsers, PDF readers, email clients or MS Office components. It adds another layer of protection, one step closer to attackers, by using a completely different technology compared to techniques focusing on detection of malicious files themselves. Instead, it monitors behavior of processes and watches for suspicious activity typical for exploits. When triggered, the behavior of the process is analyzed. If considered suspicious, the threat may be blocked immediately on the machine, with further metadata about the attack being sent to ESET LiveGrid® cloud-reputation system which gives Exploit Blocker the potential to protect users against targeted attacks and previously unknown exploits, so called zero-day attacks.

Advanced Memory ScannerAdvanced Memory Scanner couples nicely with Exploit Blocker, as it is also designed to strengthen the protection against modern malware. In an effort to evade detection, malware writers extensively use file obfuscation or/and encryption. This causes problems with unpacking such threats and might pose a challenge to bypass for ordinary anti-malware techniques, such as emulation or heuristics. To tackle this problem, the Advanced Memory Scanner monitors the behavior of a malicious process and scans it once it decloaks in the memory. This allows for effective infection prevention even from heavily obfuscated malware. Unlike Exploit Blocker, this is a post-execution method, which means that there is a risk that some malicious activity could have been performed already. However, it steps into the protection chain as a last resort when all other detection techniques have been bypassed.

Vulnerability ShieldVulnerability shield is an extension of Two-way Firewall that improves detection of known vulnerabilities on the network level. By implementing detections for common vulnerabilities in widely used protocols, such as SMB, RPC and RDP, it constitutes another important layer of protection against spreading malware, network-conducted attacks and exploitations of vulnerabilities for which a patch has not been released or deployed yet.

Page 3: ESET Endpoint Security 6 ESET Endpoint Antivirus 6 · ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

ESET Endpoint Security 6, ESET Endpoint Antivirus 6

Specialized cleanersThis functionality is a bundle of most relevant critical malware standalone cleaners for malware which commonly cause problems. Specialized cleaners help with malware that cannot be removed by regular cleaner. This bundle will be updated as needed and placed in Help and Support page.

ESET Shared Local CacheESET Endpoint solutions are now optimized for deployment in virtual environments. ESET Shared Local Cache adds value when scanning for threats on the same virtual environment. It caches metadata of already scanned clean files and compares every single scan data with the cached information. As the communication happens over the same physical hardware, there is practically no delay in scanning. Caching boosts the performance up to 40-80% depending on network topology (preliminary data, achieved on ESET internal network).

Optimization for “revert to default snapshot” state When virtualized it is a common practice that machines are often reverted to their default snapshot state, even in case of a simple “shut down”. In this case data is stored on a different (logical) drive. ESET improves its detection technologies over time and provides frequent modular updates. These files together with virus signature files are stored outside of the default location to prevent repetitive downloads and updating from the same data after each revert as the amount of data downloaded rises with the increasing age of the default snapshot. Configuring this will be available during the initial installation of the program.This feature cannot be pre-configured before installation. User selects different folders for data and folder structures may vary.

Idle-State ScannerIdle-State Scanner will aid system performance by performing full scan proactively when the computer is not in use. It helps to speed up next scanning by populating local cache.

First Scan after InstallationPerforming low priority on-demand scan 20 minutes after installation, First scan after installation assures protection from the beginning.

Ease of useThe new architecture of advanced setup tree, new user interface and easier to find and use actions contribute to improved user experience that addresses addresses users’ needs. The new version has simple navigation and together with ESET Remote Administrator v6, it creates one family with unified look and feel.

Optimization for virtual environmentsESET will provide agentless solution for platforms supporting such approach. ESET also modified the existing solutions for virtual environments, so that customers can install resource-effective solution without compromises.The new ESET Endpoint solution is optimized for working within virtual environment. It is capable of storing already scanned files in ESET Shared Local Cache so it does not have to scan the same files over and over again. In addition, virtual machines with “revert to default snapshot” state function enabled will not have to download whole virus signature database every time after restart.

Page 4: ESET Endpoint Security 6 ESET Endpoint Antivirus 6 · ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

ESET Endpoint Security 6, ESET Endpoint Antivirus 6

New Licensing SystemNew licensing framework integrations simplify the deployment and long-term usage of ESET security software. Licenses are now automatically updated in all products regardless of changes made. The customer is able to exchange license information for simple to remember e-mail address with his custom password.With new licensing system featuring new format of license keys and automatic license update (upon renewal / or any other license operation), customers can be sure that they stay protected. The optional licensing portal and possibility of license rights authorization towards e-mail based license account simplify license management, deployment, merging of licenses or delegation of licenses towards other entities (even a 3rd party, without losing control over the license).

2. NEW GRAPHIC USER INTERFACE

Completely redesigned graphic user interface (GUI) of ESET endpoint security solutions makes it easy to use them and manage them. Information that was previously difficult to find is now easily accessible.

Touch screens supportESET introduces support for touch screens and high resolution displays. The following features contribute towards improved usability of our products on tablets and ultra-books running Windows 8:● Optimization and modification of the main GUI to fit the high-resolution screen.● More padding to main GUI elements.● Rearrangement of GUI elements to with respect to the touch interface.● Basic frequently used actions accessible from tray menu.

Hide GUIThe new version of the ESET Endpoint solution fulfills the needs of virtually any organization. Based on the users’ roles in the organization it is now possible to decide whether the GUI of the security solution will be hidden from the end user or displayed to the end user.

By hiding GUI partially or completely the presence of Endpoint solution may be lowered to minimum. Even without tray icon and process egui.exe which results in lower hardware resources consumption.

Most commonly, system administrators want the security solution to be as transparent to the end users as possible. The security of endpoints in the network is mainly the concern of system administrator rather than end user. Therefore, notifications are more relevant within the remote management console, visible to administrator.

Advanced setup redesignAlongside the main product user interface, ESET has redesigned also the advanced setup. Thetructure has been reengineered together with layout. The overall format now matches its counterpart in ESET Remote Administrator. The main goal was to simplify the usage, improve the navigation and user understanding.

Page 5: ESET Endpoint Security 6 ESET Endpoint Antivirus 6 · ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

ESET Endpoint Security 6, ESET Endpoint Antivirus 6

3. IMPROVED FEATURES

Device ControlImprovements which make the feature easier to navigate and configure were implemented. Creation of rules, especially by allowing the enumeration of a connected device or creation of a single rule to multiple devices is now simplified. In addition, user will be able to import the list of device Vendors, Models and Serials from a file. ESET also introduces a soft blocking rule - warning, allowing notifying the end user that the device is blocked as a result of company policy. Despite the fact, the end user will have an option to use the device anyway while activity will be logged.

Web ControlTo a certain level, warning or blocking pages may be customized. Administrator may include a short message or contact so the user knows who to contact in order to solve the situation. As in Device Control, a soft blocking rule was implemented. It notifies the end user that the website is blocked as a result of company policy. End user has an option to access the website anyway while activity will be logged.

FirewallAside from simplifying configuration and creation of firewall rules (with pre-defined default values, which solve most common use-cases), the functionality should allow for firewall profiles to be assigned to network interfaces, as well as to the combination of network locations and network interfaces. However, this feature is only supported on Windows Vista SP1 and newer systems. Older systems keep old behavior – only one global active profile.Administrators interested in configuring the client firewall to more detail will be able to review all rules that are applied to network traffic in order to be able to modify them if necessary.

The following features will contribute to enhanced user experience of firewall:● Rules can be created directly from a log● Rules evaluation - rules will be evaluated from top to bottom and can be simply reordered to change importance● Troubleshooting wizardThis wizard will guide the user through a set of questions resulting in identification of the rule that the user might have experienced problem with. The user will be able to create new rules that fit the needs directly from the wizard.In addition, the concept of Profiles, Zones, Network interfaces, Trusted zone, Subnets was simplified and reworked. ESET introduces Known networks for easier and understandable use.

InstallationThe new installer will offer standard functionality of detecting and uninstalling competitive solutions before migration to ESET Endpoint solution. Wide range of supported competitive solutions on 32 and 64-bit systems can be uninstalled by ESET installer. When installing the new generation of ESET Endpoint solutions, migration of settings will be available to help migration to the new product generation.

Page 6: ESET Endpoint Security 6 ESET Endpoint Antivirus 6 · ESET Endpoint Security 6 protects company devices against most current threats. It proactively looks for suspicious activity

ESET Endpoint Security 6, ESET Endpoint Antivirus 6

Update of Virus Signature Database or ModulesESET introduces Resume failed download functionality. When an update of Virus Signature Database or update of Modules is interrupted, new ESET Endpoint solutions will resume the failed download and it would not have to be downloaded from scratch. This will contribute to lower use of bandwidth and faster updates.

Log filesAutomatic scrolling function when generating Log files was bothering many of our customers. In the improved Log files section, we have placed a switch to turn automatic scrolling off closer to the customer, right where he needs it.

4. SYSTEM REQUIREMENTSFor the seamless operation of ESET Endpoint Solution for Windows 6th gen. the system should meet the following hardware and software requirements:

Processor: Intel or AMD x86-x64, Operating Systems: Microsoft Windows 8.1/8/7/Vista/XP