Console
ESET PROTECT
Ensures real-time visibility for all endpoints as well as full reporting and security management for all OSes
- Cloud-based console with the possibility of an on-premises deployment
- Provides real-time visibility of all endpoints: desktops, servers, virtual machines and even managed mobile devices
- Enables full reporting for ESET security solutions
- Controls endpoint prevention, detection & response layers across all platforms
- Connect anytime, anywhere from your favorite web browser
Explore features
Completely multitenant
Multiple users and permission groups can be created to allow access to a limited portion of the ESET PROTECT console. This allows full streamlining of responsibilities across large enterprise teams.
Automation framework
Dynamic groups can sort computers based on current device status or defined inclusion criteria.
Dynamic and custom reporting
ESET PROTECT provides over 170 built-in reports and allows you to create custom reports from over 1000 data points.
Fully automated VDI support
A comprehensive hardware detection algorithm is used to determine the identity of the machine based on its hardware. This allows automated re-imaging and cloning of non-persistent hardware environments. Therefore, ESET’s VDI support requires no manual interaction and is fully automated.
Advanced RBAC
Starting with MFA-protected access, the console is equipped with an advanced Role-Based Access Control (RBAC) system.
Support for XDR
To further improve situational awareness and provide visibility across your network, ESET PROTECT works together with ESET Inspect, the XDR-enabling component of the ESET PROTECT platform.
Cloud MDM
A ready-to-use solution, integrated with our cloud management console. It’s easy for organizations of any size to get started, as there are no prerequisites such as certificates or additional components. Cloud MDM covers Android and Apple devices.
Advanced threat defense
Support for advanced threat defense greatly improves detection of zero-day threats such as ransomware by quickly analyzing suspicious files in ESET's powerful cloud sandbox.
Always the latest features
Leave the updating of the console up to us. We’ll do it in the background, and you’ll always be on the latest version with the latest components.
Granular policy control
Organizations can set up multiple policies for the same computer or group and can nest policies for inherited permissions. In addition, organizations can configure policy settings as user-configurable, so you can lock down any number of settings from the end users.
SIEM and SOC support
ESET PROTECT fully supports SIEM tools and can output all log information in the widely accepted JSON or LEEF format, allowing for integration with Security Operations Centers (SOC).
Full disk encryption (FDE)
Full Disk Encryption is native to ESET PROTECT, managing encryption of data on both Windows and Mac (FileVault) endpoints, improving data security and helping organizations solving the problem of data regulation compliance.
Hardware/software inventory
Not only does ESET PROTECT report on all installed software applications across an organization, it also reports on installed hardware.
System requirements
Cloud deployment
- Internet connection
Supported browsers
- Mozilla Firefox
- Microsoft Edge
- Google Chrome
- Safari
- Opera
On-premises deployment
Supported operating systems
- Windows Server 2012, 2012 R2, 2016, 2019, 2022
- Windows Storage Server 2012 R2, 2016
- Microsoft SBS 2011
- Ubuntu, RHEL Server, CentOS, SLED, SLES, OpenSUSE, Debian