Escan/english/escan22/eScan Management Console/Managed Computers: Difference between revisions

From eScan Wiki
Jump to navigation Jump to search
imported>TechContent
No edit summary
imported>TechContent
No edit summary
Line 273: Line 273:


<h4 style='color:#007FFF;font-size:18.0pt;font-family:"Open Sans"'><b>Installing eScan Client on an Individual Computer in a Group</b></h4>
<h4 style='color:#007FFF;font-size:18.0pt;font-family:"Open Sans"'><b>Installing eScan Client on an Individual Computer in a Group</b></h4>
  <ol>
<ol>
   <li>Select a group.</li>
   <li>Select a group.</li>
     <li>Under the group, click <b>Client Computers</b>.</li>
     <li>Under the group, click <b>Client Computers</b>.</li>
Line 283: Line 283:
     <p>OR</p>
     <p>OR</p>
     <p><b>C:\Program Files (x86)\eScan </b>>(default path for 64-bit computers).</p></li>
     <p><b>C:\Program Files (x86)\eScan </b>>(default path for 64-bit computers).</p></li>
    <li>To define a different installation path, click <b>Add</b>. (Skip this step if default path
<li>To define a different installation path, click <b>Add</b>. (Skip this step if default path
chosen).</li>
chosen).</li>
     <li>Click <b>Install</b>. A window displays File transfer progress. After eScan installation,
     <li>Click <b>Install</b>. A window displays File transfer progress. After eScan installation,
       the eScan status will be updated in Managed Computers list.</li></ol>
       the eScan status will be updated in Managed Computers list.</li>
</ol>
 
<h4 style='color:#007FFF;font-size:18.0pt;font-family:"Open Sans"'><b>Installing eScan Client on Linux Computers</b></h4>
<h4 style='color:#007FFF;font-size:18.0pt;font-family:"Open Sans"'><b>Installing eScan Client on Linux Computers</b></h4>
<p>To install eScan Client on Linux computers, follow the steps given below:</p>
<p>To install eScan Client on Linux computers, follow the steps given below:</p>

Revision as of 10:37, 25 November 2021

Managed Computers

The Managed Computers module lets you create computer groups, add computers to a group, define policy templates for the created groups and computers, create policy criteria templates, and define tasks for specific groups.
The screen consists of following options to configure:

  1. Search
  2. Update Agent
  3. Action List
  4. Client Action List
  5. Policy Templates
  6. Policy criteria Templates
  7. QR Code for 2FA

Search

The Search feature lets you find any computer added in Managed Computers. After clicking Search, Search for Computers window appears.

The Filter section displays following fields:

  1. Computer Name/IP: Enter a computer name or IP address.
  2. Username: Enter a username.
  3. Click on Find Now.

The console will display the result.

Update Agent

eScan lets you use a client computer as an update agent to deploy updates on computers in group. The Update Agent will receive virus definitions and policies from server and distribute it to the assigned group(s).
Clicking Update Agent displays the list of computers that are acting as update agents for other computers in the group. The window also lets you Add or Remove update agents from this list. You can set an update agent for multiple groups.

Adding an Update Agent

To add an Update Agent, follow the steps given below:

  1. In Managed computers screen, click on Update Agent. Update Agent window appears.
  2. Click on 3 dots next to Update Agent field, to select the computer. Select Computer widow appears.
  3. Select a computer and click on OK.
  4. Click on 3 dots next to Group Name field, to select the Group Name. This is the group to which the selected computer will act as an Update Agent and provide updates.
  5. Select the Group and click on OK.
  6. Click on Add.

The Update Agent will be set for the selected group.

Configuring UA Settings

This option allows admin to configure the eScan Server by defining public IP address for directly downloading the updates in case of Update Agent is not available.

  1. Ignore Customize/Server IP and Hostname for UA clients:
    Select this option to pause the update download for the clients until Update Agent is available to distribute the updates.
  2. Add Customized FQDN / Server IP / Hostname of Primary server to UA / Client Setup:
    Enter the public address that has been assigned to the eScan Server through which clients can download the updates directly.

After assigning the IP address, click on Test to test the connection.

Delete an Update Agent

To delete an Update Agent follow the given steps:

  1. In Managed computers screen, click on Update Agent.
    Update Agent window appears.
  2. In the Assigned to Group(s) column, click on Recycle Bin icon.
    A confirmation prompt appears.
  3. Click on OK.

The Update Agent will be deleted.

Action list

The Action List takes you action for a group. The drop-down list contains following options:

  1. New Sub Group
  2. Set Group Configuration
  3. Deploy/Upgrade Client
  4. Uninstall eScan Client
  5. Synchronize with Active Directory
  6. Outbreak Prevention
  7. Create Client Setup
  8. Properties

1. Creating New Sub Group

To create a new sub group, follow the steps given below:

  1. Click on Action List > New Sub Group.
    Creating New Group window appears.
  2. Enter a name for the Group.
  3. Click the Group Type drop-down and select a type.
  4. Click the Policy Templates drop-down and select a policy for the group.
  5. Click on OK.

A new group will be created under the Managed Computers.

NOTE

If the Group type is set to Normal User, then server will try to connect to the client computer using the hostname.
If the Group type is set to Roaming User, then server will try to connect to the client computer using the IP address.
Multiple groups can be created within a group.

1.2 Removing Sub Group

To remove a group, follow the steps given below:

  1. Select a group.
  2. Click on Action List > Remove Subgroup. A confirmation prompt appears.
  3. Click on OK.

The group will be removed.

NOTE

A group will be removed only if it contains no computers.

2. Set Group Configuration

With this option you can define single Username and Password to login for all the computers in the group.
To set a group configuration, follow the steps given below:

  1. Select the group you want to configure.
  2. Click on Action List > Set Group Configuration. Set Group Configuration window appears.
  3. Enter Remarks and define Login credentials.
  4. Click on Save.

The group configuration will be saved.

3. Deploy/Upgrade Client

System Administrators often have to perform deployment tasks within their networks. At times, they may need to deploy applications on remote computers.
The eScan Management Console allows you to install eScan and other applications on remotely by clicking install applications in the Action List menu.

3.1 Installing eScan Client on a Group

  1. Select the group on which you want to install eScan client.
  2. Click on Action List >Deploy/Upgrade Client.
    Client Installation window appears.
  3. Select Install eScan option.
    By Default eScan is installed at the following Path on a Client computer.
    C:\Program Files\eScan (default path for 32-bit computer)
    OR
    C:\Program Files (x86)\eScan (default path for 64-bit computers).
  4. To define a different installation path, click on Add. (Skip this step if default path chosen).
  5. Click on Install. A window displays File transfer progress.

After Installation, the eScan status will be updated in Managed Computers list.

3.2 Installing eScan Client on an Individual Computer in a Group

  1. Select a group.
  2. Under the group, click on Client Computers.
  3. Select a computer.
  4. Click on Client Action List > Deploy/Upgrade Client.
    Client Installation window appears.
  5. Select Install eScan option.
    By Default eScan is installed at the following Path on a Client computer.
    C:\Program Files\eScan (default path for 32-bit computer)
    OR
    C:\Program Files (x86)\eScan (default path for 64-bit computers).
  6. To define a different installation path, click on Add. (Skip this step if default path chosen).
  7. Click on Install. A window displays File transfer progress.

After Installation, the eScan status will be updated in Managed Computers list.

4. Uninstall eScan Client

To uninstall eScan Client from all the computers from a group, follow the steps given below:

  1. Select a group of computers for uninstallation.
  2. Click on Action List > Uninstall eScan Client.
    Client Uninstallation window appears.
  3. Click on Uninstall.
    The Client Uninstallation window displays the progress.

After the uninstallation process is over, click on Close.

NOTE

You can uninstall eScan Client from all the computers in the group by selecting the Group and then click on Action List > Uninstall eScan Client.

5. Synchronize with Active Directory

To synchronize a group with Active Directory, follow the steps given below:

  1. In the Managed Computers folder tree, select a group for synchronization.
  2. Click on Action List > Synchronize with Active Directory.
    Synchronize with Active Directory window appears.

Source Active Directory Organization Unit:
Click on Browse and select an Active Directory.

Synchronization Interval
Enter the preferred duration (in minutes).

Exclude from ADS Sync
This field displays a list of excluded Active Directory sources.
To delete a source, select the check box of Excluded ADS Sources. Select a source(s) and click on Delete.
To exclude a source, Select the source and then click on Add to Exclude.

Search Filter
It lets you search an Active Directory for an object class.

Install eScan manually
Selecting this option lets you install eScan manually on the computers.

Install without Firewall
Selecting this option lets you install eScan without firewall.

  • After performing the necessary actions, click on OK.
  • The group will be synchronized with the Active Directory.

    6. Outbreak Prevention

    Upon virus detection, eScan quarantines the virus and restricts it from spreading across the network. The Outbreak Prevention feature lets you configure policies for the network.

    6.1 Deploying Outbreak Prevention

    To deploy Outbreak Prevention feature, follow the steps given below:

    1. In the Managed Computers folder tree, select a group.
    2. Click Action List > Outbreak Prevention.
      Outbreak Prevention window appears.

    3. Limit access to shared folders
      Select this check box to limit the infection's access to shared folders..

      Deny write access to local files and folder
      Select this check box to deny the infection write access for any file. Clicking the link displays another window that lets you specifically select folders and subfolders that should be denied and allowed access for modification.

      Block specific ports
      Select this check box to prevent infection from accessing specific ports. Clicking the link displays another window that lets you block incoming and outgoing data packets along with TCP and UDP ports.

      Block All Ports (Other than trusted client-server ports)
      Select this check box to block all ports other than trusted client server ports.

      Automatically restore the outbreak prevention after hour(s)
      This feature lets you restore outbreak prevention automatically after set duration (hours). Click the drop-down and select the preferred duration.

      Outbreak Prevention Notification
      To send a notification to client users after Outbreak Prevention is deployed, select the check box Notify client users when outbreak prevention starts. You can even write your own custom message for this feature in the Message field.

      After making the necessary selections, click on Deploy. The Outbreak Prevention feature will be deployed for the selected group.

      6.2 Restore Outbreak Prevention

      In the Outbreak Prevention window, click on Restore Outbreak Prevention tab.
      To restore Outbreak Prevention manually, click on Restore.
      To notify clients about Outbreak Prevention restoration, select the check box Notify client users after the original settings.

      7. Create Client Setup

      To create a Client Setup, follow the steps given below:

      1. In the Managed Computers folder tree, select a group.
      2. Click on Action List > Create Client Setup.
        Create Client Setup window appears.
      3. Select the necessary settings.
      4. Click on Create Setup. The client setup will be created and a download link will be displayed in right pane.

      8. Properties of a group

      To view the properties of a group, follow the steps given below:

      1. Select a group.
      2. Click on Action List > Properties.
        Properties window appears.

      In Properties, General tab displays following details:

      1. Group Name
      2. Parent Group
      3. Group Type - Normal or Roaming user
      4. Contains - Sub Groups or Number of Computers in that group
      5. Creation date of the Group

      Client Action List

      Client Action List lets you take action for specific computer(s) in a group. To enable this option, select computer and then click on Client Action List. The drop-down consists of following options:

      1. Set Host Configuration
      2. Deploy/Upgrade Client
      3. Uninstall eScan Client
      4. Move to Group
      5. Remove from Group
      6. Refresh Client
      7. Connect to Client (RMM)
      8. Assign Policy Template
      9. Show Critical Events
      10. Export
      11. Show Installed Softwares
      12. Force Download
      13. Forensic-Port/Communication
      14. On Demand Scanning
      15. Send Message
      16. Outbreak Prevention
      17. Delete All Quarantine Files
      18. Create OTP
      19. Pause Protection
      20. Resume Protection
      21. Properties

      The Client Action List contains few options similar as Action List. These options perform same, except they perform the action only for selected computer(s).

      1. Set Host Configuration

      If you are unable to view details of Windows OS installed on computer with Properties option, set its Host Configuration. Doing it will build communication between the server and selected computer, displaying its details.
      To set Host Configuration for a selected computer, follow the steps given below:

      1. Select the computer.
      2. Click on Client Action List > Set Host Configuration.
        Set Host Configuration window appears.
      3. Enter Remarks and Login credentials.
      4. Click on Save.

      The Host will be configured as per new settings.

      2. Deploy/Upgrade Client

      To Deploy/Upgrade eScan client on all computers in a group or an individual computer, follow the steps given below:

      Installing eScan Client on a Group

      1. Select the group on which you want to install eScan client.
      2. Click Action List > Deploy/Upgrade Client.

        Client Installation window appears.

      3. Select Install eScan option.

        By Default eScan is installed at the following Path on a Client computer.

        C:\Program Files\eScan> (default path for 32-bit computer)

        OR

        C:\Program Files (x86)\eScan (default path for 64-bit computers)

      4. To define a different installation path, click Add. (Skip this step if default path chosen).
      5. Click Install. A window displays File transfer progress. After Installation, the eScan status will be updated in Managed Computers list.

      Installing eScan Client on an Individual Computer in a Group

      1. Select a group.
      2. Under the group, click Client Computers.
      3. Select a computer.
      4. Click Client Action List > Deploy/Upgrade Client. Client Installation window appears.
      5. Select Install eScan option.

        By default eScan is installed at the following path on a Client computer.

        C:\Program Files\eScan (default path for 32-bit computer)

        OR

        C:\Program Files (x86)\eScan >(default path for 64-bit computers).

      6. To define a different installation path, click Add. (Skip this step if default path chosen).
      7. Click Install. A window displays File transfer progress. After eScan installation, the eScan status will be updated in Managed Computers list.

      Installing eScan Client on Linux Computers

      To install eScan Client on Linux computers, follow the steps given below:

      1. Login to the EMC with your username and password.
      2. Click Managed Computers on the navigation panel and select a group
      3. Under the group, click Client Computer and select a computer.
      4. To define a different installation path, click Add. (Skip this step if default path chosen).
      5. Click Install. A window displays File transfer progress. After Installation, the eScan status will be updated in Managed Computers list.
      6. To deploy the setup, click Client Action List > Deploy/ Upgrade Client.
      7. Download respective agent link from Required package for Linux Client Installation option.
      8. Click Install Other Software and select Linux/MAC Client setup option.

        Click Install to initiate the installation process. A notification will be displayed after successful installation.

      3. Uninstall eScan Client

      To uninstall eScan Client on all the computer from a group, follow the steps given below:

      1. Select the group of computers for uninstallation.
      2. Click Action List > Uninstall eScan Client.

        Client Uninstallation window appears.

      3. Click Uninstall.

        The Client Uninstallation window displays the progress.

      4. After the uninstallation process is over, click Close.

      NOTE

      You can uninstall eScan Client from all the computers in the group by selecting the Group and then click Action List > Uninstall eScan Client.

      4. Move to Group

      To move computers from one group to other, follow the steps given below:

      1. Go to Managed Computers.
      2. Select the desired computers present in a group.
      3. Click on Client Action List > Move to Group.
      4. Select the group in the tree to which you wish to move the selected computers and click on OK.

      The computers will be moved to the selected group.

      5. Remove from Group

      To remove computers from a group, follow the steps given below:

      1. Go to Managed Computers.
      2. Select the desired computers for removal.
      3. Click on Client Action List > Remove from Group.
        A confirmation prompt appears.
      4. Click on OK.

      The computers will be removed from the group.

      6. Refresh Client

      To refresh status of any client computer, follow the steps given below:

      1. Under any group, click Client Computers. A list of computers appears on the right pane
      2. Select a computer
      3. Click Refresh Client. The Client will be refreshed.

      7. Connect to Client (RMM)

      To add a computer to RMM licensed category, follow the steps given below:.

      1. Go to Managed Computers.
      2. Select the client computer which you want to connect to RMM.
      3. Click on Client Action List > Connect to Client (RMM).
      4. Read the disclaimer thoroughly and then click on Accept.
        Your default browser opens eScan Remote Access window (Google Chrome, Mozilla Firefox, MS Edge, etc.).

      After you are done performing an activity, click on Disconnect icon to end remote connection.

      8. Assign Policy Template

      To Assign Policy Template to specific computer, follow the steps given below:

      1. Go to Managed Computers.
      2. Select the client computer on which you want to assign policy template.
      3. Click on Client Action List > Assign Policy Template.
      4. Manage Add-On License window appears.
      5. Select the policy template and click on Select to add.

      The computer get assigned with the selected policy template.

      9. Show Critical Events

      To Show Critical Events of specific computer, follow the steps given below:

      1. Go to Managed Computers.
      2. Select the client computer.
      3. Click on Client Action List > Show Critical Events.

      This will display the list of all the critical events of the computer that can also be exported as a report.

      10. Export

      To export a client computer's data, follow the steps given below:

      1. In the Managed Computers folder tree, select a group and then click on Client Computers.
        The right pane displays the list of computers in the group and their detailed information.
      2. Select a client computer and the click on Client Action List > Export.
        Export Selected Columns window appears displaying export options and a variety of columns to be exported.
      3. Select the preferred Export Option.
      4. Select the preferred Report Columns.
      5. Click on Export.

      The report will be exported as per your preferences.

      11. Show Installed Softwares

      This feature displays a list of installed softwares on a computer.
      To view the list of installed softwares, follow the steps given below:

      1. In the Managed Computers folder tree, select a group and then click on Client Computers.
        The right pane displays the list of computers in the group and their detailed information.
      2. Select a client computer and the click on Client Action List > Show Installed Softwares.

      Installed Softwares window appears displaying list of installed softwares and in the top right corner displays total number of installed softwares.

      12. Force Download

      The Force Download feature forces a client computer to download Policy Template modifications (if any) and updated virus signature database.
      To activate this feature for computers, follow the steps given below:

      1. In the Managed Computers folder tree, select a group and then click on Client Computers.
        The right pane displays the list of computers in the group and their detailed information.
      2. Select a client computer and the click on Client Action List > Force Download.
        Client Status window appears displaying the process.

      13. Forensic-Port/Communication

    4. This option generates the Forensic report of the service running on certain port during a particular period for analysis. To generate the report, select the client computer and click Forensic Port/Communication option.
    5. To view the forensic port, select the client machine and scroll the window to Forensic Report.
    6. To get the detailed report of the same or download it, click on the specific report under File Name column.
    7. 14. On Demand Scanning

      This option lets you scan an eScan installed client computer.
      To scan a client computer on demand, follow the steps given below:

      1. Go to Managed Computers.
      2. Select the client computer which you want to scan.
      3. Click on Client Action List > On Demand Scanning.
        On Demand Scanning window appears.
      4. Select the preferred scan options and then click on Scan.

      The On Demand Scan for selected client computer begins.

      15.Send Message

      The Send Message feature lets you send a message to computers.
      To send message to computers, follow the steps given below:

      1. In the Managed Computers folder tree, select a group and then click on Client Computers.
        The right pane displays the list of computers in the group and their detailed information.
      2. Select a client computer and the click on Client Action List > Send Message.
        Send Message window appears.
      3. Enter the message and click on Send.

      The message will be sent to the selected computers.

      16. Outbreak Prevention

      Upon virus detection, eScan quarantines the virus and restricts it from spreading across the network. The Outbreak Prevention feature lets you configure policies for the network.

      Deploying Outbreak Prevention

      To deploy Outbreak Prevention feature for specific client computer(s), follow the steps given below:

      1. Go to Managed Computers.
      2. Select the computer(s) for which you want to deploy Outbreak Prevention.
      3. Click Client Action List > Outbreak Prevention.

        Outbreak Prevention window appears.

      Limit access to shared folders

      Select this check box to limit the infection's access to shared folders.

      Deny write access to local files and folder

      Select this check box to deny the infection write access for any file. Clicking the link displays another window that lets you specifically select folders and subfolders that should be denied and allowed access for modification.

      Block specific ports

      Select this check box to prevent infection from accessing specific ports. Clicking the link displays another window that lets you block incoming and outgoing data packets along with TCP and UDP ports.

      Block All Ports (Other than trusted client-server ports)

      Select this check box to block all ports other than trusted client server ports.

      Automatically restore the outbreak prevention after hour(s)

      This feature lets you restore outbreak prevention automatically after set duration(hours). Click the drop-down and select the preferred duration.

      Outbreak Prevention Notification

      To send a notification to client users after Outbreak Prevention is deployed, select the check box Notify client users when outbreak prevention starts. You can even write your own custom message for this feature in the Message field.

      After making the necessary selections, click Deploy. The Outbreak Prevention feature will be deployed for the selected group.

      17. Delete All Quarantine Files

      The Delete All Quarantine Files feature lets you delete all quarantine files stored on a computer.
      To delete all quarantine files on computers, follow the steps given below:

      1. In the Managed Computers folder tree, select a group and then click on Client Computers.
        The right pane displays the list of computers in the group and their detailed information.
      2. Select a client computer and the click on Client Action List > Delete All Quarantine Files.
        Client Status window appears displaying the progress.

      18. Create OTP

      The password protection restricts user access from violating a security policy deployed in a network. For example, the administrator has deployed a security policy to block all USB devices, but a user needs USB access for a genuine reason. In such situation, One Time Password (OTP) can be generated for that disables USB block policy on specific computer. The administrator can define policy disable duration ranging from 10 minutes to an hour without violating existing policy.

      18.1 Generating an OTP

      To generate an OTP, follow the steps given below:

      1. In the Managed Computers screen, select the client computer for which you want to generate the OTP.
      2. Click on Client Action List > Create OTP.
        Password Generator window appears.
      3. In the Valid for drop-down, select the preferred duration to bypass the protection module.
      4. In Select Option section, select the module you want to disable.
      5. Click on Generate Password.

      An OTP will be generated and displayed in Password field.

      18.2 Entering an OTP

      To enter an OTP, follow the steps given below:

      1. In the Taskbar, right-click on eScan icon. An option list appears.
      2. Click on Pause Protection. eScan Protection Center window appears.
      3. Enter the OTP in the field.
      4. Click on OK.

      The selected module will be disabled for set duration.

      19. Pause Protection

      The Pause Protection feature lets you pause the protection for computers.
      To pause the protection for computers, follow the steps given below:

      1. In the Managed Computers folder tree, select a group and then click on Client Computers.
        The right pane displays the list of computers in the group and their detailed information
      2. Select a client computer and the click on Client Action List > Pause Protection.
        Client Status window appears displaying the progress.

      20. Resume Protection

      The Resume Protection feature lets you resume protection for computers whose protection is paused.
      To resume protection for computers, follow the steps given below:

      1. In the Managed Computers folder tree, select a group and then click on Client Computers.
        The right pane displays the list of computers in the group and their detailed information.
      2. Select a client computer and the click on Client Action List > Resume Protection.
        Client Status window appears displaying the progress.

      21.Properties of Selected Computer

      To view the properties of a selected computer, follow the steps given below:

      1. Select a computer.
      2. Click on Client Action List > Properties.
        Properties window appears displaying details.

      NOTE

      If multiple computers are selected, the Properties option will be disabled.