ESET Remote Administrator: User Guide
ESET Remote Administrator: User Guide
User guide
Click here to display the Online help version of this document
Copyright ©2019 by ESET, spol. s r.o.
ESET Remote Administrator was developed by ESET, spol. s r.o.
REV. 1/9/2019
1 Introduction ................................................................................................................................................... 1
1.1 ESET endpoint products ......................................................................................................................... 1
1.2 Differences from ERA 5.x ........................................................................................................................ 1
2 ERA components and architecture .................................................................................................. 2
ESET Remote Administrator 6 (ERA) is an application that allows you to manage ESET products on client
workstations, servers and mobile devices in a networked environment from one central location. The built-in task
management system in ESET Remote Administrator, allows you to install ESET security solutions on remote
computers and quickly respond to new problems and threats.
ESET Remote Administrator does not provide protection against malicious code by itself. Protection of your
environment depends on the presence of an ESET security solution such as ESET Endpoint Security on
workstations.
ESET endpoint products are primarily designed for use on workstations in a small business/enterprise environment
and can can be used with ESET Remote Administrator.
ESET Remote Administrator 6 is able to deploy, activate or manage the following ESET endpoint products:
The table below includes descriptions of the major differences between ESET Remote Administrator version 6.x and
5.x.
1
Policies Redesigned policy editor can force / apply flags. ERA Tree-structured policy
Agent merges policies according to a group's structure. configuration editor
Different ways of policy merging can be applied on final
client.
Groups Static and Dynamic groups. One static group per device. Static and Parametric groups
Dynamic groups are evaluated by ERA Agent regardless of
connectivity to the Server. Membership is reported to the
ERA Server. Static groups are identical with access
groups. Access to all objects is guided by their position in
a given group.
Reporting Redesigned reporting kit can create custom charts Separate report set for web-
containing user-selected system data. Multiple reports can based dashboard and extended
be saved locally and/or delivered by e-mail in CSV or PDF customizable general report
formats. templates. Export to HTML, ZIP
and PDF.
Mirror Apache HTTP Proxy acts as a transparent proxy/cache for Mirror functionality allows for
files downloaded from ESET servers. The offline Mirror tool storage of updates/files locally on
is available as an alternative, an offline repository can be the ERA Server hard-disk
created as well.
OS platform Windows, Linux, Mac and Virtual environments (ability to Windows only
support import a virtual appliance). Server to server replication is
deprecated.
Database MSSQL Express (default), MSSQL, MySQL (only MySQL ODBC-connected MSAccess
supported on Linux) (default), MSSQL, MySQL, Oracle
* All features listed may not be available in all versions of ERA 6.x. Full feature set is available in the latest version.
The following supporting components are optional, we recommend that you install them for best performance of
the application on the network:
ESET Remote Administrator Server (ERA Server) is the application that processes all data received from clients that
connect to the Server (through the ERA Agent).
Agent
The ESET Remote Administrator Agent (ERA Agent) is an essential part of ESET Remote Administrator 6. Clients do
not communicate with the Server directly, rather the Agent facilitates this communication. The Agent collects
information from the client and sends it to the ERA Server. If the ERA Server sends a task for the client - it is sent
to the Agent which then sends this task to the ESET endpoint product running on the client.
Web Console
ERA Web Console is a browser-based user interface that allows you to manage ESET security solutions in your
environment. It displays an overview of the status of clients on your network and can be used to deploy ESET
2
solutions to unmanaged computers remotely. If you choose to make the web server accessible from the internet,
you can use ESET Remote Administrator from virtually any place and device.
Apache HTTP Proxy is a service that can be used in combination with ESET Remote Administrator 6.x to distribute
installation packages and updates to client computers. It acts as a transparent proxy, meaning it caches files that
have already been downloaded to minimize Internet traffic on your network.
Rogue Detection Sensor (RD Sensor) searches your network for computers not registered in ESET Remote
Administrator. This component can locate new computers and add them in ESET Remote Administrator
automatically.
WARNING
Remote detection sensor can take up to 24 hours to locate new computers on your network.
Newly discovered machines are listed in a predefined report, making it easy to assign them to specific static
groups and begin assigning them tasks.
System requirements
Before you install ESET Remote Administrator, verify that all hardware, operating system, network and software
prerequisites are met.
Hardware
For seamless operation of ESET Remote Administrator, your system should meet the following hardware
requirements:
Memory 4 GB RAM
Hard Drive At least 20 GB of free space
Processor Dual-Core, 2.0 GHz or faster
Network connection 1 Gbit/s
Operating system
The table below displays the supported operating systems for each ESET Remote Administrator component
recommended for small and medium-sized business. See also a full list of supported operating systems.
3
Microsoft SBS 2011 Standard and EssentialX X X X
Windows 7 SP1 X* X X X*
Windows 8 / 8.1 X* X X X*
Windows 10 X* X X X*
* Installing ERA components on a client OS might not be aligned with Microsoft licensing policy. Check
Microsoft licensing policy or consult your software supplier for details.
** Microsoft SQL Server Express included with Microsoft Small Business Server (SBS) is not supported
by ESET Remote Administrator. If you want to run your ERA database on SBS, you must use a newer
version of Microsoft SQL Server Express or MySQL. For more details and instructions, see Installation
on Windows SBS / Essentials.
Network
It is essential that both ERA Server and client computers managed by ERA have a working Internet connection so
that they can reach the ESET repository and activation servers. If you prefer not to have clients connect directly to
the Internet, you can use a proxy server (not the same as Apache HTTP Proxy or ERA Proxy) to facilitate
communication with your network and the Internet.
Computers managed by ERA should be connected to the same LAN and/or should be in the same Active Directory
domain as your ERA Server. The ERA Server must be visible by client computers. Additionally, Client computers
must be able to communicate with your ERA Server to use remote deployment and the wake-up call feature.
Ports used
If your network uses a firewall, see our list of possible network communication ports used when ESET Remote
Administrator and its components are installed in your infrastructure.
Software
• Microsoft .NET Framework 3.5 must be installed. If you are running Windows Server 2008 or 2012, you can
install it using the Roles and Features Wizard; if you are using Windows Server 2003, you can download .NET 3.5
here.
• ERA Web Console requires at least Java version 7 (Java Runtime Environment - JRE). We recommend that you
use the latest officially released version of Java 8 or Java 10 (you can download it from
http://java.com/en/download/). Our recommendations may change after January 2019, based on legal and
technical decisions made by Oracle company, as well as the current state of Java releases in 2019.
• ESET Remote Administrator supports two types of database servers, however we recommend that you use
Microsoft SQL Server Express 2008 R2, 2012 and 2014, which is included with ESET Remote Administrator
Installation
ESET Remote Administrator installers are available in different formats to support different install methods. We
recommend the All-in-one installer for small deployments.
Follow the instructions from the video to upgrade/migrate from ESET Remote Administrator 5 to ESET Remote
Administrator 6 with the Migration tool.
4
To perform a new installation of ESET Remote Administrator 6, download the All-in-one installer from the download
section of the ESET website under Remote Administrator 6 (click to expand the category).
This feature allows you to install all ERA components using the ERA installation Wizard.
1. Make sure you have met all installation requirements before you proceed.
2. Open the installation package and click Next on the Welcome screen.
3. Select Install Remote Administrator Server and click Next. If necessary, you can adjust the language
settings in the Language drop-down menu before proceeding.
5
4. After accepting the EULA, click Next. Select the applicable components to install and click Install.
• If you already have another version of Microsoft SQL Server or MySQL installed, or you plan to connect to
different SQL Server, deselect this component.
• You will not be able to install Microsoft SQL Server Express on a Domain Controller. This is likely to happen
if you are using Windows SBS / Essentials. We recommend that you install ESET Remote Administrator on a
different server or to use Microsoft SQL Server or MySQL Server to run the ERA database. More information.
6
If errors are found during the prerequisites check, address them accordingly. Make sure your system meets all
installation requirements.
7
NOTE
The following notification may be displayed if your system does not have enough disk space for ERA to install:
There is only 32 MB free on system disk
You must have at least 5000 MB of free disk space to install ERA
5. When the prerequisites check is complete and your environment meets all requirements, installation will
begin. Be aware that installation can take over an hour depending on your system and network configuration.
6. Enter a valid License Key (included in the new purchase email you received from ESET) and click Next. If
you are using legacy license credentials (Username and Password), convert your credentials to a License Key.
Alternatively, you can choose to Activate later. If you choose Activate later, see Activation for further
instruction.
8
7. If you chose to install Microsoft SQL Server Express in step 2, a database connection check will be performed
- skip to step 9. If you have an existing database server, you will be prompted to enter your database
connection details in the next step. Click Next to start the database check.
• If you chose Microsoft SQL Server Express select MS SQL Server via Windows Authentication or MS
SQL Server and configure connection settings accordingly.
• If you are using an existing Microsoft SQL Server or MySQL Server, select the database type and configure
connection settings accordingly.
Enter your Database name, Hostname, Port number (you can find this information in Microsoft SQL Server
Configuration Manager), and Database admin account details (Username and Password) into the
appropriate fields and click Next. The connection to the database will be verified.
Database account
9
You can use a dedicated database user account that will have access only to the ERA database,
alternatively an SA account (MS SQL) or root account (MySQL). When using a dedicated user account, that
account must have sufficient permissions to access the database. If you do not intend to use a dedicated user
account, enter your administrator account (SA or root).
If you entered your SA account or root account in the previous window, click Yes to continue using the
SA/root account as the database user for ESET Remote Administrator.
If you click No, you must select Create new user (if you have not already created one) or Use existing user
(if you have a dedicated database user account).
9. You will be prompted to enter a new password for the Web Console Administrator account. This password is
important, as you will use it to log into the ERA Web Console. Click Next.
10
10. You can leave the fields intact, or enter your corporate information to appear in the details of ERA Agent
and ERA Server certificates. Certificates verify the identity of Agent and Server, and allow for secure
communication over SSL. Your certificate includes your public key, server name, additional information about
the server and a signature computed by a certification authority. If you choose to enter a password in the
Authority password field, make sure that it is recorded in a safe place as you will require it for
future upgrades or migrations. Click Next and then click Install.
11. A green check mark will be displayed next to the different components being installed when installation for
each one completes.
11
12. When installation is complete, "ESET Remote Administrator Server installation was successful" will be
displayed along with your ERA Web Console URL address. Click the URL to open Web Console, or click Finish to
close the window.
12
Post-installation steps
IMPORTANT
Use a supported web browser to connect to ERA Webconsole.
2. Type or copy and paste the License key you received when you purchased your ESET security solution
in the License Key field.
13
ERA Structure
To manage small to medium-sized networks (1000 clients or less), a single machine with ERA Server and all its
components (supplied web server, database, etc.) installed on it is usually sufficient. You can think of it as a single
server or standalone installation. All managed clients are connected directly to the ERA Server via ERA Agent. The
administrator can connect to the ERA Web Console via web browser from any computer on the network or run the
Web Console directly from the ERA Server.
Groups
Groups allow you to keep endpoints on your network organized so that you can assign policies to them
systematically.
• You can manually select which endpoints belong to any Static group. Dynamic groups are template-based,
and automatically include endpoints that meet the criteria established in your template.
• Knowledgebase articles are available to help you add computers to static groups, create new dynamic
group templates and assign a policy to a group.
• Additional information on groups can be found in the ERA Administrator guide topics Working with ESET
Remote Administrator and Groups.
Certificates
Certificate - Certificates are used to identify computers on your network, allowing secure communication between
your ERA Server and clients, and also to establish secured connection of ERA Web Console.
NOTE
To make sure all components can communicate correctly, all Peer Certificates need to be valid and signed by the
same Certification Authority.
Certification Authority (CA) - A CA is used to legitimize certificates distributed from your network. In an
enterprise setting, a public key can be used to automatically associate client software with the ERA Server to allow
for the remote installation of ESET products.
14
For more information about Certificates and Certification Authority, read online help.
Deployment
After the successful installation of ESET Remote Administrator, it is necessary to deploy the ERA Agent and ESET
endpoint products to computers in your network.
3. In the Deploy Agent window, click Create Installer under Create all-in-one Installer (Windows only).
15
4. Expand the Product section and select the ESET Endpoint product you want to install.
IMPORTANT
North American customers: You must change the repository URL to accommodate North American firewall
policies.
5. If you agree with End User License Agreement, select the check box next to I agree with application End
User License Agreement.
6. Make sure you have selected the correct license in the License section. If you have added your license
during the ERA Server installation, this license will be pre-selected.
16
7. In the Certificate section the default Agent certificate is selected. If you want to use a different certificate,
select Custom certificate and follow the instructions on the screen. After choosing your certificate, continue
to the Advanced section.
IMPORTANT
The certificate passphrase must not contain following characters: " \ These characters cause critical error during
the initialization of the Agent.
8. In the Advanced section, you can customize the all-in-one installer package. You can select the Parental
17
Group that your ERA Agents will be assigned to after deployment. If nothing is selected, Agents will be
assigned under the Lost & found group.
9. ESET AV Remover will uninstall or completely remove previously installed antivirus programs. Select the
check box next to Enable ESET AV Remover if you want to use it during deployment.
10. If necessary, you can specify your ERA Server Hostname. Otherwise, leave the default values unchanged.
12. In the Download section, you will be offered two versions of the package to download. Click and download
the version compatible with your Agent computer.
18
13. The download package will be prepared for download.
If you have successfully created the deployment package and copied the file to the machine where the ERA Agent
and ESET Endpoint product is going to be installed, complete the following steps:
NOTE
• You can also perform the installation of your deployment package in silent mode. More information can be found
in this Knowledgebase article.
• You must execute the installer using the Built-in Administrator account, or a domain Administrator
account (in case the built-in Administrator account is disabled). Any other user, despite being a member of the
Administrators group, will not have sufficient access rights. Therefore, you need to use the built-in Administrator
account, as you will not be able to successfully complete the installation under any other user account than the
local or domain Administrator.
19
IMPORTANT
The installer package comes in the form of an file and is valid for Windows only.
.exe
2. Components that are included in the installer will be displayed.
3. Before you continue with the installation process, it is important that you uninstall any existing security
applications on the computer. Select the check box next to I want to uninstall unwanted antivirus
applications using ESET AV Remover to have ESET AV Remover scan your system and remove any
supported security applications. Click Continue to install the product.
If you have selected the check box, follow the instructions on-screen, or see AV Remover online help for further
instructions.
4. Read and Accept the End User License Agreement (EULA) if you agree with it.
5. ESET AV Remover will scan your system and remove other security applications. When removal is complete,
click Continue to installation.
6. The next step in the installation process is to configure the Protection settings of the ESET Endpoint
product.
7. You will be promoted to configure <%ESET_LIVE_GRID%>. <%ESET_LIVE_GRID%> helps you ensure that
ESET is immediately and continuously informed about new infiltrations, which allows us to better protect our
customers.
8. Select your desired option for the detection of potentially unwanted applications (see What is a potentially
unwanted application?). You can change directory where the product will be installed by clicking Change
installation folder.
20
9. Click Install.
10. After the installation has been completed, click Done. ESET Endpoint Security will open automatically. You
can check the status log
(C:\ProgramData\ESET\RemoteAdministrator\Agent\EraAgentApplicationData\Logs\status.html) on the client
machine to make sure ERA Agent is working properly.
21
Other methods
There are multiple ways to deploy the ERA Agent and ESET Endpoint products. You can deploy them separately.
After ERA Agent is deployed, you can install an ESET endpoint product directly from ESET Remote Administrator:
ESET Remote Deployment Tool enables users to execute bundle (all-in-one) installer package created by ERA to
deploy ERA Agent remotely. Deployment Tool is executed under normal admin privileges that should help with
security errors that were in ERA Server running under Network Service or ERA Server running as CentOS appliance.
NOTE
ESET Remote Deployment Tool is dedicated to deploy ERA Agents on client computers with Microsoft Windows
operating systems.
The following prerequisites must be met to use ESET Remote Deployment Tool on Windows:
• ERA Server and the ERA Web Console must be installed (on a Server computer)
• Appropriate ports must be opened. See ERA Agent - used for remote deployment of ERA Agent to a target
computer with Windows OS.
• A bundle (all-in-one) installer package must be created and downloaded to your local drive.
• The names of installation packages must include the string "x86" or "x64". Otherwise the deployment will not
work.
4. Select Add computers manually. You will need to manually enter the list of hostnames or IP addresses.
5. Enter the hostnames or IP addresses and click Next. Each IP address or hostname must be on a new line.
IMPORTANT
Make sure that computers have the same platform (64-bit or 32-bit OS).
6. The computers selected for remote deployment will be displayed. Make sure all computers are listed and
then click Next.
7. Click Browse and select the bundle installer package created in ERA Web Console. If you do not have any
other security applications on your local computer, deselect the checkbox Use ESET AV Remover.
8. Enter the login credentials for the target computers. If the target computers are members of a domain, enter
domain administrator credentials. If you log in with local administration credentials, you will need to
disable remote UAC on the target computers. Select the check box next to Use current user credentials to
have the login credentials be automatically completed.
9. Select the Deployment method to execute programs on remote machines and than click Next. Built-in is
22
the default setting; it which supports Windows error messages. PsExec is a third-party alternative to the Built-
in method.
10. Once the installation has started, you will see the "Success". Click Finish to complete the deployment. If the
deployment fails, you can export a list of failed computers. To export the list, click Browse next to the Export
failed computers field, select a file to which you want to save the list and then click Export failed
.txt
computer.
• Scan Network - You will need to provide IP Ranges to scan computers in the network.
A deployment may fail for number of reasons. If a deployment fails, read the Troubleshooting chapter or verified
example scenarios of ERA Agent deployment.
Next steps
With ERA Server installed on your server, and ESET endpoint solutions installed on clients, you are ready to begin
managing your network. See the topic in the Administrator guide for more information on what you can do with
your ESET Endpoint product.
Dashboard
Dashboard is the default screen that is displayed after the user logs into the ERA Web Console for the first time. It
displays predefined reports about your network. You can switch between dashboards using the tabs in the top
menu bar. Each dashboard consists of several reports.
23
You can customize your dashboards by adding reports, modifying existing ones, resizing, moving and re-arranging
them. All this gives you a comprehensive overview of ESET Remote Administrator and its parts (clients, groups,
tasks, policies, users, competences, etc.).
• Computers - This dashboard gives you an overview of client machines - their protection status, operating
systems, update status, etc.
• Remote Administrator Server - In this dashboard, you can view information about the ESET Remote
Administrator server itself - server load, clients with problems, CPU load, database connections, etc.
• Antivirus threats - Here you can see reports from the anti-virus module of the client security products -
active threats, threats in the last 7/30 days and so on.
• Firewall threats - Firewall events of the connected clients - according to their severity, time of reporting, etc.
• ESET applications - This dashboard lets you view information about installed ESET applications.
Computers and Groups
Static and Dynamic Groups
All devices, mobile and computer, are located in a static group. Static groups are used to organize computers and
objects into a hierarchy and define access rights. Each computer is contained in one static group, not more. There
are also dynamic groups, which can be understood as custom filters where one can set rules to filter computers
accordingly. A computer can be in various dynamic groups at the time, or in none at all.
Static groups play an important role in the ERA security model. Each object (computer, task, policy, report,
notification) is contained in a static group. Access to each object is determined by the permission set assigned to
the user.
NOTE
A fresh ERA installation has the Administrator (Native User with home group ALL) as the only account.
Computers
24
All client computers reachable by ESET Remote Administrator are displayed here, organized by group. Clicking on a
group from the list (on the left) will display the members (clients) of this group in the right pane. You can filter the
clients (computers) using the filters at the top of the page. Clicking Add Filter shows the available filtering
criteria. There are also a few pre-defined filters that are quickly accessible.
You can use the status icons to filter clients by the severity of issues detected (red for errors, yellow for warnings,
green for notices, and gray for unmanaged computers). The status icon represents the current status of a
particular client computer and the ESET solution installed on it. You can hide or show the status icons of different
severity to evaluate different clients on your network by status. For example, to see only the computers with
warnings, leave only the yellow icon shown (the rest of the icons must be hidden). To see both warnings and
errors, leave red and yellow status icons shown. In addition to showing and hiding statuses, you can use the
following adjustments to customize the Computers screen:
• Subgroups—Select this check box to show subgroups of the currently selected group.
• Unmanaged—clients, computers on the network that do not have the ERA Agent are marked with in
the status column.
• Using the drop-down menu below the filters, you can limit the list of displayed clients (computers). The
following categories are available:
oAll Devices will display all client computers without filtering. You can use a combination of all the
above filtering options when narrowing down the view.
oESET Protected (protected by an ESET product)
oRemote Administrator (individual ERA components such as Agent, RD Sensor, Proxy, etc.)
oOther (Shared Local Cache, Virtual Appliance). When you make your selection, only the respective
clients will be displayed.
NOTE
If you are not able to find a particular computer in the list and know it is in your ERA infrastructure, make sure that
all filters are turned off. You can also click the header of a column to sort computers by that attribute.
You can use the context menu ( icon) to create new groups, create new tasks, or select other available actions.
25
The Computers button allows you to execute several actions, for example adding new computers manually,
displaying the details of a selected computer, moving the selected computer(s) to a different group and more.
To access threat reports click Threats in the Web Console menu on the left. The Threats section gives you an
overview of all threats found on computers in your network. You can browse groups and view threats on members
of a given group. View can be filtered, but by default all threat types from the last 7 days are shown. Threats can
be Marked as resolved in the Threats section or under details for a specific client.
Quarantine
Quarantine section can be found in Web Console under Admin > Quarantine. This section shows all files
quarantined on client devices. Files should be quarantined if they cannot be cleaned, if it is not safe or advisable to
delete them, or if they are being falsely detected by an ESET product.
Reports
Reports allow you to access and filter data from the database in a convenient way. Reports are divided into
categories, each category includes a short description. To access reports, click Reports in the Web Console menu
on the left, select the desired row (description, action) you wish to view report for and click Generate Now at the
bottom of the page. See our Knowledgebase article for step-by-step instructions to configure automated reports in
ERA.
26
NOTE
By default, all report templates are only accessible to the Administrator. Other users, unless assigned by sufficient
permission (or unless templates are moved to another location), would not be able to see or use these templates.
Admin
The Admin section is the main configuration component of ESET Remote Administrator. This section contains all
the tools that administrator can use to manage client security solutions, as well as the ERA Server settings. You
can use Admin tools to configure your network environment in such a way that it would not require a lot of
maintenance. Also, you can configure notifications and dashboards which will keep you aware of the status of your
network.
Tasks
Tasks allow you to assign specific procedures to individual clients or groups of clients.
Tasks can be created from tool bars and context menus in the Computers pane in addition to the tasks screen in
the Admin section. To see the status of executed tasks, it is important that you navigate to Admin > Client
Tasks and observe whether tasks has been run successfully.
27
The Client Tasks and Server Tasks sections of the ERA Administrator Guide contain information about how to
create, assign and schedule new tasks. In the Knowledgebase, you will find examples of procedures to configure
specific tasks, such as the Active Directory sync, wake-up call, and Agent check-in tasks.
Notifications
You can configure automatic notifications based on specific events such as detected threats, out-of-date endpoints,
and more. For the proper function of notifications, SMTP must be configured properly and the address for each
notification must be defined in ERA. See the Notifications section of the ERA Administrator guide or our
Knowledgebase article for more information about how to configure and manage notifications.
Policies
Policies are sets of rules applied over various ESET products or operating system installed on the client computer.
Policies can be used to manage client computers and can be accessed in ERA Web Console under Admin >
Policies. See the Policies section of the ESET Remote Administrator Administrator Guide to learn more about how
to manage policies and see the real life examples of policy application.
Follow the steps from our Knowledgebase article to create a new policy and assign it to a group.
• The ESET Knowledgebase is a searchable repository of support articles designed to help you resolve issues
and answer questions
• The ESET user Forum is monitored by ESET staff and allows ESET users to share issues they are having and
find solutions
• The ESET Knowledgebase video channel contains video walkthroughs of common procedures for ESET
products
28
• Visit ESET Support News and Customer Advisories for the latest announcements about ESET product
features and upgrades
• You can open a case with ESET Customer Care at any time if you are not able to resolve an issue or find
the answer to your question
You can also refer to the ERA Installation guide (including upgrade, migration and troubleshooting), Administrator
guide (especially how to manage ERA with ERA Web Console) and Virtual Appliance guide (to use ERA in VMware
etc.) for more detailed information.
Under the terms of this Software End User License Agreement (hereinafter referred to as "Agreement") executed
by and between ESET, spol. s r. o., having its registered office at Einsteinova 24, 851 01 Bratislava, Slovak
Republic, registered in the Commercial Register administered by Bratislava I District Court, Section Sro, Entry No
3586/B, Business Registration Number: 31 333 535 (hereinafter referred to as "ESET" or "Provider") and you, a
physical person or legal entity (hereinafter referred to as "You" or "End User"), You are entitled to use the Software
defined in Article 1 of this Agreement. The Software defined in Article 1 of this Agreement can be stored on a data
carrier, sent via electronic mail, downloaded from the Internet, downloaded from the Provider's servers or obtained
from other sources, subject to the terms and conditions specified below.
THIS IS AN AGREEMENT ON END USER RIGHTS AND NOT AN AGREEMENT FOR SALE. The Provider continues to own
the copy of the Software and the physical media contained in the sales package and any other copies that the End
User is authorized to make pursuant to this Agreement.
By clicking on "I Accept" or "I Accept…" while installing, downloading, copying or using the Software, You agree to
the terms and conditions of this Agreement. If You do not agree to all of the terms and conditions of this
Agreement, immediately click the canceling option, cancel the installation or download, or destroy or return the
Software, installation media, accompanying documentation and sales receipt to the Provider or the outlet from
which You acquired the Software.
YOU AGREE THAT YOUR USE OF THE SOFTWARE ACKNOWLEDGES THAT YOU HAVE READ THIS AGREEMENT,
UNDERSTAND IT AND AGREE TO BE BOUND BY ITS TERMS AND CONDITIONS.
1. Software. As used in this Agreement the term "Software" means: (i) computer program accompanied by this
Agreement and all components thereof; (ii) all the contents of the disks, CD-ROMs, DVDs, e-mails and any
attachments, or other media with which this Agreement is provided, including the object code form of the Software
supplied on a data carrier, via electronic mail or downloaded via the Internet; (iii) any related explanatory written
materials and any other possible documentation related to the Software, above all any description of the Software,
its specifications, any description of the Software properties or operation, any description of the operating
environment in which the Software is used, instructions for use or installation of the Software or any description of
how to use the Software (hereinafter referred to as " Documentation "); (iv) copies of the Software, patches for
possible errors in the Software, additions to the Software, extensions to the Software, modified versions of the
Software and updates of Software components, if any, licensed to You by the Provider pursuant to Article 3 of this
Agreement. The Software shall be provided exclusively in the form of executable object code.
2. Installation, Computer and a License key. Software supplied on a data carrier, sent via electronic mail,
downloaded from the Internet, downloaded from the Provider's servers or obtained from other sources requires
installation. You must install the Software on a correctly configured Computer, complying at least with
requirements set out in the Documentation. The installation methodology is described in the Documentation. No
computer programs or hardware which could have an adverse effect on the Software may be installed on the
29
Computer on which You install the Software. Computer means hardware, including but not limited to personal
computers, laptops, workstations, palmtop computers, smart phones, hand-held electronic devices, or other
electronic devices for which the Software is designed, on which it will be installed and/or used. License key means
the unique sequence of symbols, letters, numbers or special signs provided to the End User in order to allow the
legal use of the Software, its specific version or extension of the term of the License in compliance with this
Agreement.
3. License. Subject to the condition that You have agreed to the terms of this Agreement and You comply with all
the terms and conditions stipulated herein, the Provider shall grant You the following rights (hereinafter referred to
as "License"):
a) Installation and use. You shall have the non-exclusive, non-transferable right to install the Software on the
hard disk of a Computer or other permanent medium for data storage, installation and storage of the Software in
the memory of a computer system and to implement, store and display the Software.
b) Stipulation of the number of licenses. The right to use the Software shall be bound by the number of End
Users. One End User shall be taken to refer to the following: (i) installation of the Software on one computer
system; or (ii) if the extent of a license is bound to the number of mail boxes, then one End User shall be taken to
refer to a computer user who accepts electronic mail via a Mail User Agent (hereinafter referred to as "MUA "). If
MUA accepts electronic mail and subsequently distributes it automatically to several users, then the number of End
Users shall be determined according to the actual number of users for whom the electronic mail is distributed. If a
mail server performs the function of a mail gate, the number of End Users shall equal the number of mail server
users for which the said gate provides services. If an unspecified number of electronic mail addresses are directed
to and accepted by one user (e.g., through aliases) and messages are not automatically distributed by the client to
a larger number of users, a License for one computer shall be required. You must not use the same License at the
same time on more than one Computer. The End User is entitled to enter the License key to the Software only to
the extent in which has the right to use the Software in accordance the limitation arising from the number of
Licenses granted by Provider. The License key is deemed confidential, You must not share the License with third
parties or allow third parties to use the License key unless permitted by this Agreement or Provider. If your License
key is compromised, notify Provider immediately.
c) Business Edition. A Business Edition version of the Software must be obtained to use the Software on mail
servers, mail relays, mail gateways or Internet gateways.
d) Term of the License. Your right to use the Software shall be time-limited.
e) OEM Software. OEM Software shall be limited to the Computer You obtained it with. It cannot be transferred to
a different Computer.
f) NFR, TRIAL Software. Software classified as "Not-for-resale", NFR or TRIAL cannot be assigned for payment
and must only be used for demonstration or testing the Software's features.
g) Termination of the License. The License shall terminate automatically at the end of the period for which
granted. If You fail to comply with any of the provisions of this Agreement, the Provider shall be entitled to
withdraw from the Agreement, without prejudice to any entitlement or legal remedy open to the Provider in such
eventualities. In the event of cancellation of the License, You must immediately delete, destroy or return at your
own cost, the Software and all backup copies to ESET or to the outlet from which You obtained the Software. Upon
termination of the License, the Provider shall be also entitled to cancel the End User's entitlement to use the
functions of the Software, which require connection to the Provider's servers or third-party servers.
4. Functions with data collection and internet connection requirements. To operate correctly the Software
requires connection to the Internet and must connect at regular intervals to the Provider's servers or third-party
servers and applicable data collection in compliance with Privacy Policy. Connection to the Internet and applicable
data collection is necessary for the following functions of the Software:
a) Updates to the Software. The Provider shall be entitled from time to issue updates to the Software
("Updates"), but shall not be obliged to provide Updates. This function is enabled under the Software's standard
settings and Updates are therefore installed automatically, unless the End User has disabled automatic installation
of Updates. For the purpose of provisioning of Updates, License authenticity verification is required including
30
information about Computer and/or the platform on which the Software is installed in compliance with Privacy
Policy.
b) Forwarding of Information to the Provider. The Software contains functions which collect data about the
installation process, the Computer and/or the platform on which the Software is installed, information about the
operations and functionality of the Software and information about managed devices (hereinafter referred to as
"Information ") and then send them to the Provider. The Information may contain data (including randomly or
accidentally obtained personal data) concerning managed devices. By activating this function of the Software,
Information may be collected and processed by the Provider as specified in Privacy Policy and in compliance with
relevant legal regulations.
The Software requires a component installed on managed computer, which enables transfer of information
between managed computer and remote management software. Information, which are subject to transfer
contains management data such as hardware and software information of managed computer and managing
instructions from the remote management software. Other content of data transferred from managed computer
shall be determined by the settings of software installed on managed computer. The content of instructions from
management software shall be determined by settings of remote management software.
For the purpose of this Agreement, it is necessary to collect, process and store data enabling the Provider to
identify You in compliance with Privacy Policy. You hereby acknowledge that the Provider checks using its own
means whether You are using the Software in accordance with the provisions of this Agreement. You hereby
acknowledge that for the purpose of this Agreement it is necessary for your data to be transferred, during
communication between the Software and the Provider's computer systems or those of its business partners as
part of Provider's distribution and support network to ensure functionality of Software and authorization to use the
Software and to protection of the Provider's rights.
Following conclusion of this Agreement, the Provider or any of its business partners as part of Provider's
distribution and support network shall be entitled to transfer, process and store essential data identifying You for
billing purposes, performance of this Agreement and transmitting notifications on your Computer. You hereby
agree to receive notification and messages including but not limited to marketing information.
Details about privacy, personal data protection and Your rights as a data subject can be found in
Privacy Policy which is available on Provider's website and accessible directly from the installation
process. You can also visit it from Software's help section.
5. Exercising End User rights. You must exercise End User rights in person or via your employees. You are only
entitled to use the Software to safeguard your operations and protect those Computers or computers systems for
which You have obtained a License.
6. Restrictions to rights. You may not copy, distribute, extract components or make derivative works of the
Software. When using the Software, You are required to comply with the following restrictions:
(a) You may make one copy of the Software on a permanent storage medium as an archival back-up copy,
provided your archival back-up copy is not installed or used on any Computer. Any other copies You make of the
Software shall constitute breach of this Agreement.
(b) You may not use, modify, translate or reproduce the Software or transfer rights to use the Software or copies of
the Software in any manner other than as provided for in this Agreement.
(c) You may not sell, sub-license, lease or rent or borrow the Software or use the Software for the provision of
commercial services.
(d) You may not reverse engineer, reverse compile or disassemble the Software or otherwise attempt to discover
the source code of the Software, except to the extent that this restriction is expressly prohibited by law.
(e) You agree that You will only use the Software in a manner that complies with all applicable laws in the
jurisdiction in which You use the Software, including, but not limited to, applicable restrictions concerning copyright
and other intellectual property rights.
(f) You agree that You will only use the Software and its functions in a way which does not limit the possibilities of
31
other End Users to access these services. The Provider reserves the right to limit the scope of services provided to
individual End Users, to enable use of the services by the highest possible number of End Users. Limiting the scope
of services shall also mean complete termination of the possibility to use any of the functions of the Software and
deletion of Data and information on the Provider's servers or third-party servers relating to a specific function of
the Software.
(g) You agree not exercise any activities involving use the License key, contrary to the terms of this Agreement or
leading to provide License key to any person who is not entitled to use the Software, such as the transfer of used
or unused License key in any form, as well as the unauthorized reproduction, or distribution of duplicated or
generated License keys or using the Software as a result of the use of a License key obtained from the source
other than the Provider.
7. Copyright. The Software and all rights, without limitation including proprietary rights and intellectual property
rights thereto are owned by ESET and/or its licensors. They are protected by international treaty provisions and by
all other applicable national laws of the country in which the Software is being used. The structure, organization
and code of the Software are the valuable trade secrets and confidential information of ESET and/or its licensors.
You must not copy the Software, except as set forth in Article 6(a). Any copies which You are permitted to make
pursuant to this Agreement must contain the same copyright and other proprietary notices that appear on the
Software. If You reverse engineer, reverse compile, disassemble or otherwise attempt to discover the source code
of the Software, in breach of the provisions of this Agreement, You hereby agree that any information thereby
obtained shall automatically and irrevocably be deemed to be transferred to and owned by the Provider in full,
from the moment such information comes into being, notwithstanding the Provider's rights in relation to breach of
this Agreement.
8. Reservation of rights. The Provider hereby reserves all rights to the Software, with the exception of rights
expressly granted under the terms of this Agreement to You as the End User of the Software.
9. Multiple language versions, dual media software, multiple copies. In the event that the Software
supports multiple platforms or languages, or if You receive multiple copies of the Software, You may only use the
Software for the number of computer systems and for the versions for which You obtained a License. You may not
sell, rent, lease, sub-license, lend or transfer versions or copies of the Software which You do not use.
10. Commencement and termination of the Agreement. This Agreement shall be effective from the date You
agree to the terms of this Agreement. You may terminate this Agreement at any time by permanently uninstalling,
destroying and returning, at your own cost, the Software, all back-up copies and all related materials provided by
the Provider or its business partners. Irrespective of the manner of termination of this Agreement, the provisions of
Articles 7, 8, 11, 13, 19 and 21 shall continue to apply for an unlimited time.
11. END USER DECLARATIONS. AS THE END USER YOU ACKNOWLEDGE THAT THE SOFTWARE IS PROVIDED "AS
IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, AND TO THE MAXIMUM EXTENT PERMITTED BY
APPLICABLE LAW. NEITHER THE PROVIDER, ITS LICENSORS OR AFFILIATES, NOR THE COPYRIGHT HOLDERS MAKE
ANY REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE OR THAT THE SOFTWARE WILL NOT
INFRINGE ANY THIRD-PARTY PATENTS, COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. THERE IS NO WARRANTY BY
THE PROVIDER OR BY ANY OTHER PARTY THAT THE FUNCTIONS CONTAINED IN THE SOFTWARE WILL MEET YOUR
REQUIREMENTS OR THAT THE OPERATION OF THE SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE. YOU
ASSUME ALL RESPONSIBILITY AND RISK FOR THE SELECTION OF THE SOFTWARE TO ACHIEVE YOUR INTENDED
RESULTS AND FOR THE INSTALLATION, USE AND RESULTS OBTAINED FROM IT.
12. No other obligations. This Agreement creates no obligations on the part of the Provider and its licensors
other than as specifically set forth herein.
13. LIMITATION OF LIABILITY. TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW, IN NO EVENT SHALL
THE PROVIDER, ITS EMPLOYEES OR LICENSORS BE LIABLE FOR ANY LOST PROFITS, REVENUE, SALES, DATA OR
COSTS OF PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES, PROPERTY DAMAGE, PERSONAL INJURY,
INTERRUPTION OF BUSINESS, LOSS OF BUSINESS INFORMATION OR FOR ANY SPECIAL, DIRECT, INDIRECT,
INCIDENTAL, ECONOMIC, COVER, PUNITIVE, SPECIAL OR CONSEQUENTIAL DAMAGES, HOWEVER CAUSED AND
WHETHER ARISING UNDER CONTRACT, TORT, NEGLIGENCE OR OTHER THEORY OF LIABILITY, ARISING OUT OF THE
USE OF OR INABILITY TO USE THE SOFTWARE, EVEN IF THE PROVIDER OR ITS LICENSORS OR AFFILIATES ARE
32
ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. BECAUSE SOME COUNTRIES AND JURISDICTIONS DO NOT
ALLOW THE EXCLUSION OF LIABILITY, BUT MAY ALLOW LIABILITY TO BE LIMITED, IN SUCH CASES, THE LIABILITY OF
THE PROVIDER, ITS EMPLOYEES OR LICENSORS OR AFFILIATES SHALL BE LIMITED TO THE SUM THAT YOU PAID FOR
THE LICENSE.
14. Nothing contained in this Agreement shall prejudice the statutory rights of any party dealing as a consumer if
running contrary thereto.
15. Technical support. ESET or third parties commissioned by ESET shall provide technical support at their own
discretion, without any guarantees or declarations. The End User shall be required to back up all existing data,
software and program facilities prior to the provision of technical support. ESET and/or third parties commissioned
by ESET cannot accept liability for damage or loss of data, property, software or hardware or loss of profits due to
the provision of technical support. ESET and/or third parties commissioned by ESET reserve the right to decide that
resolving the problem is beyond the scope of technical support. ESET reserves the right to refuse, suspend or
terminate the provision of technical support at its own discretion. License information, Information and other data
in compliance with Privacy Policy may be required for the purpose of technical support provision.
16. Transfer of the License. The Software can be transferred from one Computer to another, unless contrary to
the terms of the Agreement. If not contrary to the terms of the Agreement, the End User shall only be entitled to
permanently transfer the License and all rights ensuing from this Agreement to another End User with the
Provider's consent, subject to the condition that (i) the original End User does not retain any copies of the
Software; (ii) the transfer of rights must be direct, i.e. from the original End User to the new End User; (iii) the new
End User must assume all the rights and obligations incumbent on the original End User under the terms of this
Agreement; (iv) the original End User has to provide the new End User with documentation enabling verification of
the genuineness of the Software as specified under Article 17.
17. Verification of the genuineness of the Software. The End User may demonstrate entitlement to use the
Software in one of the following ways: (i) through a license certificate issued by the Provider or a third party
appointed by the Provider; (ii) through a written license agreement, if such an agreement was concluded; (iii)
through the submission of an e-mail sent by the Provider containing licensing details (user name and password).
License information and End User identification data in compliance with Privacy Policy may be required for the
purpose of Software genuineness verification.
18. Licensing for public authorities and the US Government. The Software shall be provided to public
authorities, including the United States Government, with the license rights and restrictions described in this
Agreement.
19. Export and re-export control. The Software, the Documentation or components thereof, including
information about the Software and components thereof, shall be subject to import and export controls under legal
regulations which may be issued by governments responsible for issue thereof under applicable law, including US
Export Administration Regulations, and end user, end-use and destination restrictions issued by the US
Government and other governments. You agree to comply strictly with all applicable import and export regulations
and acknowledge that You have the responsibility to obtain all licenses required to export, re-export, transfer or
import the Software.
20. Notices. All notices and return of the Software and Documentation must be delivered to: ESET, spol. s r. o.,
Einsteinova 24, 851 01 Bratislava, Slovak Republic.
21. Applicable law. This Agreement shall be governed by and construed in accordance with the laws of the
Slovak Republic. The End User and the Provider hereby agree that the principles of the conflict of laws and the
United Nations Convention on Contracts for the International Sale of Goods shall not apply. You expressly agree
that any disputes or claims ensuing from this Agreement with respect to the Provider or any disputes or claims
relating to use of the Software shall be settled by Bratislava I District Court and You expressly agree to the said
court exercising jurisdiction.
22. General provisions. Should any of the provisions of this Agreement be invalid or unenforceable, this shall not
affect the validity of the other provisions of the Agreement, which shall remain valid and enforceable in accordance
with the conditions stipulated therein. This Agreement may only be modified in written form, signed by an
authorized representative of the Provider or a person expressly authorized to act in this capacity under the terms
33
of a power of attorney.
This is the entire Agreement between the Provider and You relating to the Software and it supersedes any prior
representations, discussions, undertakings, communications or advertising relating to the Software.
34