ESET PROTECT Advanced - Proposal v1.0
ESET PROTECT Advanced - Proposal v1.0
ACME Inc.
Ver 1.0
Contact Information
1
Executive Summary
Expertise, integrity, independence: these are components we believe to be crucial for building
our award-winning cybersecurity solutions.
At ESET, we don’t rely on a single magic formula. Instead, our elite experts combine decades of
industry experience with deep knowledge of the subject and power of machine learning to
create unique multilayered protection. This approach, coupled with ESET’s professional service,
is how we make sure that our customers will be safe from threats both existing and yet to come.
We will always promote responsible practices in the industry, challenging empty claims and
non-transparent methods.
We’re proud to be one of very few privately owned global cybersecurity companies. Without
pressure from investors, we have the freedom to make the right choices – to do what needs to
be done for the ultimate protection of all our customers.
For more than 30 years, we’ve been helping organizations and people protect their digital world.
From a small dynamic company we’ve grown into a digital brand. Many things have changed,
but our core aspirations, philosophy and values remain the same – to build a more secure digital
world where organizations and people everywhere can truly Enjoy Safer Technology.
2
ESET PROTECT 11
ESET PROTECT 11
ESET PROTECT On-prem 11
ESET PROTECT Server 11
Independent Agent 11
Web-Console 12
ESET HTTP Proxy 12
Rogue Detection Sensor 12
Multi-Platform Support 12
ESET Business Account 12
Endpoint Deployment 12
Multi-tenancy 13
Secure Peer Communication 13
2FA-Protected Login 13
Integrated ESET SysInspector® 13
Dynamic and Static Groups 13
Policies 13
Triggers 14
Tasks 14
Reports 14
Notifications 14
ESET PROTECT Bundles 15
Advanced Machine Learning 16
ESET Advanced Machine Learning (Cloud) 16
ESET Advanced Machine Learning (Endpoint) 17
Supported Platforms 19
System Requirements 20
Workstations 20
Servers 20
Storage Servers 21
Virtualized Hosts 22
Mobile Devices 22
3
ESET Endpoint Security 23
Antivirus and Antispyware 23
35-years of Signatures 23
Behavior-based Detections 23
File-less Malware Detection 24
Sandboxing 24
Network Attack Protection 25
Email Security 25
Web Control 26
Device Control 26
Scanning 26
Update Distribution 27
Micro Updates 28
Update Rollback 28
Postponed Updates 28
Local Update Server 28
Optional cloud-powered scanning: 28
ESET LiveGrid 29
Virtualization Support 29
Host-Based Intrusion Prevention System (HIPS) 29
Exploit Blocker 30
Client Anti-spam 30
Anti-Phishing 30
Two-Way Firewall 30
Vulnerability Shield 30
Ransomware Shield 31
Botnet Protection 31
Botnet Tracker 31
UEFI Scanner 31
DNA Detections 31
Idle-State Scanner 32
First Scan after Installation 32
RIP & Replace 32
4
Customizable GUI Visibility 32
ESET Business Account 33
Touchscreen Support 33
Low System Demands 33
Right-to-Left Language Support 33
Cross-Platform Protection 33
Remote Management 33
5
Layer 4 - In-depth behavioral analysis 38
Highlights 38
Ransomware and zero-day threats detection 38
Granular reports 39
Transparent full visibility 39
Automatic protection 39
Mail Security protection 39
Mobility 39
Proactive protection 39
Tailored customization 39
Manual submission 39
6
Open Architecture And Integrations 43
Company Policy Violation Detection 43
Sophisticated Scoring 43
Local Data Collection 43
Use Cases 43
7
ESET Log Collector 48
ESET Business Account 48
8
ESET Mobile Device Management for Apple iOS 53
Solution Architecture 54
Cloud Console 54
Availability 54
Maintenance 54
ESET PROTECT (on-prem) 55
Update Caching & Distribution 56
Network Load 57
Network Load (with used MB size, eg:MB/day) 57
ESET Inspect 58
Ports and Network Traffic 59
Network Firewall Configuration 59
On-prem deployments 59
ESET Inspect (Cloud) 60
Proposed Solution 61
Products and Features 61
Work Breakdown Structure (WBS) 62
About ESET 63
Why ESET? 64
9
ESET PROTECT
An endpoint protection platform (EPP) is
a solution deployed on endpoint devices to
ESET PROTECT
prevent file-based malware attacks, detect
The primary cloud-based management
malicious activity, and provide the
console. Previously known as ESET Cloud
investigation and remediation capabilities
Administrator, with significant feature
needed to respond to dynamic security
upgrated to accommodate customers of
incidents and alerts.
most sizes and requirements.
ESET’s endpoint protection solutions
leverage a multilayered approach that ESET PROTECT On-prem
utilizes multiple technologies working in a
dynamic equilibrium, which has the ability to For customers who prefer or require an
constantly balance performance, detection on-premise deployed management
and false positives. console. Previously known as ESET
Security Management Center.
A single layer of defense is not enough for
the constantly evolving threat landscape. All
ESET Endpoint Security products have the ESET PROTECT Server
ability to detect malware pre-execution,
during execution and post-execution. ESET PROTECT’s server component can
Focusing on more than a specific part of the be installed on Windows as well as Linux
malware lifecycle allows us to provide the servers and also comes as a virtual
highest level of protection possible. appliance. It handles communication with
agents, and collects and stores application
ESET Endpoint solutions are fully data in the database.
manageable via ESET PROTECT Console.
It is a single pane of glass over all ESET
Independent Agent
security solutions deployed in the network. It
controls endpoint prevention, detection &
The agent is a small application that
response layers across all
handles the remote management
platforms—covering desktops, servers,
communication and runs independently of
virtual machines and even managed mobile
the security solution itself. It connects to
devices.
ESET PROTECT Server and executes
tasks, collects logs from ESET applications,
Deploy, run tasks, set up policies, collect
interprets and enforces policies, and
logs, and get notifications and an overall
performs other tasks, e.g. software
security overview of your network – all via a
deployment and general computer
single web-based management console.
monitoring. As the agent executes tasks
10
and interprets server logic locally, it reacts traces. It provides the administrator with
to and eliminates security issues even when improved visibility of all devices located
the client is not connected to the server. within the corporate network. Discovered
machines are immediately located and
reported in a predefined report allowing the
Web-Console
admin to move them to a specific static
group and proceed with management tasks.
The front-end component of ESET
PROTECT, the web-console, manages
everyday network security. It has a role in Multi-Platform Support
interpreting the data stored in the database,
visualizing it in the form of clear dashboards ESET PROTECT Server runs on both
and lists with drill-down capabilities, and Windows and Linux machines. The general
commands the agents and other ESET installer deploys ESET PROTECT, including
applications. In addition, it offers a huge server, database and other components, in
array of customization options to suit the one step. The admin can also install
needs of any administrator by providing an component-by-component, or deploy as a
easy “look & see” overview of the entire virtual appliance.
network’s security.
11
Multi-tenancy 2FA-Protected Login
A single instance of ESET PROTECT can To validate the identities of users logging in
serve multiple independent users with to ESET PROTECT, it’s possible to enable
specific access and privileges – while the two-factor authentication (2FA) directly from
user cannot see the data of other users. It is the web console. Up to 10 accounts can be
also possible to grant three levels of access 2FA-protected for free. After a simple
to each object – read / use / write – as well self-enrollment directly from the
as granular access settings for different web-console, the user will receive a link via
types of tasks. Multi-tenancy is ideal for SMS to download the ESET Secure
large enterprises with one centralized server Authentication mobile app – which is then
and different admins managing only used to generate random one-time
endpoints in their respective locations, or for passwords. Once 2FA is set up, one-time
MSPs managing multiple customers from a passwords are used to complement and
single server but who need to ensure that strengthen the authentication process.
customers are not able to see the data of
other users.
Integrated ESET SysInspector®
12
respective dynamic group. It is also possible products; this also includes pre-configured
to assign a policy to a dynamic group, with tasks.
this policy applied to clients upon entry to
the respective dynamic group and
Reports
withdrawn upon exit. This happens without
any admin/user interaction.
Admins can choose from predefined report
templates or create custom ones, just using
Policies a selected set of data and values. ESET
PROTECT collects only data which is
The admin can define policies per security necessary for generating reports, with the
product and clearly specify their mutual remaining logs stored on the client, resulting
relationship. Policies are executed on the in better database performance. Each report
agent, so even without a connection to the template can be viewed in the web-console
ESET PROTECT server the agent is able to as a dashboard element to provide the
apply policies assigned to a specific administrator with an excellent real-time
dynamic group in the event that a client overview of network security, including
enters that dynamic group. For even easier drill-down possibilities. What’s more, it
management, the admin can choose from allows action to be taken if necessary. Apart
predefined policy templates for each ESET from displaying reports via web-console,
security product, according to the needs of they can be exported to a PDF / PS / CSV
various clients, e.g. applying specific policy and saved to a predefined location or sent
templates for laptops or servers, and as an email notification report.
restrictive or soft policies.
Notifications
Triggers
It’s critical for administrators to get
By configuring triggers, the admin is able to notification of any security issues happening
define if and when a specific task is in the network, in order to react immediately.
executed. Triggers can be paired with The admin can configure notification options
dynamic groups and execute the tasks on a via a wizard-style series of steps, or use any
client once it enters the group. Scheduled of the predefined notification templates.
triggers provide the ability to specify task Templates can be mapped to the specific
execution according to date, time, day and dynamic group memberships of clients or
repeat frequency. triggered by specific indications or events as
they are recorded in event logs.
Tasks
13
ESET PROTECT Bundles
14
Advanced Machine Learning
At ESET, our engineers are old acquaintances of machine learning. We recognized its potential
early on and employed it to help detect malware over 20 years ago. To this day, this symbiosis
continues, with neural networks, deep learning, and classification algorithms being integral parts
of the protective layers in ESET products and services.
Combining these technological trends, wealth of information and human expertise, ESET has
created its ML-based detection engine, which today consists of two parts:
1. Every sample entering ESET Advanced Machine Learning in the cloud is subjected to
static analysis. The engine extracts the features of the sample, collecting information that
is then fed to deep-learning algorithms.
2. The sample is also emulated as a part of dynamic analysis, producing DNA genes.
These are fed to a series of precisely chosen classification models and another
deep-learning algorithm.
15
3. The sample is then executed in a sandbox and subjected to advanced memory analysis.
Results are then compared with a set of previously known, periodically reviewed, and
automatically updated clean and malicious samples.
4. The results from the previous steps are consolidated either via a neural network or other
forms of evaluation and used to produce a final decision, labeling the sample as:
a. clean
b. potentially unwanted/unsafe application (PUA/PUSA)
c. malicious
5. The information is then distributed to all ESET clients either via regular update or via
ESET LiveGrid® 2 .
It is important to note that as part of sample processing, unlike with some of the post-truth
security vendor products, ESET also utilizes unpacking and behavioral analysis, as well as
sample emulation. These steps are crucial to extracting sufficient, relevant sample features,
before they can be fed to the ML engine.
ESET Advanced Machine Learning (AML) on the endpoint is an additional detection layer that
proactively protects our users from previously unknown threats. It expands ESET detection
capabilities by analyzing all suspicious samples on the user’s device at the instant they are
encountered.
16
1. Local security solution encounters an unknown yet suspicious sample and scans it with
help of AML on the endpoint.
2. AML on the endpoint runs static analysis, producing basic characteristics of the analyzed
sample without executing it.
3. AML on the endpoint runs a dynamic analysis and extracts DNA genes describing some
of sample’s active features and behaviors, uncovering malicious characteristics even in
packed or obfuscated items.
4. Information extracted in steps 2 and 3 is further processed by several carefully-chosen
classification models and a deep learning algorithm.
5. Outputs of the ESET Advanced Machine Learning on the endpoint algorithms are then
consolidated via simplified, yet still powerful, methods used by ESET Advanced Machine
Learning in the cloud.
ESET Advanced Machine Learning in the cloud is a demanding beast, requiring “heavy
machinery” that is not available in regular user devices. Therefore, ESET engineers designed
ESET Advanced Machine Learning on the endpoint as a lightweight solution, allowing it to run
directly on the user’s device.
This engine analyzes samples locally, with machine-learning models and the consolidation of
the verdict happening offline. This makes the results available to the user in real time and
translates into proactive protection from unknown threats even if the user has no or limited
internet connectivity.
The separation of tasks offers multiple advantages, with the main ones being:
● While the part of the engine running on the device protects the user proactively by
analyzing and detecting emerging threats when encountered, the cloud
machine-learning engine offers context and power that helps to identify even
sophisticated and difficult-to-spot attacks.
● Also, the local engine protects the user from any never-before-seen threats even when
the internet connection is unreliable or non-existent.
17
Supported Platforms
18
System Requirements
● Intel or AMD processor, 32-bit (x86) with SSE2 instruction set or 64-bit (x64), or ARM
processor, 1 GHz or higher
● 0.3 GB of free system memory (see Note 1)
● 1 GB of free disk space (see Note 2)
● Minimum display resolution 1024x768
● Internet connection or a local area network connection to a source (see Note 3) of
product updates
● Two antivirus programs running simultaneously on a single device causes inevitable
system resource conflicts, such as slowing down the system to make it inoperable
Workstations
● Microsoft® Windows® 11
● Microsoft® Windows® 10
● Microsoft® Windows® 8.1
● Microsoft® Windows® 8
● Microsoft® Windows® 7 SP1 with latest Windows updates (at least KB4474419 and
KB4490628)
● Windows XP and Windows Vista are no longer supported.
● macOS 10.15 to macOS 13
● macOS Server 10.15 and later
● Ubuntu Desktop 18.04 LTS 64-bit
● Ubuntu Desktop 20.04 LTS
● Ubuntu Desktop 22.04 LTS
● Red Hat Enterprise Linux 7, 8 with supported desktop environment installed.
● SUSE Linux Enterprise Desktop 15
● Linux Mint 20
19
Servers
Note:
● Linux distributions with ELREPO kernel and AWS kernel are not supported.
● RHEL with the "Protection Profile for General Purpose Operating Systems (OSPP)" is
not supported.
Storage Servers
20
● Microsoft Windows Small Business Server 2011 SP1 (x64) with KB4474419 and
KB4490628 installed
● Microsoft Windows MultiPoint Server 2012
● Microsoft Windows MultiPoint Server 2011
● Microsoft Windows MultiPoint Server 2010
Virtualized Hosts
Mobile Devices
21
ESET Endpoint Security
22
File-less Malware Detection Memory Scanner performs a behavioral
code analysis using ESET DNA
Advanced Memory Scanner is a unique Detections.
ESET technology which effectively
addresses an important issue of modern Code analysis is performed not only for
malware – heavy use of obfuscation standard executable memory but also for
and/or encryption. .NET MSIL (Microsoft Intermediate
Language) code used by malware authors
These malware protection tactics, often to hamper dynamic analysis. Due to the
used in run-time packers and code implementation of smart caching, Advanced
protectors, cause problems for detection Memory Scanner has almost no overhead
approaches which employ unpacking and doesn’t cause any noticeable
techniques such as emulation or deterioration in processing speeds.
sandboxing. What’s more, whether checking
is done using an emulator or virtual/physical Advanced Memory Scanner cooperates well
sandboxing, there is no guarantee that with Exploit Blocker. Unlike the latter, it is a
during analysis the malware will display post-execution method, which means that
malicious behavior that will allow it to be there is a risk that some malicious activity
classified as such. could have occurred already. However, it
steps into the protection chain as a last
Malware can be obfuscated in such a way resort if an attacker manages to bypass
that not all execution paths can be other layers of protection.
analyzed; it can contain conditional or time
triggers for the code; and, very frequently, it Moreover, there is a new trend in advanced
can download new components during its malware: some malicious code now
lifetime. To tackle these issues, Advanced operates is “in-memory only”, without
Memory Scanner monitors the behavior of a needing persistent components in the file
malicious process and scans it once it system that can be detected conventionally.
decloaks in memory. This complements the
more traditional functionality of Initially, such malware appeared only on
pre-execution or on-execution proactive servers, due to their long uptime – since
code analysis. server systems stay up for months or years
at a time, malicious processes could remain
Also, clean processes can suddenly in memory indefinitely without needing to
become malicious because of exploitation survive a reboot – but recent attacks on
or code injection. For these reasons, businesses indicate a change in this trend,
performing analysis just once is not enough. and we are seeing endpoints also targeted
Constant monitoring is needed, and this is in this manner. Only memory scanning
the role of Advanced Memory Scanner. can successfully discover such
Whenever a process makes a system call malicious attacks and ESET is ready for
from a new executable page, Advanced this new trend with its Advanced
Memory Scanner.
23
Sandboxing detection of known vulnerabilities on the
network level. By implementing detection
ESET split the DNA detection into two. It for common vulnerabilities in widely used
helps with understanding the whole protocols, such as SMB, RPC and RDP, it
process. It is something we came with in constitutes another important layer of
1995 with our first emulator utilizing our protection against spreading malware,
product – it was possible to run the famous network-conducted attacks and exploitation
Doom game in the emulator. This is what of vulnerabilities for which a patch has not
we do in order to extract behavioral yet been released or deployed.
metadata that we are No Emulation utilizing
in our DNA detections. Malware is getting
obfuscated and trying to evade detection
Email Security
and we are trying to see through how it is
behaving underneath and we can target the Integration of ESET Mail Security with email
real behavior of the malware. We are also clients increases the level of active
using binary translations for this, so we are protection against malicious code in email
not slowing down the machine. messages. If your email client is supported,
24
Email clients that are currently supported than 35 pre-defined website categories and
include Microsoft Outlook, Outlook Express, over 140 subcategories.
Windows Mail and Windows Live Mail.
Email protection works as a plug-in for
Device Control
these programs. The main advantage of the
plug-in is that it is independent of the ESET Endpoint Antivirus provides automatic
protocol used. When the email client device (CD/DVD/USB/...) control. This
receives an encrypted message, it is module allows you to block or adjust
decrypted and sent to the virus scanner. extended filters/permissions and define a
users ability to access and work with a
Web Control given device. This may be useful if the
computer administrator wants to prevent the
ESET Web Protection consists of 3 use of devices containing unsolicited
modules: content.
Web control lets you block webpages that Blocking, Allowing, warning can be done
may contain potentially offensive material. based on:
In addition, employers or system ● Vendor
administrators can prohibit access to more ● Model or
● Serial Number of the device
25
Scanning Scan on
Smart scan: This is the default scanning By default, all files are scanned upon
profile. The Smart scan profile uses Smart opening, creation, or execution. We
Optimization technology, which excludes recommend that you keep these default
files that were found to be clean in a settings, as they provide the maximum level
previous scan and have not been modified of real-time protection for your computer:
since that scan. This allows for lower scan
times with a minimal impact to system ● File open – Enables or disables
security. scanning when files are opened.
● File creation – Enables or disables
Context menu scan: You can start an scanning when files are created.
on-demand scan of any file from the context ● File execution – Enables or
menu. The Context menu scan profile disables scanning when files are
allows you to define a scan configuration run.
that will be used when you trigger the scan ● Removable media access –
this way. Enables or disables scanning
triggered by accessing particular
In-depth scan: The In-depth scan profile removable media with storage
does not use Smart optimization by default, space.
so no files are excluded from scanning ● Computer shutdown – Enables or
using this profile. disables scanning triggered by
computer shutdown.
Scan Options: Allows you to select the
scanning methods/technologies used during
scanning. Heuristics and Advanced Update Distribution
heuristics/DNA/Smart signatures are the
available options. With ESET, each update will be downloaded
from the Internet only once for the entire
Media to scan organisation. How?
By default, all types of media are scanned In order to improve efficiency of updates,
for potential threats: the customers can deploy ESET Caching
Proxy server on-premise, which will
● Local drives – Controls all system download the latest update and distribute it
hard drives. to all machines in the network. This will
● Removable media – Controls save Internet bandwidth significantly.
CD/DVDs, USB storage, Bluetooth
devices, etc. Once an update is available, the head office
● Network drives – Scans all mapped server will download the update, cache it,
drives. and distribute it among the endpoints in the
local LAN.
26
If there are any branches, a caching server
can be placed in each branch to download Local Update Server
the update from the Head Office Server,
cache it, and distribute it throughout the Saves company bandwidth by downloading
branch. updates only once, to a local mirror server.
Lets you revert to a previous version of Afterwards, our ESET LiveGrid® Reputation
protection modules and virus signature System is queried for object reputation (i.e.
database. whether the object has already been seen
elsewhere and classified as malicious or
Allows you to freeze updates as desired - otherwise). This improves scanning
opt for temporary rollback or delay until efficiency and enables faster sharing of
manually changed. malware intelligence with our customers.
27
ESET LiveGrid Virtualization Support
The simplest way to provide protection ESET Shared Local Cache stores metadata
using a cloud system is by exact blacklisting about already scanned files within the virtual
using hashing. This works well for both files environment so identical files are not
and URLs, but it is able to block only objects scanned again, resulting in boosted scan
that match the hash exactly. This limitation speed.
has led to the invention of fuzzy hashing.
Fuzzy hashing takes into consideration the ESET module updates and virus signatures
binary similarity of objects, as similar database are stored outside of the default
objects have the same or a similar hash. location, so these don’t have to be
downloaded every time a virtual machine is
ESET has moved fuzzy hashing to the next reverted to default snapshot.
level. We do not perform hashing of data
but hashing of the behavior described in
DNA Detections. Using DNA hashing we Host-Based Intrusion Prevention
are able to block thousands of different
System (HIPS)
variants of malware instantly.
ESET’s Host-based Intrusion Prevention
Unknown, potentially malicious applications
System (HIPS) monitors system activity and
and other possible threats are monitored
uses a pre-defined set of rules to recognize
and submitted to the ESET cloud via the
suspicious system behavior. When this type
ESET LiveGrid Feedback System. The
of activity is identified, the HIPS
samples collected are subjected to
self-defense mechanism stops the offending
automatic sandboxing and behavioral
program or process from carrying out
analysis, which results in the creation of
potentially harmful activity.
automated detections if malicious
characteristics are confirmed.
28
support for Microsoft Outlook (POP3, IMAP,
MAPI).
Users can define a custom set of rules to be
used instead of the default rule set; enabling
you to define rules for system registry, Anti-Phishing
processes, applications and files. Provides
Protects end users from attempts by fake
anti-tamper protection and detects threats
websites to acquire sensitive information
based on system behavior.
such as usernames, passwords or banking
and credit card details.
Exploit Blocker
Two-Way Firewall
Strengthens security of applications such as
web browsers, PDF readers, email clients or Prevents unauthorized access to your
MS office components, which are company network. Provides anti-hacker
commonly exploited. protection and data exposure prevention.
Monitors process behaviors and looks for Lets you define trusted networks, making all
suspicious activities typical of exploits. other connections, such as to public Wi-Fi,
in ‘strict’ mode by default. Troubleshooting
Strengthens protection against targeted wizard guides you through a set of
attacks and previously unknown exploits, questions, identifying problematic rules, or
i.e. zero-day attacks that could be used by allowing you to create new ones.
crypto-ransomware to enter the targeted
system.
Vulnerability Shield
29
Protects against vulnerabilities for which a these are obtained, it initiates fake
patch has not yet been released or communication from various geolocations.
deployed. All the extracted data is then
post-processed and used to protect ESET
customers worldwide, for example by
Ransomware Shield
blocking URLs, creating new detections for
the payloads as well as for informing ESET
ESET Ransomware Shield is an additional
Threat Intelligence clients.
layer protecting users from the threat also
known as extortion malware. This
technology monitors and evaluates all UEFI Scanner
executed applications using behavioral and
reputation-based heuristics. Whenever a ESET is the first internet security
behavior that resembles ransomware is provider to add a dedicated layer into its
identified or the potential malware tries to solution that protects the Unified
make unwanted modifications to existing Extensible Firmware Interface (UEFI).
files (i.e. to encrypt them), our feature ESET UEFI Scanner checks and enforces
notifies user who can block the activity. the security of the pre-boot environment that
Ransomware Shield is fine-tuned to offer is compliant with the UEFI specification. It is
the highest possible level of ransomware designed to detect malicious components in
protection together with other ESET the firmware and report them to the user.
technologies including Cloud Malware
Protection System, Network Attack
DNA Detections
Protection and DNA Detections.
The pattern matching used by old-school
antivirus products can be bypassed easily
Botnet Protection by simple modification of the code or use of
obfuscation techniques. However, the
Protects against infiltration by botnet behavior of objects cannot be changed so
malware – preventing spam and network easily.
attacks launched from the endpoint.
ESET DNA Detections are precisely
designed to take advantage of this principle.
Botnet Tracker
We perform deep analysis of code,
If a sample or its memory dump is identified extracting the “genes” that are responsible
by ESET systems as a ‘botnet’ it is sent to for its behavior. Such behavioral genes
ESET Botnet Tracker, which identifies the contain much more information than the
exact variant of the malware and uses case indicators of compromise (IOCs) that some
specific unpacker/decryptor to extract so called “next-gen” solutions claim to be
information about its C&C servers and ”the better 6 alternative” to signature
encryption/communication keys. When detection. ESET behavioral genes are used
30
to construct DNA Detections, which are
used to assess potentially suspect code,
Idle-State Scanner
whether it’s found on the disk or in the
running process memory. Aids system performance by performing a
full scan proactively when the computer is
Additionally, our scanning engine extracts
not in use. Helps speed up subsequent
many discriminator genes, which are used
scans by populating the local cache.
for anomaly detection: anything which does
not look legitimate is potentially malicious.
First Scan after Installation
31
lifetime. Conserves battery life for laptops
ESET Business Account that are away from the office, using battery
mode.
Makes it possible to handle all licenses
transparently, from one place via web
browser. You can merge, delegate and
Right-to-Left Language Support
manage all licenses centrally in real-time,
Native right-to-left language support (e.g. for
even if you are not using ESET PROTECT.
Arabic) for optimum usability.
Touchscreen Support
Cross-Platform Protection
Supports touch screens and high-resolution
ESET security solutions for Windows are
displays.
capable of detecting Mac OS threats and
More padding for and complete vice-versa, delivering better protection in
rearrangement of GUI elements. Basic multi-platform environments.
frequently used actions accessible from the
tray menu. Remote Management
32
ESET Server Security
ESET module updates and virus signatures Monitors the behavior of malicious
database are stored outside of the default processes and scans them once they
location, so these don’t have to be decloak in the memory. This allows for
downloaded every time a virtual machine is effective infection prevention, even from
reverted to default snapshot. heavily obfuscated malware.
Scans Microsoft Windows® servers with Allows you to configure the solution to
enabled Hyper-V role for malware, without a automatically replicate settings when
need to have another instance of antivirus installed in a cluster environment. An
product in place. Saves time by scanning intuitive wizard makes it easy to
the hard-drive contents with no interconnect several installed nodes of
33
ESET File Security within a cluster and Device Control
manage them as one, eliminating the need
to replicate changes in configuration Blocks unauthorized portable devices from
manually to other nodes in the cluster. connecting to the server.
Allows you to easily set up on-demand Soft blocking – notifies the end user that his
scans of connected Network Attached device is blocked and gives him the option
Storage (NAS). to access the device, with activity logged.
34
Presence of ESET solution can be made
Local Update Server completely invisible to end-user, including
no tray icon or notification windows.
Saves company bandwidth by downloading
updates only once - to a local mirror server. By hiding the GUI completely, the “egui.exe”
process does not run at all, resulting in even
Mobile workforce updates directly from
lower system resource consumption by the
ESET Update Server when the local mirror
ESET solution.
is not available.
35
ESET Live Guard Advanced (Cloud Sandboxing)
samples based on their behavior before it
Advanced persistent threats require a
runs on the endpoints.
behavioral approach to detection – instead
of trying to detect malware based on what it
The network security sandbox consists of
is (signature-based), behavioral malware
multiple types of sensors that listen to
detection relies on what the malware does.
network traffic containing active code.
The deployment of a security sandbox in the
These sensors conduct static analysis of the
organization’s network adds a layer of
code. The sandbox also includes a virtual
security to increase threat detection before
execution environment for in-depth
executing in a live or production
inspection of running samples that uses
environment. The additional security layer is
multiple detection methods including
represented by ESET's Cloud-based
behavior-based detection, in-memory
Sandbox – ESET LiveGuard Advanced.
introspection, and extrapolation models
powered by Machine learning. This
The network security sandbox is an isolated
approach is more efficient than just
test environment. The system in this
comparing the signatures of files.
environment executes the suspicious
Sandboxing looks beyond the appearance
program, observes its behavior, and then
of the binary. Because it observes what the
analyzes it in an automated manner. The
file does, sandboxing is more conclusive in
network security sandbox blocks malicious
36
determining if the file is malicious than
signature-based detection. Layer 3 - Experimental detection
engine
Analysis in the sandbox uses many of
ESET’s internal tools for static and dynamic Samples are inserted into “sandboxes on
analysis, memory dumping, unpacking, and steroids” that closely resemble full-scale
similarity matching. It evaluates the user devices. They are subsequently
sample’s behavior and uses reputation data monitored for any sign of malicious
and threat intelligence feeds to increase behavior.
detection accuracy.
37
to take everything apart and analyze it for
anything unusual. Mobility
38
ESET Inspect (EDR)
business. Insider attacks are another threat
ESET Inspect, the XDR-enabling
for enterprises, again because the large
component of the ESET PROTECT
number of workers increases the odds that
platform, is a tool for identification of
one of them may be working against the
anomalous behavior and breaches, risk
company’s best interests.
assessment, incident response,
investigations and remediation.
XDR systems provide the increased visibility
necessary for organizations to see,
It enables incident responders to monitor
understand, block and remediate any issues
and evaluate all activities in the network and
across all their devices. ESET Inspect can
on connected devices. It also helps
for example quickly identify and stop
automate immediate remedial actions, if
malicious scripts that masquerade
needed. ESET’s 1,000+ (and counting)
themselves as parts of benign documents,
detection rules enable comprehensive
such as Word files.
threat hunting.
Insider threats and phishing attacks are ESET’s solution works out-of-the-box, but is
major problems for enterprise businesses. powerful enough to allow granular
Phishing attacks are commonly used modification by experienced threat hunters.
against enterprises because of the large
number of employees to target. The odds
are good that a single employee will take
the bait and end up compromising the entire
39
an In-Depth Executable Review of your
Automation and Customization network will allow you to identify anything
suspicious.
Easily tune ESET Inspect to the level of
Complete Prevention, Detection and
detail and automation you need. Choose
your level of desired interaction, and the
Response
type and amount of data to be stored,
Enables quick analysis and remediation of
during the initial setup and with the help of
any security issue in your network. ESET’s
preset user profiles, and then let Learning
underlying multilayered security, in which
Mode map your organization’s environment
every single layer sends data to ESET
and suggest exclusions to false positives.
Inspect, analyzes vast amounts of data in
where needed.
real time so that no threat goes undetected.
MITRE ATT&CK TM
Solution From A Security-First
ESET Inspect references its detections to Vendor
the MITRE Adversarial Tactics, Techniques,
ESET has been fighting cyber threats for
and Common Knowledge (ATT&CKTM)
more than 30 years. As a science-based
framework, which – with just one click –
company it has long been at the leading
provides you with comprehensive
edge of developments like machine
information about even the most complex
learning, cloud technology and now XDR.
threats.
40
responder’s connection to the console, and explanations for both benign and malicious
the connection with the endpoints. The causes, written by our malware experts.
connection works at close to real-time
speed with maximum security measures
Anomaly And Behavior Detection
applied, all without the need for third-party
tools.
Check actions carried out by an executable
and utilize ESET’s LiveGrid® Reputation
Live Response Options system to quickly assess if executed
processes are safe or suspicious.
ESET Inspect comes packed with easily Monitoring anomalous user-related
accessible one-click response actions such incidents is possible due to specific rules
as rebooting and shutting down an written to be triggered by behavior, not
endpoint, isolating endpoints from the rest simple malware, or signature detections.
of the network, running an on-demand scan, Grouping of computers by user or
killing any running process, and blocking department allows security teams to identify
any application based on its hash value. if the user is entitled to perform a specific
Additionally, thanks to ESET Inspect’s live action or not.
response option, called Terminal, security
professionals can benefit from the full suite
PUBLIC API
of investigation and remediation options in
PowerShell.
ESET Inspect features a Public REST API
that enables the accessing and exporting of
One-Click Isolation detections and their remediation to allow
effective integration with tools such as
Define network access policies to quickly SIEM, SOAR, ticketing tools and many
stop lateral movement by malware. Isolate others.
a compromised device from the network
with just one click in the ESET Inspect
TAGGING
interface. Also, easily remove devices from
the containment state.
Assign and unassign tags for fast filtering of
objects such as computers, alarms,
Root Cause Analysis exclusions, tasks, executables, processes,
and scripts. Tags are shared among users,
Easily view the root cause analysis, and full and once created, can be assigned within
process tree, of any potentially malicious seconds.
chain of events, drill down to the desired
level of detail and make informed decisions
based on the rich provided context and
41
Threat Hunting Sophisticated Scoring
Use the powerful query-based IOC search Prioritize the severity of alarms with a
and apply filters to raw data for sorting scoring functionality that attributes a
based on file popularity, reputation, digital severity value to incidents and allows
signature, behavior, or other contextual admins to quickly identify computers with a
information. Setting up multiple filters allows higher probability for potential incidents.
automated, easy threat hunting and incident
response, including the ability to detect and
Local Data Collection
stop APTs and targeted attacks.
View comprehensive data about a newly
Multiple Indicators Of Compromise executed module, including time of
execution, the user who executed it, dwell
View and block modules based on over 30 time and the devices attacked. All data is
different indicators, including hash, registry stored locally to prevent sensitive data
modifications, file modifications and network leakage.
connections.
42
● Remediate found infection vectors ● Only receive notifications for certain
such as email, web or USB devices. groups.
● Leverage the early warning system ● Easily respond by simply clicking a
to retrieve data on upcoming or new single button to block, kill or
threats. quarantine devices.
● Search all computers for indicators ● Proposed remediation and next
of compromise that the threat steps are built into alarms.
existed prior to warning. ● Rules are editable via XML language
● Search all computers for the to allow easy fine-tuning or creation
existence of the new threat. of new rules.
● Easily view and filter all installed
applications across devices.
● View and filter all scripts across
devices.
● Easily block unauthorized scripts or
applications from running.
● Remediate by notifying users about
unauthorized applications and
automatically uninstall.
● Identify and sort all computers
according to Active Directory,
automatic groupings or manual
groupings.
● Allow or block applications or scripts
based on computer grouping.
● Allow or block applications or scripts
based on the user.
43
ESET Cloud Office Security (ECOS)
Anti-spam it can send out an email to notify admins or
users so that they are immediately made
Now using an enhanced, award-winning aware of the threat.
engine with improved performance, this
essential component filters all spam emails
and keeps user mailboxes free of Automatic protection
unsolicited or undesired messages.
With this option enabled, admins can be
sure that new users created within the
Anti-malware Microsoft 365 tenant will be automatically
protected without the need to go to the
Scans all incoming emails and attachments console to add them separately.
as well as all new and changed files. This
helps keep the user’s mailbox free of
malware and prevents the spread of
Quarantine manager
malware through cloud storage across
multiple devices. An admin can inspect objects in this storage
section and decide to delete or release
them. This feature offers simple
Anti-phishing
management of emails and files that have
Prevents users from accessing web pages been quarantined by our security product.
that are known to be phishing sites. Email On top of that, the admin can download
messages can contain links that lead to quarantine items and investigate them with
phishing web pages. ESET Cloud Office other tools locally.
Security searches the message body and
the subject of incoming email messages to
Multitenancy
identify such links (URLs). The links are
compared against the phishing database, Add unlimited tenants and serve multiple
which is being constantly updated. companies from a single dedicated ESET
Cloud Office Security console.
Notifications
Rules
Notifications greatly improve admins’
efficiency by removing the need to ESET’s comprehensive rule system allows
constantly check the dashboard. When a administrators to manually define email
potentially suspicious new activity is filtering conditions and actions to take with
detected within ESET Cloud Office Security, the filtered emails.
44
ESET Mail Server Security
messageby-message, or by group – all via
Antivirus and Antispyware web browser. Actions vary based on the
reason a message was quarantined. A
Eliminates all types of threats, including
regular email report summarizing
viruses, rootkits, worms and spyware with
quarantined messages with embedded links
optional cloudpowered scanning for even
to execute actions can be sent to the user.
better performance and detection.
45
Exploit Blocker Snapshot Independence
Strengthens the security of applications ESET updates and program modules can
such as web browsers, PDF readers, email be stored outside of the default location – so
clients and MS office components, which are not affected by reverting to an earlier
are commonly exploited. Monitors process snapshot of the virtual machine. As a result,
behaviors and looks for suspicious activities the updates and modules don’t have to be
typical of exploits. Strengthens protection downloaded every time a virtual machine is
against targeted attacks and previously reverted to an earlier snapshot and the
unknown exploits, i.e. zero-day attacks. reverted machine can utilize untouched
updates and avoid large downloads,
resulting in faster snapshot recovery times.
Advanced Memory Scanner
46
communication happens over the same network infrastructure and servers, or on
physical hardware, there is practically no endpoints system demands on memory or
delay in scanning, resulting in considerable the CPU.
resource savings.
Component-Based Installation
Windows Management
Instrumentation (WMI) Provider Apart from the required components, ESET
allows you to choose to install only those
Provides the possibility to monitor key components you need:
functionalities of ESET Mail Security via
Windows Management Instrumentation ● Real-Time File System Protection
framework. This allows integration of ESET ● Web and Email Protection
Mail Server into 3rd party management and ● Device Control
SIEM software, such as Microsoft System ● Graphical User Interface (GUI)
Center Operations Manager, Nagios, and ● ESET Log Collector
others. ● and others
The admin can define processes which are ESET Mail Security is fully manageable via
ignored by the real-time protection module – ESET PROTECT. Deploy, run tasks, set up
all file operations that can be attributed to policies, collect logs, and get notifications
these privileged processes are considered and an overall security overview of your
to be safe. This is especially useful for network – all via a single webbased
processes that often interfere with real-time management console.
protection, like backup or live virtual
ESET Log Collector
machine migration. Excluded process can
access even unsafe files or objects without A simple tool which collects all logs relevant
triggering an alert. for troubleshooting, assisted by ESET’s
technical support, and bundles them into a
Incremental Micro-Definitions single archive which can be sent via email
or uploaded to a shared network drive to
Regular updates and actualizations are speed up the troubleshooting process.
downloaded and applied incrementally in
small packages.
ESET Business Account
This concept conserves system resources
Makes it possible to handle all licenses
and internet bandwidth without any
transparently, from one place via web
noticeable impact on the speed of the whole
47
browser. You can merge, delegate and
manage all licenses centrally in real-time,
even if you are not using ESET PROTECT.
All products managed from one Add additional devices at any time
console
You can increase the number of devices
ESET Full Disk Encryption works within the covered by your license at any time.
ESET PROTECT console, helping
administrators to save time thanks to
Single-click deployment
familiarity with the existing management
environment and concepts. Manage full disk encryption across your
entire network from a cloud‑based console.
Fully validated ESET PROTECT single pane of glass
allows admins to deploy, activate and
Patented technology to protect data for manage encryption on their connected
businesses of all sizes. ESET Full Disk endpoints with a single click.
Encryption is FIPS 140-2 validated with 256
bit AES encryption.
Password policies
Cross-platform coverage
48
ESET Virtualization Security for VMware
performance issues.
Performs agentless anti-malware scanning
• Supports Micro Segmentation and
of machines using VMware infrastructure or
automatic task execution that automatically
another virtualization solution, which keeps
moves infected machines to a different
your devices secured in all environments,
micro segment, to prevent malware spread,
including NSX and vShield platforms.
and executes scanning. Once a machine is
• Agent-less Security proven clean, it is returned to the original
• Support for Linux place.
• Automatic deployment of new ESET • When VMs are moved from one host to a
Virtualization Security appliances to hosts different one, where ESET Virtualization is
currently connected to NSX Manager. It installed, the VM keeps its security settings
allows automatic protection of added virtual and remains fully protected.
hosts, and virtualized • The information displayed in ESET
workloads. This drastically reduces the time Security Management Center is the same
needed for security deployment. as in the vCenter. It also simplifies
• A comprehensive hardware detection deployment, as all components can be
algorithm is used to determine the identity of deployed using a tool which connects to the
the machine based on its hardware. This VMware vCenter.
allows automated re-imaging and cloning of • All on-access and on-demand scanning
non-persistent tasks are offloaded via VMware tools to a
hardware environments. centralized scanner inside ESET
• All on-access and on-demand scanning Virtualization Security Appliance, effectively
tasks are offloaded via VMware tools to a preventing AV storms and performance
centralized scanner inside the ESET issues.
Virtualization Security appliance, effectively
preventing AV storms and
49
ESET Mobile Device Management (MDM)
Ensures that all installation files and See which of your apps has access to what
installed apps are automatically screened information on your smartphone or tablet.
for malware. You stay well-protected against Also monitors sensitive device settings that
online and offline threats including viruses, can lower security such as Debugging
trojans and ransomware. Mode that can allow a connection to the
system via USB.
On-demand Scanning
Scheduled Scan
Whenever you suspect foul play, run a scan
on your phone. It takes place silently in the Schedule a regular scan for malware at a
background, without interrupting your convenient time – overnight or while the
ongoing activities. Access logs and detailed phone is charging if desired.
scan results to check for detected threats.
App Lock
ESET Live Grid
Keeps your applications safe against
Ensures real-time protection against unauthorized access. Additional
emerging threats by using in-the-cloud authentification is required when accessing
technology collecting malware samples from sensitive apps so content can be hidden
ESET product users from all over the world. when lending the device to someone.
Every connected USB device will be Constant updates of your virus signature
checked first to prevent malware accessing database.
your smart phone.
50
vulnerabilities and increase your level of
protection when connected to a new Camera Snapshots
network. Password strength is also
checked and open ports are analyzed. Snapshots are automatically and regularly
sent from the phone‘s front and back
camera to my.eset.com if the device is
Proactive Anti-Theft marked as missing. This helps to identify its
location or its finder.
It acts when it detects suspicious behavior.
If incorrect Screen lock (PIN, pattern, Low Battery Alert
password) or unauthorized SIM is inserted,
device gets locked and snapshots from When the device is low on battery, its
phone cameras are automatically sent to current position and camera snapshots are
my.eset.com. The information includes the automatically sent to my.eset.com before
phone‘s location, current IP address, the device shuts off.
inserted SIM details and other data. The
user can mark the device as missing at
SIM Guard
my.eset.com and start Location tracking or
send Custom on-screen Message or even Lets you stay in control of your phone if it
Wipe the device contents. goes missing. Your phone will be locked
when unauthorized SIM card will be
inserted.
Custom On-screen Message
Security Audit
51
Also monitors sensitive device settings that configure security-related iOS device
can lower security such as Debugging settings from a single point, as with other
Mode that can allow a connection to the ESET Security products, without the need
system via USB. for an app to be installed on each iOS
device. You can enroll both iPhones and
iPads and set up security profiles on them
ESET Endpoint Security for
that will allow you to adjust their security
Android settings, including Anti-Theft, settings for
Exchange, Wi-Fi, and VPN accounts,
ESET Endpoint Security for Android is Passcode, iCloud and others.
designed to protect corporate mobile
devices against the most recent malware Admins can also white/black-list apps and
threats and secure your data even if your enforce web filtering to block prohibited
device is lost or stolen. It also helps system content.
administrators keep their devices in
● Boost the security of your iOS
compliance with company security policies. devices: iPhones and iPads
● Anti-Theft – remotely wipe all the
ESET Endpoint Security for Android can be data stored on the device in case it
also applied in small-to-medium sized goes missing
● Remotely push settings to iOS
companies without the need of remote
devices, including setting for the
management via ESET PROTECT. IT Exchange, Wi-Fi, and VPN accounts
technician, system administrator or the ● Manage Passcode, iCloud, Privacy
actual user can simply share his ESET and Device settings and restrictions
● Fully manageable via ESET Remote
Endpoint Security for Android configuration
Administrator
with other colleagues. This process ● App white/blacklisting and web
completely diminishes the need for product content filtering
activation and manual setup of each product
module otherwise required right after the
installation of ESET Endpoint Security for
Android.
52
Solution Architecture
Cloud Console
Availability
Maintenance
53
ESET PROTECT (on-prem)
ESET PROTECT is an application that allows you to manage ESET products on client
workstations, servers and mobile devices in a networked environment from one central location.
With ESET PROTECT's built-in task management system, you can install ESET security
solutions on remote computers and quickly respond to new problems and detections.
ESET PROTECT Server is the executive application that processes all data received from
clients that connect to the Server (through the ESET Management Agent or HTTP Proxy).
Cached data is distributed to endpoint clients on your network. Caching can significantly
decrease internet traffic on your network.
54
Update Caching & Distribution
In order to improve efficiency of updates, the customers can deploy ESET Caching Proxy
server on-premise, which will download the latest update and distribute it to all the machines in
the network. This will save Internet bandwidth significantly.
Once an update is available, the head office server will download the update, cache it, and
distribute it among the endpoints in the local LAN.
If there are any branches, a caching server will be placed in each branch to download the
update from the Head Office Server, cache it, and distribute it throughout the branch.
55
ESET Micro Updates are very small update files of 250 to 500 kilobytes per week. If for any
reason you miss two consecutive updates, thus making a standard weekly update impossible,
you can still download a differential update after 4 weeks (comprising around 1 to 2 megabytes).
After that, you may resume downloading regular weekly updates as usual.
Once a week, ESET generates a special differential update, which contains all the essential
changes from the previous week. The latest format is compatible with all Version 3 and later
ESET products. The update process is then straightforward – simply unpack the contents of the
archive to a mirror directory and update all client computers from that mirror.
Network Load
Network Load (with used MB size, eg:MB/day)
Traffic in a single
Action type
connection interval
Client Task: Scan without cleaning 4 kB
15 minutes 1 MB
30 minutes 0.5 MB
1 hour 144 kB
1 day 12 kB
56
ESET Inspect
ESET Inspect collects data in real time on endpoint devices. The data is matched against a set
of rules to detect suspicious activities automatically. Then the aggregated data is processed,
and the information is prioritized and correlated in a searchable form. This aggregated data
enable a security professional to search for unusual and suspicious activities more efficiently
and enables an accurate incident response, management, and reporting.
57
Ports and Network Traffic
On-prem deployments
Source Destination Ports Direction
58
Head Office Server epns.eset.com 8883 inbound + outbound
59
Proposed Solution
60
Work Breakdown Structure (WBS)
61
About ESET
62
Why ESET?
63
64
65
Few of our 3rd party reviews
66
Some of our Top Awards
67
68