ESET PROTECT Business Solution POC Checklist Logo
  • Get the level of protection that's right for your business

    Protect your company endpoints, business data and users with ESET's multilayered technology. ESET PROTECT platform offers customizable security solutions, easy to manage from a cloud console. ESET PROTECT can also be installed on Windows, Linux or via Virtual Appliance. After installation, all management is done via a web-console, allowing easy access and management from any device or operating system.

  • Image-49
  • ESET Pre-deployment Requirement Checklist 

    Below is the list of all supported hardware, software, and OS platforms which are essential and recommended for ESET product deployment standards.

  • Required Network Accessibility

    PORTS TO ALLOW:

    • Port TCP 2222 – Communication between ESET Management Agent and ESET Protect Server
    • Port TCP 2223 – Communication between ESET Protect Web Console and ESET Protect Server; used for Assisted installation.
    • Port TCP 443/80 - Tomcat broadcasting the ESET Protect Web Console.
    • Port TCP 3128 - Communication with ESET Bridge
    • Port MQTT 8883 - ESET Push Notification Service - Wake-Up calls between ESET Protect Server and ESET Management Agent.
    • Port TCP 9980 - Mobile device enrollment.
    • Port TCP 9981 - Mobile device communication.
    • Port TCP 139 - Using the share ADMIN$
    • Port TCP 445 - Direct access to shared resources using TCP/IP during remote installation (an alternative to TCP 139)
    • Port UDP 137 - Name resolution during remote installations
    • Port UDP 138 - Browse during remote installation

    FOR REFERENCE:

    ESET PORTS AND ADDRESSES: CLICK HERE

    PORTS AND ADDRESSES REQUIRED TO USE YOUR ESET PRODUCT WITH A

    THIRD-PARTY FIREWALL ISSUE: CLICK HERE

  • Required Network Protocols and Services:

    • Network Protocol: TCP/IP protocol

    • Internet Access: Can be thru Local Network

    • Services enabled (for RA server): DNS, NetBIOS, RPC, Remote Registry, Domain Network Administrator Authentication

    • Services enabled for ESET: RPC & Remote Registry

    • Services enabled (for ESET clients using Windows 8.1): Remote Registry must be running

    • Services enabled (for ESET clients using Windows 8.1): User Access Control must be disabled

    • Services enabled (for ESET clients using Windows 8.1): Firewall must be disabled (for remote installation)

  • ESET PROTECT server requirements:

    End-user environment should meet the following prerequisites for the proper functioning of eset dynamic threat defense:

    ESET Dynamic Threat Defense (EDTD) License
    ESET Business Account (Active) synchronized with an ESET PROTECT Console
    One of supported ESET PROTECT remote management console
    Version 7.x or later of compatible ESET Security products installed
     
    Supported Products:
    Submitting files for analysis in ESET Dynamic Threat Defense is supported only from certain products. The list of submitted files is only available in the supported version of the management console.

     

    NOTE: ESET Dynamic Threat Defense functionality is the same for both ESET Endpoint Antivirus and ESET Endpoint Security. In this manual, we only refer to ESET Endpoint Security to make the text easier to understand. ESET Endpoint Antivirus users should follow the instructions for ESET Endpoint Security in this guide.

      

    NOTE: Operating systems not supported:
    ESET Dynamic Threat Defense is not supported on client machines with Windows XP and Windows Server 2003. These systems do not support TLS 1.2 which is necessary for the secure transfer of sample files.

  • NOTE: 

    • Virtualized environments and Windows Server OS are not supported by the EFDE Client application. 
    • Do not install EFDE Client application on the same workstation as your EFDE server database.
    • Do not install the EFDE Client application to a machine with the BIOS firmware. 
  • Supported Microsoft 365 plans
    ESET Cloud Office Security supports the following Microsoft 365, Exchange Online and OneDrive plans.

  • ESET Enterprise Inspector

    Hardware requirements depend on the number of events. The events from EEI side of view are for example File system events (read file, write file, etc.), TCP events, Registry events, HTTP events, DNS events, etc.

    For more information on ESET Enterprise Inspector system requirements, click here.


    IMPORTANT: A separate meeting with our pre-sales team is necessary to proceed with the ESET PROTECT Enterprise product POC.

  • Deployment Plan and Procedures

  • STEP 1: 
    Ensure physical data back-up of the following:

    1. Machine which will host the application and database server. (single machine is acceptable for small scale deployment)
    2. Machine where ESET Protect Server will be installed. It should not have an existing database since all-in-one installer includes its own database server. It should be updated to its latest OS patches.
    3. Test clients (optional). 

    STEP 2: 

    1. Pilot Testing (Customer to provide test machine)
    2. Installation of ESET Protect version 8.0.17.1. Application and Database server single machine is acceptable for small scale deployment)
    3. Create recommended policies. (Antiransomware, Update, Firewall, Device and Web Control)
    4. Create all-in-one installer for endpoints and servers.

    STEP 3: 

    1. (UAT) user acceptance sign-off and review milestone of the test environment.

     

    MANDAYS:  Maximum of 3-6 hours set-up and configuation.

     

    Note: Described resolution time may vary on different factors that may affect to help technical support on resolving the issues. (E.g. Internet speed, client availability, client resources, and other unrelated inquiries)

  • ESET POC Request Form

  •  -
  • Hardware Machine Specification

  • Schedule of Proof-of-Concept (POC)

  •  - -
     :
  • Schedule of POC Results Presentation

  •  - -
     :
  • By clicking the "Submit" button, you hereby acknowledge and confirm that all information are correct and all requirements described within this form are met by your existing IT infrastructure and available for provision from your end. Please note that after filling out this checklist, you will receive a call from one of our Technical Engineer for further validation to provide a smooth POC deployment.

     

    For further questions and clarifications, please let us know by contacting us through:

    IT Help Desk Line: 657 2257 loc 352 | 925 2177
    Email: support@b1g2.io

     

    Please click submit button below to agree.

  • ESET End-of-Life Policy

    Does ESET EOL apply to you?

    At this stage of the product lifecycle, End-of-Life, we offer zero support or assistance and do not guarantee the product’s functionality at all. The best we can do is guide you to the most appropriate migration path so that you can upgrade to the latest equivalent product. Find out if you face an EOL issue.

  • Should be Empty: