1 介绍 1 ...................................................................................................................................................................
1.1 ESET Endpoint 产品 1 ..................................................................................................................................
1.2 ESET PROTECT 8.0 中的新功能 1 .................................................................................................................
2 ESET PROTECT 组件和体系结构 2 .........................................................................................................
3 系统要求 2 .........................................................................................................................................................
3.1 硬件 2 .............................................................................................................................................................
3.2 操作系统 3 ......................................................................................................................................................
3.3 网络 4 .............................................................................................................................................................
3.4 软件 5 .............................................................................................................................................................
4 安装 5 ...................................................................................................................................................................
4.1 ESET PROTECT 服务器的一体式安装 5 .........................................................................................................
4.2 安装后步骤 17 ................................................................................................................................................
5 ESET PROTECT 结构 18 ...............................................................................................................................
6 部署 20 .................................................................................................................................................................
6.1 部署程序包创建 20 .........................................................................................................................................
6.2 部署程序包安装 21 .........................................................................................................................................
6.3 其他部署方法 23 .............................................................................................................................................
6.4 ESET Remote Deployment Tool 23 ...........................................................................................................
7 后续步骤 26 .......................................................................................................................................................
7.1 面板 26 ...........................................................................................................................................................
7.2 计算机和组 27 ................................................................................................................................................
7.3 检测和隔离 28 ................................................................................................................................................
7.4 报告 29 ...........................................................................................................................................................
7.5 任务、通知、策略 30 ......................................................................................................................................
8 帮助和支持 31 ..................................................................................................................................................
9 最终用户许可协议 32 ...................................................................................................................................
10 隐私政策 35 .....................................................................................................................................................