1 介绍 1 ...................................................................................................................................................................
1.1 ESET Endpoint 产品 1 ..................................................................................................................................
1.2 ESET Security Management Center 7 中的新功能 1 ................................................................................
2 ESMC 组件和体系结构 2 .............................................................................................................................
3 系统要求 3 .........................................................................................................................................................
3.1 硬件 3 .............................................................................................................................................................
3.2 操作系统 3 ......................................................................................................................................................
3.3 网络 4 .............................................................................................................................................................
3.4 软件 4 .............................................................................................................................................................
4 安装 5 ...................................................................................................................................................................
4.1 ESET Security Management Center 服务器的一体式安装 5 ......................................................................
4.2 安装后步骤 14 ................................................................................................................................................
5 ESMC 结构 15 ....................................................................................................................................................
6 部署 17 .................................................................................................................................................................
6.1 部署程序包创建 17 .........................................................................................................................................
6.2 部署程序包安装 20 .........................................................................................................................................
6.3 其他方法 22 ....................................................................................................................................................
6.4 部署工具 22 ....................................................................................................................................................
7 后续步骤 24 .......................................................................................................................................................
7.1 面板 24 ...........................................................................................................................................................
7.2 计算机和组 25 ................................................................................................................................................
7.3 威胁和隔离 26 ................................................................................................................................................
7.4 报告 27 ...........................................................................................................................................................
7.5 基本操作 28 ....................................................................................................................................................
7.5.1 任务 28 ....................................................................................................................................................
7.5.2 通知 29 ....................................................................................................................................................
7.5.3 策略 29 ....................................................................................................................................................
8 帮助和支持 29 ..................................................................................................................................................
9 最终用户许可协议 (EULA) 30 ...................................................................................................................
10 隐私政策 33 .....................................................................................................................................................