1 介绍 1 ...................................................................................................................................................................
1.1 ESET Endpoint 产品 1 ..................................................................................................................................
1.2 ESET Security Management Center 7.1 中的新功能 1 .............................................................................
2 ESMC 组件和体系结构 2 .............................................................................................................................
3 系统要求 3 .........................................................................................................................................................
3.1 硬件 3 .............................................................................................................................................................
3.2 操作系统 4 ......................................................................................................................................................
3.3 网络 5 .............................................................................................................................................................
3.4 软件 5 .............................................................................................................................................................
4 安装 6 ...................................................................................................................................................................
4.1 ESET Security Management Center 服务器的一体式安装 6 ......................................................................
4.2 安装后步骤 17 ................................................................................................................................................
5 ESMC 结构 18 ....................................................................................................................................................
6 部署 20 .................................................................................................................................................................
6.1 部署程序包创建 20 .........................................................................................................................................
6.2 部署程序包安装 21 .........................................................................................................................................
6.3 其他部署方法 23 .............................................................................................................................................
6.4 ESET Remote Deployment Tool 23 ...........................................................................................................
7 后续步骤 25 .......................................................................................................................................................
7.1 面板 26 ...........................................................................................................................................................
7.2 计算机和组 26 ................................................................................................................................................
7.3 检测和隔离 28 ................................................................................................................................................
7.4 报告 29 ...........................................................................................................................................................
7.5 任务、通知、策略 29 ......................................................................................................................................
8 帮助和支持 30 ..................................................................................................................................................
9 最终用户许可协议 (EULA) 31 ...................................................................................................................
10 隐私政策 34 .....................................................................................................................................................