1 介绍 1 ...................................................................................................................................................................
1.1 ESET Endpoint 产品 1 ..................................................................................................................................
1.2 ESET Security Management Center 7.2 中的新功能 1 .............................................................................
2 ESMC 组件和体系结构 2 .............................................................................................................................
3 系统要求 3 .........................................................................................................................................................
3.1 硬件 3 .............................................................................................................................................................
3.2 操作系统 3 ......................................................................................................................................................
3.3 网络 5 .............................................................................................................................................................
3.4 软件 5 .............................................................................................................................................................
4 安装 5 ...................................................................................................................................................................
4.1 ESET Security Management Center 服务器的一体式安装 5 ......................................................................
4.2 安装后步骤 17 ................................................................................................................................................
5 ESMC 结构 18 ....................................................................................................................................................
6 部署 20 .................................................................................................................................................................
6.1 部署程序包创建 20 .........................................................................................................................................
6.2 部署程序包安装 21 .........................................................................................................................................
6.3 其他部署方法 23 .............................................................................................................................................
6.4 ESET Remote Deployment Tool 23 ...........................................................................................................
7 后续步骤 26 .......................................................................................................................................................
7.1 面板 26 ...........................................................................................................................................................
7.2 计算机和组 27 ................................................................................................................................................
7.3 检测和隔离 28 ................................................................................................................................................
7.4 报告 29 ...........................................................................................................................................................
7.5 任务、通知、策略 30 ......................................................................................................................................
8 帮助和支持 31 ..................................................................................................................................................
9 最终用户许可协议 (EULA) 32 ...................................................................................................................
10 隐私政策 35 .....................................................................................................................................................