We're able to manage the computers with ESET Protect. There are different ways to connect the computers to the server, and the common way is to deploy the agent through the domain cloud, like Windows servers. That's how we've deployed the agent for all the computers. I work with our organization unit and know which computer belongs to which department. Once the computer is connected to the server, I create two folders, static and dynamic. The dynamic folders are under the static folders. The reason that we use the dynamic is to automate the test. For example, if a computer doesn't have an anti-virus in any dynamic folder, we can install an anti-virus automatically.
We can create a task under the dynamic folder, which helps with implementing all the processes, installing an anti-virus, installing an agent, updating the anti-virus, or updating the practice system. For example, if a computer is under attack, we also create isolate folders when we detect the ESET because one of those texts automatically moves the computer to that dynamic folder, which isolates the computer from the network. Then, from that moment, we check what is happening and the issue. For example, with something like Trajan, we check if the malicious object was blocked or what happened with the malicious object. Then we check the computer errors, and the malicious object is blocked if we don't find anything. So we create a report and then resolve the computer, and it automatically moves again to the folder.
Another use case is how we allow users to connect devices to the computer. With ESET Protect, you can restrict or allow devices. For example, we like to allow the users to connect live phones, VSP, CDs, and the content filter wireless. Every month we have to give a report to the customer informing them that we have received an attack, blocked these attacks and resolved it. That's the kind of report we provide to the customer at the end of the month. We also use ESET Protect for the MSP and the users' administration.
Depending on your organization, you can set different rules. For example, for the executives, we can block malicious or adult websites and leave the game and streaming websites. For the office or a salesperson, we can restrict more things. It's helped us with restrictions and knowing which users we can provide permissions to and which users we need to restrict.