ESET ENDPOINT SECURITY from San Diego-based ESET North America is just one part of the company’s suite of security offerings aimed at small businesses. The suite offers anti-virus, anti-spyware, a personal firewall, anti-spam, Web filtering, and device control.
ESET Endpoint Security downloads from the corporate ESET distribution site. Consumers tend to buy direct, and the new small business products will be sold through the channel. That means licenses for downloaded software, so be prepared to download the entire 73MB of Endpoint Security no matter how you buy it or try it.
In our case, we needed to provide the supplied username and password from our license before the download could begin. It makes sense that security software would have a smart and secure download process. There is a trial software download option too, of course.
Installation and First Scan
Once started, the installation process proceeds like most security software: Disable any existing security software and give approvals or not for terms and extra services. The install goes smoothly, adding an icon that looks disturbingly like a blue eyeball. Then we began the usual Windows 8.1 chore of locating the icon in the tile interface jungle and putting it where we could find it easily.
The first question after installation is about how public our network is and whether to allow sharing and discovery. Then we started a Quick Scan of local drives.
Taking just about an hour, but never more than 10 percent of total CPU time, the scan kept our disk busy as expected. It also found 13 problems to fix, quarantine, or delete (Figure 1). There may have been other repairs during the process, since the default is to clean up files as they are found. We had options to handle the Dirty Dozen plus one, but let the default settings clean or quarantine as needed.
Day to Day
The first screen up when opening the application (click on the icon or right-click on the small icon in the task bar) is the Protection status page. Like a dashboard, this shows an overview of how the various modules are going: computer, network, and Web and email. In our screen capture (Figure 2), all are checked as being at maximum protection. You can click the Maximum protection description to drill down into that particular area or you can do it through the Setup icon.
Checking Task Manager, we tracked CPU usage at between 0 and 1 percent, meaning not noticeable. RAM use bounced around from 120 to 125MB plus or minus a couple, depending on client activity.
Computer scan, the next button down the list on the left (Figure 3), allows you to force a smart scan (local disks) or a custom scan you can configure. Both show results from the previous scan. The Advanced scan setup lets you specify areas to scan or skip, and enables you to configure ESET's ThreatSense engine. Want to tag suspect files, attempt cleaning, or delete them upon discovery? Set that here, and more, such as enabling Advanced heuristics/DNA/Smart signatures. Yes, lots of detail. Scans occur on file opens, creation, and execution by default.
The Update icon on the left-side list forces an update of the virus signature database. This happens regularly by default, but this button will make the paranoids happy.