Emsisoft Management Console https://www.emsisoft.com/en/help/category/user-guides/emsisoft-management-console/ Wed, 31 Jan 2024 13:22:56 +0000 en-US hourly 1 https://www.emsisoft.com/en/help/wp-content/uploads/2023/12/cropped-icon_eam-32x32.png Emsisoft Management Console https://www.emsisoft.com/en/help/category/user-guides/emsisoft-management-console/ 32 32 How can I block a website or exclude it from being blocked? https://www.emsisoft.com/en/help/5936/how-can-i-block-or-exclude-websites/ Tue, 09 Jan 2024 13:17:37 +0000 https://help.emsisoft.com/?p=5936 How can I block a website or exclude it from being blocked? Overview: There are times you want to block certain web sites for devices that are either your own […]

The post How can I block a website or exclude it from being blocked? appeared first on Emsisoft Help.

]]>
How can I block a website or exclude it from being blocked?

Overview:
There are times you want to block certain web sites for devices that are either your own or that you are managing.
Emsisoft Web Protection is part of the full Emsisoft program and also has the option to filter for contents and to create more custom rules compared to the Browser Security extension.

How to add a new host rule:
Open Protection Policies in your Workspace, choose the desired Policy Group (We suggest to make generic changes on the Group Level) and scroll to: Custom Host Rules under: Content Filtering

Open it and click on: Add

Then you can specify if you want to use a simple text based matching on the host name/IP, or a more complex Regular Expression based matching pattern. See: What is RegEx?

How to change custom host rules:
Double-click a rule or select a rule and click: Edit to open the edit window. Host rules feature the following actions:

  • Don’t block: Allows access to the host without asking.
  • Alert: Alerts about access, and lets you decide whether to block or to allow it.
  • Block and notify: Blocks the connection automatically and displays a notification pop-up window to let you know about it.
  • Block silently: Blocks the connection but does not show any notification.

We recommend using the default setting “Block and notify” so that you will know immediately when a connection has been blocked. This may keep you from wondering why a certain website has not loaded.

How to import a third party hosts file
The hosts file is part of Windows and is located in c:\windows\system32\drivers\
It is used for overriding DNS settings by redirecting certain domains to certain IP addresses in a targeted manner. Various hosts file lists are available to download online and this has been a popular method used by people to build their own form of “web protection” with tools that come with Windows.
Malicious domains are then redirected to the local IP 127.0.0.1 or the invalid endpoint 0.0.0.0, which both neutralize them.

There are some disadvantages to this approach, though. You never know when a connection has been redirected, and a large hosts file can slow down your system’s performance. There are also no automatic updates, so you have to keep your hosts file list up-to-date yourself.

If you wish to use third-party hosts file lists, we recommend you import them directly into the local Emsisoft Anti-Malware program instead, by using the “Import hosts file” option which allows you to import individual entries as well as larger lists in one go.

Open the local Emsisoft program and click on: Web Protection

Then open: Import hosts file

Click on the 3 dots:

And search and select the location and the hosts file you want to import:

Unlike using a custom Windows host file, importing a third-party list into Emsisoft Anti-Malware’s Web Protection, will not slow down your system. Use of third-party lists is purely optional – most entries are already on the built-in list that is frequently updated.

The post How can I block a website or exclude it from being blocked? appeared first on Emsisoft Help.

]]>
How can I track changes that were made to Protection Policies? https://www.emsisoft.com/en/help/5766/how-can-i-track-the-changes-that-were-done-to-the-protection-policies/ Tue, 19 Dec 2023 11:59:12 +0000 https://help.emsisoft.com/?p=5766 How can I track the changes that were done to the Protection Policies? Overview: An Admin needs to be able to track the changes that were done to a Policy […]

The post How can I track changes that were made to Protection Policies? appeared first on Emsisoft Help.

]]>
How can I track the changes that were done to the Protection Policies?

Overview:
An Admin needs to be able to track the changes that were done to a Policy Group and also on a device, especially if the client PC has permissions to make changes locally.

How to identify changes:
In the Workspace, you might have noticed the: Edits counter, per device. This counter indicates the number of changes related to the parent policy and ideally should be zero.

Note that settings should always be managed either at the root level or the group level, and not on a device level. If you make a setting change on the lowest level (which is device level), it breaks the inheritance from parent group(s).

Setting changes on the device level (on the local machine itself or in the Workspace) overrule Protection Policy settings, which are displayed as a blue circular arrow icon in the Protection Policies.
If you later make a change in the parent policy or root policy, this change will not be inherited by the device, unless you click the revert to parent policy (blue circular arrow) button.

When you click that revert arrow, it will reset the device polices to the parent group.

 

The post How can I track changes that were made to Protection Policies? appeared first on Emsisoft Help.

]]>
Application Inventory Feature  https://www.emsisoft.com/en/help/5189/application-inventory-feature/ Tue, 03 Oct 2023 07:14:11 +0000 https://help.emsisoft.com/?p=5189 Overview The Application Inventory feature, introduced with our update version 2023.10.0.12132, allows users to view a list of applications installed on their device directly from the Emsisoft Management Console. This feature […]

The post Application Inventory Feature  appeared first on Emsisoft Help.

]]>
Overview

The Application Inventory feature, introduced with our update version 2023.10.0.12132, allows users to view a list of applications installed on their device directly from the Emsisoft Management Console. This feature not only provides visibility to a comprehensive list of installed applications, but also offers the capability to uninstall remotely those apps from the machine.

Requirements

  • An active Emsisoft Enterprise Security license.
  • Administrator access to the Emsisoft Management Console.

Feature Description

Installed Applications

The Application Inventory displays a list of all applications on the device, mirroring the list found in the Windows ‘Apps and Features’ dialog. This list of applications is presented in a sortable and searchable grid. You can access it by logging into MyEmsisoft, selecting your workspace, and then clicking on a specific device. Scrolling towards the bottom of the page, the interface will display the following columns:

  • Application: The name defined to the application, defined by the publisher.
  • Publisher: Represents the Publisher responsible for the application.
  • Version: Represents the current version of the application.
  • Size: Represents the estimated size. The value is rounded to full KB, MB, or GB.
  • Install Date: Represents the date of installation.
  • Uninstall: This column features an uninstall button depicting a trashcan. Upon clicking, a dialog box will appear asking, ‘Are you sure to uninstall?’. This button is only visible for applications that can be uninstalled. Activating this button triggers an uninstall action on the desktop side.

Expected behavior.

While the Application Inventory feature is robust, users should be aware of certain behaviors that may appear during the use of this feature:

  • Some applications, despite claiming to support silent uninstallation, may display dialogs or prompts during the uninstallation process. This behavior can prevent the uninstallation from running in a service environment, resulting in errors.
  • If the uninstallation process contains a user interface, it might be visible and could appear unexpectedly to the user.
  • The uninstallation process will work if one user is logged in on that device. For PCs that remain on the lock/login screen, this feature will not work properly.
  • In scenarios with multiple logged-in users (including on Terminal servers), it could be problematic for the system to determine in which session the uninstaller should run. We recommend to have just one user logged in on that device.

Support

If you encounter any issues or have questions regarding the Application Inventory feature, please contact our support team for assistance, here.

The post Application Inventory Feature  appeared first on Emsisoft Help.

]]>
Emsisoft Rollback Feature https://www.emsisoft.com/en/help/5128/emsisoft-rollback-feature/ Fri, 01 Sep 2023 07:49:01 +0000 https://help.emsisoft.com/?p=5128 Overview The Rollback feature in Emsisoft Enterprise Security constitutes a robust functionality designed to safeguard the security and data integrity of your systems. It provides a dependable mechanism for reverting […]

The post Emsisoft Rollback Feature appeared first on Emsisoft Help.

]]>
Overview

The Rollback feature in Emsisoft Enterprise Security constitutes a robust functionality designed to safeguard the security and data integrity of your systems. It provides a dependable mechanism for reverting damage to previous states, thus mitigating potential damage from malicious activities such as from ransomware.
In simpler words, if a malware ever modifies a file, you can revert that file to one of its previous, unaffected versions.

How to enable the Rollback feature

Activating the Rollback feature is an effortless task within the Emsisoft Management Console in my.emsisoft.com. Just turn ON the EDR and Rollback at “Protection Policy”. Upon activation, the functionality empowers users to effortlessly restore files to their prior states.

Backup

The heart of the Rollback feature revolves around the Emsisoft-Backup folder. This repository serves as a secure vault for housing backup copies of your files. Whenever an incident is identified, the Emsisoft Protection captures this event and generates a backup copy of the affected file. It is important to note that only modifications from untrusted processes are backed up for their reversal. 

Rollback Disk Quota

The optimal functioning of the Rollback feature hinges on effective disk quota management. Rollback disk quota defines the maximum disk space allocated for housing backup copies, ensuring that these copies do not consume your system’s storage unnecessarily. You can allocate between 5% and 50% of your disk space and it is set at 30% by default.

Retention Time

A crucial user-defined parameter, retention time dictates the duration for which backup files remain stored in the Emsisoft-Backup folder. Upon exceeding the specified retention period, backup files that outlast this timeframe are automatically deleted. This feature serves to maintain a streamlined and uncluttered backup repository. You can choose between 12 and 72 hours of retention time and it is set to 48 hours by default.

Incident Trigger and Remediation

When an incident is generated and a backup file corresponding to this incident is present (not removed by disk quota or retention time constraints), the rollback option becomes available.

Upon selecting “Remediate Threat” in the incident section, a retention menu emerges, allowing users to specify which files should be restored, akin to retrieving data from a backup. This process is then initiated, with its subsequent status accessible in the Remediation History.

Requirements

The Rollback feature in Emsisoft Protection is a powerful tool for safeguarding your system’s integrity, it’s important to be aware of the technical requirements that influence its operation. Here a summary of what you have to take in consideration:

Backup File Location and Drive Association

If a program initiates changes on a specific drive, such as altering files on Local Disk “D:” while being located on Local Disk “C:”, the generated backup will be stored in the Emsisoft-Backup folder on the drive from which the program originated – in this case, Local Disk “C:”. This mechanism ensures that the backup file’s location aligns with the drive containing the program responsible for the process.

Minimum Disk Space Requirement

To accommodate the storage of backup files, a minimum of 6GB of free space on the relevant drive is required. This ensures that ample space is available for retaining backup copies without impinging on system performance or operation.
The backups will not be created if the available space in the disk is less than the minimum required, no matter what disk allocation you have set.

Supported Drive Format and external Drives

The Rollback functionality is streamlined to the internal structure of your system, ensuring optimal reliability and performance. It is designed to operate within the confines of your system’s internal NFTS drives and is not supported on external drives. This includes external storage devices such as flash drives.

Frequently Asked Questions (FAQs)

  1. How should I balance the parameters available regarding disk allocation? By default, the Rollback feature is set to 30% of the disk space and a time retention of 48 hours, which is ideal for the majority of users. We recommend adjusting these parameters only if you’re an advanced user with specific scenarios requiring extended retention time or larger disk quotas for storing backups.
  2. Is there specific malware for which rollback would kick in? Rollback is designed to address a broad spectrum of malware attacks causing system changes. It activates based on threat behaviors, not specific malware types.
  3. Is there a limit to the number of rollback backups that can be stored on a drive? There’s no fixed limit. The number of stored backups is determined by disk quota settings and available space.
  4. Can the Rollback feature revert changes made to system settings and configurations? Yes, Rollback can revert various changes in system settings and configurations caused by malware attacks.
  5. Is it possible to manually trigger a rollback for a specific incident? Yes, incident-specific rollback can be initiated via the “Remediate Threat” process for each mapped incident. The creation of backups instead is automatic and cannot be manually executed for specific files, folders, or processes.
  6. Can rollback backups be accessed or restored individually? Rollback restores all changes associated with a specific incident, rather than offering individual file restoration.
  7. Does the Rollback feature affects the system’s boot-up time or the computer’s overall performance? The Rollback feature doesn’t significantly impact the system’s boot-up time or overall performance.
  8. What happens if the disk quota is filled up due to excessive backup files? When the disk quota is exceeded, older backups are automatically deleted to create space for new ones.
  9. Can I exclude specific files or folders from being backed up by the Rollback feature The Rollback feature is designed to capture system-wide changes. For this reason there are no file or folder exclusions.
  10. How does the Rollback feature interact with different types of file encryption and compression methods? Rollback focuses on reversing changes, regardless of the encryption or compression methods employed.

The post Emsisoft Rollback Feature appeared first on Emsisoft Help.

]]>
How to install Emsisoft Management Console on your mobile device https://www.emsisoft.com/en/help/4444/how-to-install-emsisoft-management-console-on-your-mobile-device/ Wed, 15 Feb 2023 10:12:34 +0000 https://help.emsisoft.com/?p=4444 Your Emsisoft Management Console can be pinned to the home screen of your computer or mobile device by installing it as a Progressive Web Application (PWA), with support for Windows, […]

The post How to install Emsisoft Management Console on your mobile device appeared first on Emsisoft Help.

]]>
Your Emsisoft Management Console can be pinned to the home screen of your computer or mobile device by installing it as a Progressive Web Application (PWA), with support for Windows, macOS, iOS and Android. A PWA is simply a web site that can be downloaded to your device making it appear alongside your other apps for convenient access.

Installing a PWA on Android.
You can install the Emsisoft Management Console as a PWA on Android devices using the default Chrome browser. First, navigate to my.emsisoft.com in Chrome. Press the “three dot” icon in the upper right to open the menu. Select “Add to Home screen.” Press “Install app” (or “Add to Home screen”) in the drop down menu. The Management Console is now installed as a PWA and available on your home screen.

Installing a PWA on iOS.
The Emsisoft Management Console can only be installed on iOS using Apple’s Safari web browser. First, navigate to my.emsisoft.com in Safari. Then press the “Share” icon at the bottom of the screen:

Next, select “Add to Home Screen” from the popup. Lastly, tap “Add” in the top right corner to finish installing the PWA. It will now be on your home screen.

Installing a PWA on a Windows PC or Mac.
Google Chrome and Microsoft Edge currently have the best support for PWAs on Windows and Mac OS. The installation process is very similar for both browsers. First, navigate to my.emsisoft.com. There will be a PWA icon on the right side of the URL bar. Click the icon then click the “Install” button:

A second installation method is available from the menu of the browser:

On a Windows PC, the PWA will be available in the start menu. On a Mac, the PWA will be in the launcher and in the spotlight search.

The post How to install Emsisoft Management Console on your mobile device appeared first on Emsisoft Help.

]]>
“Local and Remote”, “Remote only”, or “Local only”. Which one should I choose? https://www.emsisoft.com/en/help/3987/local-and-remote-remote-only-or-local-only-which-one-should-i-choose/ Tue, 30 Aug 2022 10:05:03 +0000 https://help.emsisoft.com/?p=3987 In your workspace settings you may have noticed three options: “Local and Remote”, “Remote only”, or “Local only”. The mode you choose one of these options can have a big […]

The post “Local and Remote”, “Remote only”, or “Local only”. Which one should I choose? appeared first on Emsisoft Help.

]]>
In your workspace settings you may have noticed three options: “Local and Remote”, “Remote only”, or “Local only”.

The mode you choose one of these options can have a big impact on how the protection software on your devices functions, as well as how your software is managed through the Management Console.

Workspace Management Settings

Local and remote:

This is the default option. With this management mode you can modify your security settings both locally from your local software and through the Management Console in my.emsisoft.com . If you change a setting on the local device, you’ll also see it change in the Management Console after a couple of seconds, and vice versa.

Remote only:

By choosing this option you will be able to manage your protection only from your management console. This is the preferred option when you do not want the local users to intervene on the protection.
The user interface on your protected devices is reduced to the bare minimum, and some of the Workspace menu items and settings have been hidden due to the Remote Only mode. Users can see the current protection status on their devices, although all of the protection settings are managed exclusively in the Emsisoft Management Console.

Local only

Local only:

Your devices will no longer be manageable through the workspace. The devices will still connect to the Emsisoft servers to receive detection updates and licenses, but no settings or log data are transferred to the Management Console. Security settings can only be changed on the local device, which means you can’t define any policies, handle malware infections or view incidents and reports in the Console.

Please be cautious with this setting – once you’ve enabled ‘Local only’ mode, all of your stored workspace data is deleted for privacy reasons. And once it’s deleted, it can’t be restored.

To summarize, home users and small-business users should stick to the default ‘Local and remote’ management mode. If you have a bigger organization with dedicated cybersecurity admins, ‘Remote only’ mode may be your best option.

The post “Local and Remote”, “Remote only”, or “Local only”. Which one should I choose? appeared first on Emsisoft Help.

]]>
Device showing as Not Managed or Offline in the Workspace https://www.emsisoft.com/en/help/3967/device-showing-as-not-managed-or-offline-in-the-workspace/ Tue, 30 Aug 2022 08:50:27 +0000 https://help.emsisoft.com/?p=3967 A device showing as “Not managed” or “Offline” indicates that either the machine is not connected to a Workspace or there is Firewall issue. This does not affect your protection […]

The post Device showing as Not Managed or Offline in the Workspace appeared first on Emsisoft Help.

]]>
A device showing as “Not managed” or “Offline” indicates that either the machine is not connected to a Workspace or there is Firewall issue.
This does not affect your protection but only the ability to communicate with your Workspace.

First, make sure to check that no countries are excluded from the geolocation list in the Firewall and add http://cloudbroker.emsisoft.com/, TCP port 61614 out.

Here you have a guide for your firewall configuration: https://www.emsisoft.com/en/help/2738/firewall-configuration-guide/

If the steps above have no effect on your devices status, please do the following:

Download and run the Workspace installer to connect the unmanaged device to the Workspace by clicking on the “Download and install protection” button from the Workspace panel overview.

Open Emsisoft Anti-Malware application, and click the ‘update’ link in the lower right to update and synchronize with your subscription.

 

You may also find that within the workspace, one or more of your device(s) isn’t visible in the list of all devices. Typically, this is being caused by a view filter. You can reset it as follows:

Resetting this view filter will display all devices linked to this workspace irrespective of their status.

The post Device showing as Not Managed or Offline in the Workspace appeared first on Emsisoft Help.

]]>
User and partner role permissions https://www.emsisoft.com/en/help/3594/user-and-partner-role-permissions/ Mon, 17 May 2021 21:29:58 +0000 https://help.emsisoft.com/?p=3594 Workspace level roles In general: Roles within workspaces can only be assigned to Emsisoft user accounts or Emsisoft Partner accounts. Available roles within workspaces are: Primary Workspace Owner Is the […]

The post User and partner role permissions appeared first on Emsisoft Help.

]]>
Workspace level roles

In general: Roles within workspaces can only be assigned to Emsisoft user accounts or Emsisoft Partner accounts.

Available roles within workspaces are:

Primary Workspace Owner

Is the legal owner of the workspace and responsible for all activities within a workspace. Has full access to everything and can re-assign ownership to another user.

Typical use case: The person that bought the software directly at Emsisoft.

Workspace Admin

Has full access to the workspace and can view/edit all devices, policies, incidents, logs, reports, users and the license of your workspace. Workspace Admins can change all user permissions except those of the Primary Workspace Owner.

Typical use case: An organization has multiple full-access administrators to share management tasks of the workspace.

Protection Manager

Can view/edit all protection relevant settings, such as devices, policies, alerts, logs, reports, but can’t change the workspace settings such as user roles and licensing.

Typical use case: A trusted third party who has more experience with security software manages the protection for the workspace, i.e. an IT professional or the ‘computer geek’ in the family.

Billing Contact

Special case: This role can not be manually assigned like the other roles. It is implicitly defined through the assignment of a license to an Emsisoft partner account. It is only displayed for workspaces that use partner-assigned licenses.

Billing contact is responsible for license payments at Emsisoft. Can view/edit license information, but doesn’t have access to devices or other protection related workspace settings.

The billing contact receives license renewal reminders from us.

Typical use case: A managed service provider (MSP) or reseller who sells the malware protection in a bundle with other services, i.e. general computer maintenance services.

User access

Feature Primary Workspace Owner Workspace Admin Protection Manager
Workspaces list
Yes
Yes
Yes
WS Dashboard
Yes
Yes
Yes
WS Incidents
Yes
Yes
Yes
WS Policies
Yes
Yes
Yes
WS Reports/Logs
Yes
Yes
Yes
WS Settings: General
Yes
Yes
Read-only
WS Settings: Licensing
Yes
Yes
Read-only
WS Settings: Users
Yes
Yes (except change of owner) Read-only

Partner account level roles

Partner accounts are virtual entities that have the same functionality as user accounts, but can contain multiple users. E.g. a partner company can have one or more employees that will be granted access to all workspaces where the partner account has a role assigned.

Available roles within partner accounts are:

Primary Partner Account Owner

Is the legal owner of the Emsisoft Partner account and is responsible for all activities within a partner account. Has full access to everything within the partner account (billing, licenses, settings, users) and can re-assign ownership to another user.

Typical use case: The owner of the partner company.

Protection Admin

Can:

  • Edit policy- and report templates.
  • Edit protection settings of managed workspaces.
  • Deal with malware incidents.

Can’t:

  • Buy or manage licenses.
  • Edit license settings in managed workspaces.
  • Edit partner account settings or users.

Typical use case: A tech employee of a partner company who’s job is to set up new workspaces and monitor the security of managed workspaces. Shouldn’t need to see any billing related information.

License Manager

Can:

  • Buy and manage licenses.
  • Edit license settings in managed workspaces.

Can’t:

  • Edit policy- and report templates.
  • View and edit protection settings of managed workspaces.
  • Deal with malware incidents.
  • Edit partner account settings or users.

Typical use case: A sales employee of a partner company who’s job is to sell licenses (new and renewals). Shouldn’t see any protection/technical related information of customer workspaces.

Partner access

Feature Primary Partner Account Owner Protection Admin License Manager
Partner: Buy a License
Yes
No
Yes
Partner: Manage Licenses
Yes
No
Yes
Partner: Order History
Yes
No
Yes
Partner: Sales Assets
Yes
No
Yes
Partner: Policy Templates
Yes
Yes
No
Partner: Report Templates
Yes
Yes
No
Partner: Settings
Yes
Yes
Yes (read-only)
Workspaces list
Yes
Yes
Yes (license information only) 1
Create new workspace Yes Yes Yes
WS Dashboard: if partner is owner/admin/manager Yes Yes No (redirects to WS settings) 1
WS Incidents: if partner is owner/admin/manager Yes Yes No
WS Policies: if partner is owner/admin/manager Yes Yes No
WS Reports/Logs: if partner is owner/admin/manager Yes Yes No
WS Settings: if partner is owner/admin/manager Yes Yes (license section read-only) Yes (edit license only, everything but the WS name hidden) 1
WS Dashboard: if partner is billing only Yes (license information only) 1 No Yes (license information only) 1
WS Policies, Incidents, Reports, Logs: if partner is billing only Yes No No
WS Settings: if partner is billing only Yes (edit license only, everything but the WS name hidden) 1 No Yes (edit license only, everything but the WS name hidden) 1

Remarks

(1): If the partner account only has the billing contact role but not technical roles on a workspace:

  • All non-license/billing related information is hidden from the workspace list.
  • Any columns that can’t be accessed are left blank and filter/search features don’t apply.
  • Any alerts, issues, quarantine or other information is not included in KPI tiles, charts or alert lists.
  • A click on such a workspace’s name doesn’t open the workspace dashboard but its Settings panel instead. The settings panel only shows the workspace name and the License section but nothing else.
  • All sub-menu items of the workspace (policies, reports, logs, etc.) are hidden.

The post User and partner role permissions appeared first on Emsisoft Help.

]]>
Working with reports https://www.emsisoft.com/en/help/3380/working-with-reports/ Tue, 01 Dec 2020 17:49:20 +0000 https://help.emsisoft.com/?p=3380 This document describes how to use the Emsisoft Management Console’s ‘Reports’ feature to view customizable real-time analytics and set up scheduled reports.  Preliminary information  Permissions settings  The level of control a […]

The post Working with reports appeared first on Emsisoft Help.

]]>
This document describes how to use the Emsisoft Management Console’s ‘Reports’ feature to view customizable real-time analytics and set up scheduled reports. 

Preliminary information 

Permissions settings 

The level of control a user has over reports and report templates is determined by their role in the workspace. 

  • Protection Manager: Can view, create, edit, clone and delete reports. Cannot delete snapshots. 
  • Owner/Workspace Admin: Can do everything. 
  • Partners: Can’t do anything with reports unless they also have an active role in the workspace. Can create report templates at any time. 
  • Invited users: Can only view the report that they were invited for, and change the displayed period for that report. Can’t edit or see other reports. Can’t see any UI components of the workspace/MyEmsisoft unless they also have a role in that workspace. 

Sharing settings 

Reports and snapshot reports can be configured to be accessible for third parties. In sharing settings, the following access options are available: 

  • All users of this workspace: Default option. Provides a static link to the report that users can copy and share, but only users who have a role in the current workspace can access the report after logging in. Includes users who are part of the partner account that manages the workspace in owner/admin or manager role (billing role is not enough). Users are also able to access the report via the Reports menu item in the workspace. 
  • Specific users: Provides a static link to the report that users can copy and share, but only users who have a role in the current workspace AND are selected in a user list can access the report after logging in. Partner accounts (even if they only have a billing role) can be added to that list too. 
  • Anyone with the link: Provides a static link to the report that users can copy and share with anyone. No Emsisoft user account is required. When viewing a report without being logged in, none of the MyEmsisoft UI elements are visible. Users can still print the report. Note: we advise against using this option as a link accidentally shared with the wrong person could result in the leak of internal protection data.

Reports: Overview 

Reports are available within workspaces. A report is a configuration of settings for reporting based on actual live data in the system. Live reports can go as far back as data is available, which is dependent on the data retention time of the licensed product edition, as follows: 

  • Emsisoft Anti-Malware Home: 3 months. 
  • Emsisoft Business Security: 6 months. 
  • Emsisoft Enterprise Security: 12 months. 

Reports section 

The Reports section shows all active reports in the workspace. Clicking a report opens the live report. 

Report tiles 

Each report tile provides information about the report, including: 

  • Name: User-defined name of the report.  
  • Sections: List of content sections that are part of the report.  
  • Scheduler: Simple scheduler summary. Invisible if no schedule is set. 
  • Recipients: Recipient summary. Invisible if no schedule is set. 
  • Template: The report template if the report is based on a partner template. Invisible if the report is not based on a partner template. 

 Each report tile also includes the following links: 

  • Edit: Opens the report in edit mode. 
  • Clone: Creates a copy of all report settings and opens that new report in edit mode. It adds a running number to the report name. 
  • Delete: Opens a popup where the user must confirm final deletion of the report. 

Adding reports 

To add a new report, click the grey ‘Create new report’ tile on the right, labelled with a large ‘+’. A popup with a list of available predefined reports will open. Partners can additionally select from their list of saved report templates. 

Snapshots section 

Note: A snapshot is the saved state of a report at a specific point in time. Snapshots are generated either manually by a user or through a scheduled task in certain intervals and are not based on live data but on a static copy of data. When viewing Snapshots, the report period can’t be changed by the user. Snapshots remain available for a long time, independently of the data retention time. 

The snapshots section lists all rendered reports that were either created manually by users via the ‘Save snapshot’ feature in the actual report panel, or by the scheduler. 

The hamburger menu in each report includes the following options: 

  • Share: Opens a popup where you can access sharing settings. 
  • Delete: Opens a popup where you must confirm final deletion of the report snapshot. 

Viewing reports 

Header bar 

The header bar provides quick access to information and functionality, including: 

  • Report name: The user-defined name of the report. 
  • Edit report: Click to enter edit mode. Invisible for snapshot reports and in view-only mode. 
  • Scheduled: Indicates that the report is configured to create snapshots at fixed intervals.  Displays the scheduler details on hover. Invisible for snapshot reports and if there is no schedule. 
  • Template based: Indicates that the report is based on a partner template. Displays the partner template path on hover. Invisible if it’s not based on a partner template. 
  • Period selection: Dropdown box that allows users to change the start and end dates of a report, with shortcuts for: Last 24h, Last 7 days, Last 30 days, Last 180 days, Last 365 days. Dropdown box is replaced with a static label for snapshot reports and in view-only mode. 
  • Hamburger menu: Invisible for snapshot reports and in view-only mode. Menu options for: 
    • Print: Opens the browser’s print dialog. 
    • Share: Opens a popup where you can access sharing settings. 
    • Clone: Creates a copy of all report settings and opens the cloned report in edit mode. 
    • Save snapshot: Exports the current state of the report as dataset that shows up in the reports snapshots list. 
    • X: Closes the report and returns to the reports overview. Invisible in view-only mode.

Report view

Renders all content sections of the report in a professional format. If you have access to the workspace, certain elements of the report data are clickable links that lead to details of that data. For example, device names are shortcuts to device dashboards, policy names are shortcuts to the policy editor, etc.

Editing reports 

Header bar 

In edit mode, the header bar extends to a much larger panel that includes the main configuration elements for reports, including: 

Report settings 

  • Name: Text box to enter a name for the report. The name must be unique within the workspace, with a maximum length of 50 characters. 
  • Template (Emsisoft partners only): Dropdown that lists all report templates of the partner account if you are a member of one or more partner accounts. If a partner template is selected, the report content is all read-only and no custom modifications that overwrite the template are possible. Replaced with a static label if you are not part of a partner account.

Sharing 

  • Access: Opens a popup where you can access sharing settings. 
  • Link: Read-only text box that allows you to select and copy the complete URL. The ‘copy’ link copies the link to your clipboard. 

Scheduler 

  • When: Dropdown box with options: End of week (Sat), End of week (Sun), End of month (default), End of year. 
  • Timezone: Dropdown box with time zone selector to make sure the included report period matches your actual time periods. 
  • How: Dropdown box with options: Email, Webhook. 
    • If ‘Email’ is selected: Recipients: Textbox to enter a comma separated list of email addresses where the report link is sent to. 
    • If ‘Webhook’ is selected: URL: Textbox to enter the webhook URL where the report link and a full json data blob is sent to.

Done editing 

Exits edit mode and switches to regular report view.  

Content sections with specific settings 

While most content sections don’t require any additional settings, some add extra functionality for customization. 

Summary section 

Provides a high level overview of what was happening in the workspace during the selected period of time. Including license information, seat usage, issues, protection statistics, etc. This section is always visible and can’t be removed.

  • Custom logoYou can add your own company logo at the left top of the section. The ‘Upload logo’ button opens a popup to upload an image file. Image dimensions need to be 200x100px and in a file format that can be processed (png, jpg, gif). 
  • Custom report title: The edit icon next to the centered report title opens a popup where you can change the title of the report. 

Protection section 

Displays all protected devices. 

  • Custom columnsYou can change the displayed columns of the devices list. Custom sorting and filters can be set as well. (coming soon!)

Infections section 

A chart that shows all infection events on all devices in the selected period. 

  • Custom chartsYou can change the chart type from Bar chart to Line chart. 

Infection details section 

Lists all infections events of all devices in historical order. Includes threat details. 

Quarantine section 

Lists all objects that were in quarantine on any devices in the workspace at any time within the selected period. 

Issues section 

A timeline of all issues that were detected on any device in the workspace at any time within the selected period. Includes details on how they were resolved. 

Policies section 

Two hierarchical lists of all protection and permission policies in the workspace. Includes the number of edits in each policy and the number of devices/users in that policy group. 

Deployments section 

A timeline of all deployment actions on any device in the workspace at any time within the selected period. Includes pending deployments and removed devices. 

Audit log section 

Displays the complete audit log of the workspace of the selected period. 

Free text section 

A simple section headline and label that you can fill with any text you want, e.g. explanations or disclaimers. 

  •  Custom text: Headline and multiline free text box. HTML is not supported. 

Add a report section 

A special area with a dotted frame and a ‘+’ sign on the right side, which allows you to add new sections to the report. It includes the following options: 

  • Element: Dropdown box that contains all available report content sections. You can add one or more sections of each type, e.g. apply different filters to the devices list.  
  • Add: When clicking the ‘Add’ button, the section gets added and the ‘Add report section’ block moves down to the bottom of the panel. 

Remove a report section 

  • All content sections except the Summary section have a trash can icon at the right top that can be used to remove a section. 

Report templates for partners 

Report Templates are available in the ‘Partner’ section. Only Emsisoft partners can create report templates. Templates are data-less report structures without any further template, scheduler or sharing information. Templates are non-hierarchical and stored per partner account, not per partner user account. 

Template overview 

The template editor panel shows all available templates. Each template tile provides information about the template, including:  

  • Name: User-defined name of the report.  
  • Sections: List of content sections that are part of the report. Sorted as in the report. 

Editing templates 

The editing header bar allows you to change the template name. Report sections can be added, removed and customized, e.g. to upload a partner logo or specify device list columns and filters. 

The header bar also contains a dropdown box containing all workspaces in which you have admin/manager roles, and a ‘Preview’ button that switches from edit to preview mode. The preview uses the data of the selected workspace and the last 30 days as period. 

Previewing templates 

Provides a preview of the template. When in preview mode, hamburger menu options for ‘Share’, ‘Clone’ and ‘Save snapshot’ are invisible. 

The post Working with reports appeared first on Emsisoft Help.

]]>
Connecting existing endpoints to the Management Console https://www.emsisoft.com/en/help/3403/connecting-existing-endpoint-protection-to-the-management-console/ Wed, 25 Nov 2020 00:31:42 +0000 https://help.emsisoft.com/?p=3403 If your Emsisoft license was recently assigned to a Management Console workspace, you may have seen the following notification on your endpoints: Please re-authenticate this device with our Emsisoft user […]

The post Connecting existing endpoints to the Management Console appeared first on Emsisoft Help.

]]>
If your Emsisoft license was recently assigned to a Management Console workspace, you may have seen the following notification on your endpoints:

Please re-authenticate this device with our Emsisoft user account to connect to your MyEmsisoft workspace.

Why does it require to re-authenticate

The Emsisoft Management Console enables a plethora of features that help you to efficiently manage all your protected devices on one screen. For that, it requires that your devices are connected to the Management Console.

When you create a new Management Console workspace and assign your license, all previously installed devices that use the same license will show as ‘Non managed’ in the devices list. To change them to fully managed, your devices need to be re-authenticated with your workspace. This is a security feature that prevents unauthorized use of your license by third parties.

How to re-authenticate

Option 1: Log in

When you receive the above notification, please click the “Log in” button and enter your Emsisoft user account details. Then select your workspace and finish the process.

Your device will then show as ‘Protected’ in your workspace and you can start managing its settings through the Management Console.

Option 2: Reconnect via installer

Log in at the Management Console, locate the device in the workspace dashboard and click ‘Reinstall protection’ in the hamburger menu (3 lines icon) on the right hand side of the device. That starts the download of a custom installer program.

After download, run the installer on your device where the Emsisoft protection is currently running. The installer will silently re-authenticate the device with your workspace and confirm with a notification popup.

Your device will then show as ‘Protected’ in your workspace and you can start managing its settings through the Management Console.

Cloud management modes

Emsisoft Management Console offers three different management modes. Please find them in the “Settings” section of your workspace.

  1. Local only: If you prefer to keep all your protection settings on your local computer only and keep communication to Emsisoft servers to a bare minimum, use the ‘local only’ management mode. License information is still held in the console workspace, but no settings or logs will be stored online. The software still connects to Emsisoft servers to receive online updates and to verify malware detection online, just as usual.
  2. Local + remote: Represents the Management Console-managed state, in which settings can be changed either locally or online via protection policies. This is the ideal configuration for most home- and small business users. Any changes made on the protected computer overwrite the central management policies. This ensures a maximum level of flexibility and reporting.
  3. Remote only: Made for larger businesses that don’t want their users to access any protection settings locally. The local protection user interface is significantly reduced to display only the essentials. Network security administrators can control all activities from the central Management Console dashboard.

The post Connecting existing endpoints to the Management Console appeared first on Emsisoft Help.

]]>