- Version 2.6.5058.0
- Download 8
- File Size 74.26 MB
- File Count 1
- Create Date January 31, 2024
- Last Updated May 28, 2025
ESET Inspect Connector Version 2.6.5058.0
Introduction to ESET Inspect
ESET Inspect combines all the powerful capabilities of its on-premises version with the ease of deployment and virtually no maintenance requirements of a cloud-delivered service. It is a culmination of ESET Endpoint detection technologies and know-how.
It has a fully transparent and customizable Rule Engine with nearly 1,000 rules, written by ESET's world-class malware researchers to detect threats and behavioural anomalies cross-referenced with the MITRE ATT&CK framework.
For response and remediation, ESET Inspect provides security professionals with a variety of features:
•Block executables
•Kill processes
•Isolate endpoints from the network
•Terminal remote shell
All response actions can be triggered manually or automatically with pre-defined response scenarios.
Incidents are handled easily via its Incident Management system, and threat hunting is a breeze thanks to the powerful Indicator of Compromise (IoC) search and filtering.
ESET Inspect includes all of the key features and capabilities of ESET Inspect On-Prem, but were slightly adjusted to fit the needs of cloud-based management.
•Multiplatform support for Windows, macOS, and Linux allows virtually any endpoint to be monitored, completely protecting an organisation regardless of its platform type.
•ESET Business products version 6.x and later are supported.
•License management is done entirely in the ESET Business Account. Create a new ESET PROTECT and ESET Inspect instance. A single instance supports up to 25,000 endpoints.
•The dashboard does not contain Server status and Events load tabs (no maintenance is required).
•The Settings section contains fewer configuration options than the ESET Inspect On-Prem version, as there is no need for ESET Inspect Database maintenance.
•The Settings section offers search engine integration, Rule learning mode and an option to specify an ESET Inspect instance name.
•Data collection is configured to store the most important data. All data related to processes is stored, but the collection of low-level events is limited to suspicious ones.
Version 2.6.5058.0
- Improved: Performance improvements
- Improved: Detection layer improvements and optimisation
- Fixed: Various bug fixes
Version 2.0.3549.0
- Improved: reliability and performance
- Fixed: various minor bugs fix
Version 2.0.3539.0
- New: Incidents can now be created using rules
- New: Dashboard for Incident management
- New: Automatic and Manual remediation of Incidents
- New: Raw Event transfer through a cloud Blob storage
- New: Language support Ukrainian, Simplified Chinese, and Japanese
- Changed: UI Visuals to reflect the branding changes
- Improved: Flood prevention improvements
- Improved: Rule module - Users can now enable/disable new rules directly from settings independent of server release
- Improved: Users can now use a setting to Automatically execute remediation actions specified by rules
- Fixed: Various other fixes
Please note that this EDR must be installed alongside Endpoint Security.
Update 28/05/2025