ESET Inspect Primary Use Case

Cees Van Den Haak - PeerSpot reviewer
ICT Manager at Bouwbedrijf de Vries en Verburg BV

The solution is a little bit complex because it has a lot of filters, and it needs to be tuned properly. ESET Inspect offers a learning mode. It takes some amount of learning to be able to work with ESET Inspect. I have to work it out in combination with Microsoft Sentinel and with connectors when it comes to ESET Inspect.

View full review »
DD
ESET Support at a computer software company with 11-50 employees

ESET Inspect is an interactive XDR tool for managing network security. It is available in the cloud and on-prem. 

View full review »
DD
ESET Support at a computer software company with 11-50 employees

ESET Protect & Inspect Cloud is an extremely powerful tool. When you look at a traditional anti-malware solution, you can see it as a relatively passive solution that actively monitors your network for malware without your interference on a regular day-to-day basis. Sure, the admin's role is to deploy and configure such a solution and respond to emerging issues, but in the majority of cases, antimalware solutions do the magic on their own, automatically.

As opposed to that, XDR solution gives the administrator a deep insight into all ongoing processes on every endpoint and server in real-time, and tools to respond to events that are maybe suspicious or unwanted in the network. Sure, there is a certain level of automation that is necessary for managing a large database of events, based on the cloud reputation system (ESET Live GRID) and built-in rules that simplify administration, but still - the admin has a decisive role in every process. You can keep an eye out for executables, dependencies, registry keys, and network connections, all in one console. Every anomaly will be detected, with deep insight into what is going on in your network.  

EPIC management is based on built-in and, later on, your custom rules and exclusions that you defined in a response to events that occurred. There are over a thousand built-in rules that are constantly updated by ESET engineers and they are monitoring ongoing processes. For example, in one case, EPIC informed me that one of my colleagues is using a nonstandard port in his Outlook. If the company policy doesn't allow that, I can intervene based on the information. If some app is trying to modify the startup folder, you will be notified. If some process is trying to modify a standard or build a new registry key that is previously unknown, you will know the source, possible malicious or benign causes, and all other required information about the case that will help you decide if it's bad or not. If it's bad, you can kill the process, isolate or shut down the endpoint and make the rule that will deal with it next time it occurs. If it's OK, you can create an exclusion that will ignore the case for that particular endpoint, a whole department, or the entire network. After a while, perhaps a month or two of actively monitoring your network, you will, practically, build a white list of allowed processes, and we all know how whitelisting can be useful in IT security, overall.

View full review »
Buyer's Guide
ESET Inspect
March 2024
Learn what your peers think about ESET Inspect. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.
RS
Consultant at a financial services firm with 10,001+ employees

We are using ESET Enterprise Inspector for security.

The solution can be deployed on the cloud and on-premise. One of our clients has a large number of devices and they are using the solution on the cloud using Amazon AWS.

View full review »
MH
Senior ICT Specialist at a non-profit with 1,001-5,000 employees

My primary use case for this solution is antivirus protection, spam protection and IDS.

View full review »
Buyer's Guide
ESET Inspect
March 2024
Learn what your peers think about ESET Inspect. Get advice and tips from experienced pros sharing their opinions. Updated: March 2024.
765,234 professionals have used our research since 2012.