
Contenidos
......................................................................................................................5
Introducción1.
...................................................................................................................................................................................................................5Novedades de la versión 21.1
...................................................................................................................................................................................................................9Requisitos mínimos del sistema1.2
......................................................................................................................9
Usuarios que se conectan a ESET Remote Administrator2.
...................................................................................................................................................................................................................10ESET Remote Administrator Servidor2.1
...................................................................................................................................................................................................................11Consola web2.2
...................................................................................................................................................................................................................11Proxy2.3
...................................................................................................................................................................................................................12Agente2.4
...................................................................................................................................................................................................................12RD Sensor2.5
......................................................................................................................12
Instalación remota3.
......................................................................................................................13
Instalación local en el dispositivo4.
...................................................................................................................................................................................................................13Descargar desde el Sitio Web de ESET4.1
...................................................................................................................................................................................................................14Descargar desde Google Play4.2
...................................................................................................................................................................................................................15Asistente de inicio4.3
......................................................................................................................16
Desinstalación5.
......................................................................................................................16
Activación del producto6.
......................................................................................................................17
Antivirus7.
...................................................................................................................................................................................................................18Exploraciones automáticas7.1
...................................................................................................................................................................................................................19Registros de exploración7.2
...................................................................................................................................................................................................................20Ignorar reglas7.3
...................................................................................................................................................................................................................20Configuración avanzada7.4
......................................................................................................................21
Anti-Theft8.
...................................................................................................................................................................................................................23Contactos del administrador8.1
...............................................................................................................................................................................................23Cómo agregar contactos del administrador
8.1.1
...................................................................................................................................................................................................................23Información de la pantalla de bloqueo8.2
...................................................................................................................................................................................................................23Tarjetas SIM de confianza8.3
...................................................................................................................................................................................................................23Comandos remotos8.4
......................................................................................................................24
Control de la aplicación9.
...................................................................................................................................................................................................................25Reglas de bloqueo9.1
...............................................................................................................................................................................................25Bloqueo mediante nombre de la aplicación
9.1.1
....................................................................................................................................................................................26Cómo bloquear una aplicación mediante su nombre
9.1.1.1
...............................................................................................................................................................................................26Bloqueo mediante la categoría de la aplicación
9.1.2
....................................................................................................................................................................................26Cómo bloquear una aplicación en base a su categoría
9.1.2.1
...............................................................................................................................................................................................26Bloqueo mediante los permisos de la aplicación
9.1.3
....................................................................................................................................................................................26Cómo bloquear una aplicación mediante sus permisos
9.1.3.1
...............................................................................................................................................................................................27Bloquear fuentes desconocidas
9.1.4
...................................................................................................................................................................................................................27Excepciones9.2
...............................................................................................................................................................................................27Cómo agregar excepciones
9.2.1
...................................................................................................................................................................................................................28Aplicaciones requeridas9.3
...................................................................................................................................................................................................................28Aplicaciones permitidas9.4
...................................................................................................................................................................................................................29Permisos9.5
...................................................................................................................................................................................................................30Uso9.6