What is our primary use case?
We're able to manage the computers with ESET Protect. There are different ways to connect the computers to the server, and the common way is to deploy the agent through the domain cloud, like Windows servers. That's how we've deployed the agent for all the computers. I work with our organization unit and know which computer belongs to which department. Once the computer is connected to the server, I create two folders, static and dynamic. The dynamic folders are under the static folders. The reason that we use the dynamic is to automate the test. For example, if a computer doesn't have an anti-virus in any dynamic folder, we can install an anti-virus automatically.
We can create a task under the dynamic folder, which helps with implementing all the processes, installing an anti-virus, installing an agent, updating the anti-virus, or updating the practice system. For example, if a computer is under attack, we also create isolate folders when we detect the ESET because one of those texts automatically moves the computer to that dynamic folder, which isolates the computer from the network. Then, from that moment, we check what is happening and the issue. For example, with something like Trajan, we check if the malicious object was blocked or what happened with the malicious object. Then we check the computer errors, and the malicious object is blocked if we don't find anything. So we create a report and then resolve the computer, and it automatically moves again to the folder.
Another use case is how we allow users to connect devices to the computer. With ESET Protect, you can restrict or allow devices. For example, we like to allow the users to connect live phones, VSP, CDs, and the content filter wireless. Every month we have to give a report to the customer informing them that we have received an attack, blocked these attacks and resolved it. That's the kind of report we provide to the customer at the end of the month. We also use ESET Protect for the MSP and the users' administration.
How has it helped my organization?
Depending on your organization, you can set different rules. For example, for the executives, we can block malicious or adult websites and leave the game and streaming websites. For the office or a salesperson, we can restrict more things. It's helped us with restrictions and knowing which users we can provide permissions to and which users we need to restrict.
What is most valuable?
The dynamic folders are the most valuable feature because, in the dynamic folder, you can set the rules. If any computer matches that rule, the computer automatically moves to that dynamic group. Since we already have a task, the computers move to that group automatically, and the task will run. So, for example, if the task in this computer is not updated, move it to that group, and then ESET Protect runs the test to upgrade the Windows Protect system.
What needs improvement?
The way we manage all the computers and how it's centralized to one server can be improved. Since the service is on cloud, we don't want to worry about the connection. So the availability and sustainability could also be improved. Also, you can't connect the ESET Protect server with your domain, meaning ESET Protect automatically extracts the information of all the computers in that domain and then creates a list of all the computers. Then, with that list in the cloud, if we don't have any rules, we move to the lesser computers. Then we can organize the computer into a folder or organization.
Currently, we cannot split the rules for all different MSPs. So if we want to assess a rule in the EDR, it affects the whole organization, which means all the different customers. That's not a good thing because we need to allow some websites for some customers and block them for others. The EDR doesn't have that solution yet, but ESET advised that they're working on it and will have that feature by this year. So we must be very cautious when creating something on the EDR side.
Buyer's Guide
ESET PROTECT Enterprise
July 2025
Learn what your peers think about ESET PROTECT Enterprise. Get advice and tips from experienced pros sharing their opinions. Updated: July 2025.
861,524 professionals have used our research since 2012.
For how long have I used the solution?
We have been using this solution since 2014, and we're currently working with ESET Protect Cloud. Before, it was on-premises, and then they migrated the server to cloud.
What do I think about the stability of the solution?
The stability is great on cloud, and on-premises stability depends on your ISP.
What do I think about the scalability of the solution?
We don't have an issue with scalability, and I rate the scalability a nine out of ten. We plan to increase our usage in the future.
How are customer service and support?
The technical support is good.
Which solution did I use previously and why did I switch?
When I joined my company, they were using another anti-virus called Silas. I suggested ESET Protect as a solution because Silas was missing a lot of features. I prepared a survey on the Linux operating system, Devin. From this frontier, I built Devin from scratch to leave it running from all the customers.
How was the initial setup?
If you have the necessary information to complete the setup, it's normal and not complex. It could be complex for on-premises if you're missing a public IP. If you are going to set it up on cloud, then it isn't an issue. For example, if you have it on-premises, you have to migrate the database on all those things to the cloud. It takes two hours to review the settings, and more time is needed for configuration because there are some sets you cannot migrate to the computers, such as tasks or groups. You need to create them from scratch on the cloud.
The company has a contract, so if a computer is added to the organization through the domain, the computer gets the policy. The policy installs the agent, and it connects to the server as soon as it is online. Since we have the automatic test, the server installs the anti-virus. It checks if a third-party anti-virus is installed and if it is updated. It then checks if the system is dated. As soon as the computer is under the domain, it automatically happens.
What was our ROI?
What's my experience with pricing, setup cost, and licensing?
I rate the pricing an eight out of ten, with one being expensive and ten being good value. Other solutions are less expensive.
What other advice do I have?
I rate the solution a ten out of ten.
Disclosure: My company does not have a business relationship with this vendor other than being a customer.