ESET Endpoint Security and ESET Endpoint Antivirus version 8 were released on December 09, 2020.
For more information about the new ESET PROTECT, see What's new in ESET PROTECT on-premise management console.
New or improved features in version 8
- Secure Browser — Protects a web-browser against other processes running on the computer. The idea supports the zero-trust approach and assumes that the computer or its protection capabilities are compromised or insufficient and does not allow to tamper with the browser’s memory space and, consequently, with the browser window’s content. Keyboard input is monitored and obfuscated to block sampling. With a single click, administrators can choose to include all banking and payment portals and completely take over the decision step, whether to protect the browser for certain websites or not. The feature itself is not active by default. For more information see: Enable and configure Secure Browser in ESET Endpoint Security (8.x).
Micro Program Component Update (MicroPCU) — MicroPCU provides automatic updates of ESET products and reduces required maintenance. MicroPCU does not interfere with running instance of the endpoint and loads new drivers, components, and modules only after the recommended reboot. MicroPCU can wait for a reboot for weeks, it does not reinstall the product with all downsides like deregistering from system during the process including configuration transfer, it downloads less data (differential), comes with a friendly or completely suppressible reminder for the user, and is compatible with managed networks. Additionally, it has an AUTO mode, which will update the endpoint as soon as the package goes through a successful global release.
Security and stability updates — Security and stability updates is an update channel for a critical hotfix. Hotfixes will be distributed automatically to supported versions (7.x and newer) in the future. They will undergo dynamic Quality Assurance processes and contain only essential modifications. These updates cannot bring broader changes like e.g. new features (or loss of any), changes in End User License Agreement, or supported operating systems.
WMI and full registry scan — Improving the registry scanning to discover and eliminate malicious references or dangerous content anywhere in the registry or WMI repository.
Unified exclusions for IDS — The new definition steps for IDS rules provide a less stressful experience if the recorded network-level activities are hard to follow or analyze.