What's new
New features and enhancements in ESET Security for Microsoft SharePoint:
•Support for Microsoft Windows Server 2025 has been added.
•The eShell now provides a more secure way to configure credentials without exposing a password in plaintext in the command line.
•Vulnerability patching logging and reports in ESET PROTECT is supported.
•Vulnerability scan reports in ESET PROTECT are now available.
•The eShell supports the Vulnerability & Patch Management computer scan scheduled task.
•Windows Group Policy firewall rules are evaluated.
•Exclusions from network isolation are supported.
•Improved security of interaction between UI components and password settings.
•The Advanced setup now features a search function that highlights matching items.
•The settings for configuring Rules are organized into separate sections, one for each feature:
oReal-time protection (Press F5 to open Advanced setup, then go to SharePoint protection > Real-time protection > Rules).
oSharePoint database scan (Press F5 to open Advanced setup, then go to Scans > SharePoint database scan > Rules).
•Improvements to the Outlook mail plugin have resolved various issues.
•The Automatic exclusions logging mechanism now records only the first instance of an error, helping to prevent log overflow. It resets when settings change, or an error is resolved.
•Advanced settings and component installation tree have been streamlined to align with the structures used in other ESET security products.
•eShell commands have been modified to reflect the updates and consolidation of advanced settings.
•eShell status commands are now organized within a single context and sub-context.
•Limit incoming RDP connections—RDP access restriction feature for ESET Security for Microsoft SharePoint without a firewall component.
If you perform an attended fresh installation locally on the server, the Limit incoming RDP connections to is set to Trusted zone by default. If you perform an installation remotely over RDP, the Limit incoming RDP connections to is set to All networks by default. This setting is meant to be temporary and to prevent your RDP connection from being cut off until you configure the Trusted zone. In both cases, we recommend configuring the Trusted zone to include networks, IP addresses, or IP address ranges from which you specifically allow RDP connections to the server. Go to Network access protection > IP sets and edit Trusted zone IP set. After configuring the Trusted zone IP set to your needs, change the Limit incoming RDP connections to use the Trusted zone from the previous All networks setting to secure your server and take advantage of the RDP access restriction feature while having the RDP fully functioning within your company networks. If you are using the firewall component, Limit incoming RDP connections to setting is not present. Configure the firewall to secure RDP according to your requirements. |
See detailed changelogs for ESET Security for Microsoft SharePoint.