[KB6624] Create IDS exclusions in ESET Remote Administrator (6.x)


ESET business product no longer supported

This content applies to an ESET product version that is currently in End of Life status and is no longer supported. This content is no longer updated. 

For a complete list of supported products and support level definitions, review the ESET End of Life policy for business products.

Upgrade ESET business products.


View permissions needed for least privilege user access

ERA 6.5 User Permissions

This article assumes that your ERA user has the correct access rights and permissions to perform the tasks below.

If you are still using the default Administrator user, or you are unable to perform the tasks below (the option is grayed out), see the following article to create a second administrator user with all access rights (you only need to do this once):

A user must have the following permissions for the group that contains the modified object:

Functionality Read Use Write

A user must have the following permissions for each affected object:

Functionality Read Use Write
Groups & Computers

Once these permissions are in place, follow the steps below.

  1. Open ESET Remote Administrator Web Console (ERA Web Console) in your web browser and log in.

  2. Click Admin Policies, select the policy in the ESET Endpoint for Windows section that you want to edit and then click Policies Edit.

Figure 1-1
Click the image to view larger in new window

  1. Expand SettingsFirewallAdvanced and click Edit next to IDS exceptions.

Figure 1-2
Click the image to view larger in new window

  1. Click Add.

Figure 1-3

  1. Select the Alert, type the Remote IP address (IP address of the machine with the software that scans the network).
    Alternatively, to set up an IDS exclusion for a locally installed application, type the full path to the .exe file in Application (e.g. C:\Windows\system32\cmd.exe).
  2. In the Action section, select No from each drop-down menu. Click OKSaveFinish to save the policy. If this is a new policy, assign the policy to the correct groups. After the computers check in, they will get the policy change.

Figure 1-4