When a user enters their ESET Endpoint Encryption Key-File password it enables access to encrypted containers. The containers are encrypted using keys that are available to the user, for example, Virtual Disks and Encrypted Removable Media.
If another user logs in to Windows at the same time as the original user, they will have limited access to the same containers.
After certain software is launched from within a user's session, the software may elevate itself when run under the System user account. If this happens then encryption keys will not be available to that software's process and access will be denied to the containers.
This does not apply to Full Disk Encryption of system disks. If you intend to use backup software with an encrypted system disk, ensure that restoration has been tested using the solution before deploying to a live environment.
In most instances, a file-style sync backup of data from full disk encrypted systems would be the best for scheduled backups. Backups performed at a file-level are more likely to run as the user instead of the system. Users will also have access to encrypted storage should it be required.
Use the command line tool to mount a virtual disk globally so all users on the system will be able to access its contents.