[KB8422] Optimize your ESET Inspect On-Prem product

Solution

    1. Ensure you meet the ESET PROTECT On-Prem database system requirements
    2. Determine your ESET Inspect On-Prem hardware requirements
    3. Install ESET Inspect On-Prem
    4. Optimize ESET Inspect On-Prem performance

I. ESET PROTECT On-Prem database system requirements

  1. Specify the database server and connector you want to use when installing the ESET PROTECT Server and ensure you meet the ESET PROTECT On-Prem database server hardware and sizing instructions.
Microsoft SQL Server Express is not recommended

The ESET PROTECT 10.0 All-in-one installer installs Microsoft SQL Server Express 2019 by default. We do not recommend using Microsoft SQL Server Express. We recommend using or upgrading to a fully paid version of Microsoft SQL server. Migrating from Microsoft SQL express to MySQL is not supported and would require installing MySQL with a clean database. 

  1. Verify you meet the supported database servers and database connectors requirements. ESET PROTECT On-Prem supports two database servers: Microsoft SQL Server and MySQL.
MariaDB

ESET PROTECT On-Prem does not support MariaDB. MariaDB is a default database in most current Linux environments and is installed when you choose to install MySQL.

Supported database server

Supported database versions

Supported database connectors

Microsoft SQL Server

  • Express and non-Express editions
  • 2014, 2016, 2017, 2019
  • SQL Server
  • SQL Server Native Client 10.0
  • ODBC Driver for SQL Server 11, 13, 17, 18

MySQL

  • 5.6*
  • 5.7
  • 8.0

MySQL ODBC driver versions:

  • 5.1, 5.2
  • 5.3.0 - 5.3.10
  • 8.0.16, 8.0.17
  • 8.0.27, 8.0.31 (Windows only)

*MySQL 5.6 reached the End of Life in February 2021. We recommend upgrading your MySQL database server to version 5.7 and later.

Unsupported versions of MySQL ODBC driver
  • 5.3.11 and later, 5.3.x
  • 8.0.0 - 8.0.15
  • 8.0.18 and later
Performance Recommendations
Use a full paid version of Microsoft SQL Server

We recommend using the latest supported Microsoft SQL Server as your ESET PROTECT On-Prem database for the best performance. While ESET PROTECT On-Prem is compatible with MySQL, using MySQL can negatively impact system performance when working with large amounts of data, including dashboards, detections, and clients. The same hardware with Microsoft SQL Server can handle significantly more clients than MySQL.

You can decide whether to install an SQL database server on:

  • The same machine as the ESET PROTECT Server
  • The same machine as the ESET PROTECT Server but on a separate disk
  • A dedicated server

We recommend using a dedicated machine with reserved resources to manage over 10,000 clients.

Database

SMB customer

Enterprise customer

Clients limit

Windows

Linux

Microsoft SQL Express

(optional)

5,000

 

Microsoft SQL Server

None

 

MySQL

10,000

Review Additional Information


II. Determine your ESET Inspect On-Prem hardware requirements

ESET Inspect On-Prem hardware requirements

Hardware requirements depend on the number of events. The event from the ESET Inspect On-Prem side of view includes File system events (read file, write file, etc.), TCP events, Registry events, HTTP events, DNS events, etc.

There are two ways to get the number of events. We recommend determining the number of events before installing the ESET Inspect Server.

Before installing the ESET Inspect Server
  1. Install the ESET Inspect Connector on at least three endpoints (ESET Inspect Connector is operable without ESET Inspect Server).

  2. Activate the product with a valid ESET Inspect On-Prem license. The activation is done via ESET PROTECT On-Prem by creating a Product activation task. To do this, contact your ESET PROTECT Administrator or create a Product Activation task.

  3. Wait for at least a day.

  4. Navigate to the folder where ESET Inspect Connector is installed (by default C:\Program Files\ESET\Inspect Connector) and run the command EIConnector.exe --stats.

  5. From the output, use Average Events Per Day.
After the ESET Inspect Server is already installed and working
  1. Go to Dashboard Events load tab, and in the Events processed and stored per computer chart, check the highest values of events received per 24h.

  2. To calculate the estimated CPU, RAM, and disk space requirements for ESET Inspect Server and MySQL on the same machine, use the calculator in the Online Help topic.
The values in the table below are based on the assumption that the endpoint does not have more than a hundred thousand events generated per day, and the default data retention is 31 days. If the number of events in your environment is more than a hundred thousand, you should proportionally scale the number from the table.
EPS for IOPS

EPS (Events Per Second) refers to the rate of events received by ESET Inspect On-Prem, while IOPS (Input/Output Operations Per Second) refers to the disk's read/write rate. See our Online Help topic for more information on disk space consumption reduction, the disk IOPS, or CPU and RAM impact reduction.

Minimum requirements

 

MS SQL Server

MySQL

Number of Endpoints

500

1000

5000

500

1000

5000

Memory

4 GB

4 GB

12 GB

4 GB

4 GB

12 GB

Disk space

566 GB

1.24 TB

6.2 TB

566 GB

1.1 TB

5.6 TB

Disk IOPS

1500

1500

3000

1000

2000

3000

Number of CPU cores

2

2

10

2

2

8


III. Install ESET Inspect On-Prem 

  1. Ensure the SQL database is on the same server as ESET Inspect On-Prem and the SQL instance is dedicated.

  2. Download and install the ESET Inspect server.

  3. Select the type of ESET Inspect On-Prem users managing ESET Inspect On-Prem Security Operations Center (SOC), Security-focused IT or IT Administrators. For more information on the difference between the options, see this Online Help topic.

  4. Select the appropriate data collection options.

  5. Configure ESET Inspect On-Prem to optimize database size. If you store all available data for data collection, it may be necessary to create event filters for executables that are sending extremely large amounts of events. If the option to store all available data was selected, see our Online Help topic for more information. 

  6. After the initial installation of ESET Inspect On-Prem, it will be required to create exclusions to minimize the number of benign detections. This can be accomplished in the following ways:
    • Manually create exclusions
    • Enable Learning mode so the Rule learning mode automatically suggests exclusions. The exclusions will appear in Questions for you to review. This can be enabled during the initial prompt after the first login to the ESET Inspect Web Console or by going to More Settings Rule learning mode.
    • Enable prebuilt exclusions.

IV. Optimize ESET Inspect On-Prem performance 

To get the best of your ESET Inspect, we recommend you carry out the following updates to optimize ESET Inspect before you begin fully using it. It gives you two advantages: it increases overall performance and makes it easier for you to use ESET Inspect when managing detections and responding to them to mitigate threats.
 
Update Description
System Requirements

Ensure your ESET Inspect Server is up to specification and meets (or exceeds) software and hardware requirements.

Having a dedicated machine with ample storage space to run the database system may further improve performance. This is not mandatory, you can run the ESET Inspect in a single server environment.

MySQL If you have the option, choose MySQL to run the ESET Inspect Database. It currently outperforms the Microsoft SQL Server when running the ESET Inspect Database.
Number of threads

This applies only when your ESET Inspect Database is running on a different server than the ESET Inspect Server. If your ESET Inspect Server and ESET Inspect Database runs on the same machine, this is configured automatically, you can skip this step.

Set the number of cores to increase the performance, making your ESET Inspect Server more efficient.

Click More SettingsDatabase performance (available in the on-premises version only) and specify the Number of threads writing to database according to this formula:

1.5x the number of physical cores of your server running the ESET Inspect Database

Performance check

We recommend you make sure your system is fit, capable, and performs well.

Since ESET Inspect deals with a lot of data, you may experience performance issues. Generally, the database can be a bottleneck. Such performance issues are usually caused by undersized hardware specifications, especially insufficient disk space.

However, the performance can also be hindered if there are too many events being collected by ESET Inspect.

A healthy server processes a high number of Events per second but has a low Event Packet Queue Length. Perform a performance check of your server to see how it is doing.

Minimize the number of events

The events processed and stored per computer (stored/received within 24 hours) have the biggest impact on performance.

An event is an action done by a process, such as a file write, DNS lookup, new registry entry, etc. All these are individual events listed in the Raw Events view.

An average workstation produces about 100,000 stored events per 24 hours (depending on the environment). Your goal is to lower the number of stored events.

Some event filters (automatic exclusions) are proposed by ESET Inspect, click Questions to review the exclusions, then accept or reject. You can also customize or manually create exclusions to further optimize performance in Event Filters.

Click SettingsData collection to select what type of data should be collected from endpoint computers. Available in the on-premises version only.

Events load

ESET Inspect collects event data, among which there are anomalies or outliers.

Identify the outliers, for example, known executable events considered as safe and generate excessive occurrences.

To reduce the number of events, create a filter for the executable:

  1. Click DashboardEvents loadEvents per executable. Click the tallest column of events generated to see what executables are producing too many events.
  2. Click the executable name to see its details. If you consider this event safe, create an event filter.
  3. Click the Filter events at the bottom right, follow the wizard and specify Criteria and Event types for this executable. Select event types that cause the most events. If you need further criteria, use the Advanced editor to create an in-depth filter. See the ESET Inspect rules guide for reference.

Repeat this process until you have dealt with most of the outlier events. Also, follow the procedure for the other tables within the Events load.

This optimization can have a significant impact on increasing performance.

Change events frequency

If there are still too many events, you can decide to decrease the interval when events are sent by creating a new policy in ESET PROTECT On-Prem:

Click PoliciesNew policySettings and select ESET Inspect Connector. In the Interval of sending events to the server, specify the desired time and frequency at which events are sent.

False positive detections

Get rid of false positives to unload the database and prevent future flooding with unnecessary data. Create rule exclusions for False positive detections.

  • Enable event filters (automatic exclusions) proposed by ESET Inspect, click Questions to review the exclusions, and then accept or reject. You can also customize or manually create exclusions to further optimize performance in Event Filters.
  • Reconsider the chosen type of ESET Inspect user. If you are not going to continuously analyze a large number of detections daily (in the case of the Security Operations Center user type), choose a different ESET Inspect user type, such as a Security-focused IT Team or even an IT Administrator. This enables you to deal with fewer detections.
  • Enable Rule learning mode in Settings (if it is not running).
  • Use Mark as safe for executables considered not risky. Marking as safe can prevent some rules from triggering and producing false positives.
  • Disable rules that do not suit your environment. For example, if you are using VNC for remote connection, disable the VNC connection from internal IP range [D0523a] rule.
  • Modify default rules to match your network. For example, edit the VNC connection from internal IP range [D0523a] rule to accept connections only on specified IP addresses, ranges or ports, so that the rule is triggered only when a suspicious connection occurs.
  • Verify the LiveGrid® connection works. Many rules rely on LiveGrid® information to function correctly. If there is an issue with LiveGrid®, you will see a warning in the Questions section, also in DashboardServer Status.
  • Be careful when using Microsoft Signer Name while creating Exclusions. Microsoft executables are sometimes signed differently on different Microsoft Windows editions.
Tips
  • Keep ESET Inspect Connectors and ESET Inspect Server up to date. Mismatching ESET Inspect Connector and ESET Inspect Server versions may cause unpredictable behavior. The latest ESET Inspect Server version usually contains several fixes and improvements.
  • If you are using a “golden master” image with a pre-installed ESET Inspect Connector to deploy client workstations, make sure to take the appropriate measures. Otherwise, all clones created from the image use the same database thread, causing very poor performance. To avoid issues, use the same methods that apply to the ESET Management Agent.
  • Keep an eye on disk space. If the disk space on the ESET Inspect Database server falls below 10%, the database purge will stop working, consuming even more disk space. This applies to the ESET Inspect On-Prem version only.
  • Consider lowering the Database Retention settings (available in the on-premises version only).
  • Keep the operating system language in mind when creating exclusions. “NT AUTHORITY\NETWORK SERVICE” on an English installation of windows is called “NT AUTHORITY\Servicio de Red” in Spanish. This can also differ between Microsoft Windows editions. In this case, use “TriggeringUserSid” and not “TriggeringUserName”.
  • Keep a copy of the ESET Inspect Rules guide handy for reference.
  • Speed up loading the table view (for example, in Detections), use the gear icon to modify the table options and remove unnecessary columns and filters.

Chat with ESET AI Advisor for support