Business & Enterprises Products
Hybrid Network with MDM
MailScan for Mail Server
Write Review View Review
NOTE: Please enter a valid email address as a copy of download link will be sent
to the above email address.
NOTE: MicroWorld will not sell this email address to any third parties. The emails
sent by us will contain complete unsubscribe information, and you may opt-out of
receiving future emails at anytime.
eScan Total Security Suite for Business is a comprehensive Anti-Virus and Information
Security Solution that allows you to manage risk and protect your critical infrastructure
efficiently. Moreover, the new eScan Management Console (EMC) module includes a
Secure Web Interface that facilitates dynamic security management of the server
and endpoints in a business network. It is an excellent combination of advanced
and futuristic technologies that provides protection to your Windows based devices
and endpoints in the business network.
English, German, French, Nederlands, Italian, Portuguese, Spanish, Turkish, Chinese
Simplified, Chinese Traditional, Greek, Korean, Norwegian, Russian, Polish, Latin Spanish, Czech, and Slovak.
The new Secure Web Interface uses SSL technology to encrypt all communications.
eScan’s summarized dashboard provides administrators the status of the managed endpoints
in graphical format such as deployment status, protection status, as well as protection
eScan’s Asset Management module provides the entire hardware configuration and list
of software installed on endpoints. This helps administrators to keep track of all
the hardware as well as software resources installed on all the endpoints connected
to the network.
This module protects your computer or endpoints from data thefts and security threats
through USB or FireWire® based portable devices. It comes with an Application control
feature, which helps you block unwanted applications from running on your computer.
In addition, this feature provides you with a comprehensive reporting feature that
helps you determine which applications and portable devices are allowed or blocked
This will allow you to define the sites that you do not want to allow access to.
You can define the site names you want to block, do a time based access restriction.
With the help of eScan’s Client Live Updater, events related to eScan & security
status of all endpoints are captured and recorded / logged and can be monitored
in real-time. Also, the events can be filtered to retrieve exact required information
to closely watch security level on all managed endpoint on a real-time basis, thus
ensuring total security on all managed endpoints. It also facilitates export of
the reports in Excel format that can further be used for audit compliance.
Outbreak Prevention will allow the administrator to deploy outbreak prevention policies
during an outbreak that restricts access to network resources from selected computer
groups for a defined period of time. The outbreak prevention policies will be enforced
on all the selected computers or groups. Incorrect configuration of these policy
settings can cause major problems with the computers.
eScan Management Console monitors and logs the session activity of the managed computers.
It will display a report of the endpoint startup/ shutdown/ logon/ log off/ remote
session connects/ disconnects. With this report the administrator can trace the
user Logon and Logoff activity along with remote sessions that took place on all
With the help of Active Directory synchronization, the administrator can synchronize
eScan Centralized Console groups with Active Directory containers. New computers
and containers discovered in Active Directory are copied into eScan Centralized
Console automatically and the notification of the same can be sent to the system
administrator. Administrator can also choose to Auto Install or Protect discovered
Windows workstations automatically.
Policy deployment can be made easy through policy templates; this will allow the
administrator to create policy templates and deploy it to the desired managed groups.
The administrator can specify policy criteria and deploy it to endpoints automatically
if it complies with the pre – defined criteria in the management console. The Administrator
will select Policy Criteria based on which the policies will be deployed.
The administrator can define the settings to automatically add clients under desired
sub groups. The administrator will have to Add Groups and also add client criteria
under these groups based on host/host name with wild card/IP address/ IP range.
eScan allows you to create customized client setup with pre-defined Policy Template.
This allows you to implement group policies to the endpoints automatically when
eScan Client is installed on the endpoint manually. The major benefit of this feature
is that even if the endpoint is not connected to the eScan server, the Policy template
will be deployed on to the endpoint while customized eScan Client is installed on
the endpoint. On installing this customized setup, the endpoint will be automatically
moved to the selected group.
In a large organization the Administrator can create computer groups for better
management and distribution of Policies and Updates. Using eScan they can install
Update agent on any managed endpoint (where eScan Client is already installed).
This update Agent will take the signature updates from eScan Corporate Server and
distribute the same to other managed computers in the group.
The Update agent will alternatively query eScan Update servers on internet for getting
updates whenever there is a connectivity problem between the update agent and eScan
eScan comprises of Print Activity module that efficiently monitors and logs printing
tasks done by all the managed endpoints. It also provides a detailed report in PDF,
Excel or HTML formats of all printing jobs done by managed endpoints through any
printer connected to any computer locally or to the network.
eScan Management Console monitors and logs the file activity of the managed computers.
It will display a report of the files created, copied, modified, and deleted. With
this report the administrator can trace the file activities on all the managed computers.
Additionally in case of a misuse of any official files can be tracked down to the
user through the details captured in this report.
Using One Time Password option, the administrator can enable or disable any eScan
module on any Windows endpoint for a desired period of time. This helps to assign
privileges to certain users without violating a security policy deployed in a network.
Customized Setup will allow you to create a customized setup for a particular Windows
client machine. You can define the settings for a customized setup; It will allow
you to define the customized settings for File antivirus, mail antivirus, Anti-Spam,
Firewall, endpoint security, Privacy control, Client Installation Settings, Update
Intervals, exclude/ remove download files. Administrator can define the customized
settings for Windows agents; it will allow you to define the settings for the server
from where the updates are to be downloaded.
This would scan all the existing files and folders for any infection. It will allow
you to report/ disinfect/ quarantine/delete objects.
This will allow you to analyze all the incoming mails. This analyses the mails by
breaking it into three sections the header, subject and the body.
This will prevent you from receiving spam mails by checking the content of outgoing
and incoming mails, quarantines advertisement mails.
This will help you in putting up a restriction to incoming and outgoing traffic
and hacking. You can define the IP range, permitted applications, trusted MAC addresses
and local IP addresses.
This will allow you to schedule an auto erase of your cache, ActiveX, cookies, plugins,
and history. You can also secure delete your files and folders where no traces of
deletion could be found.
Windows Server & Workstations :
Platforms Supported :
Microsoft® Windows® 2016 / 2012 R2 / 2012 / SBS 2011 / Essential / 2008 R2 / 2008 / 2003 R2 / 2003
/ 10 / 8.1 / 8 / 7 / Vista / XP SP 2 / 2000 Service Pack 4 and Rollup Pack 1 (For
32-Bit & 64-Bit Editions)
Hardware Requirement :
CPU - 2GHz Intel™ Core™ Duo processor or equivalent.
Memory - 4 GB & above
Disk Space – 8 GB & above
1.4 Ghz minimum(2.0 Ghz recommended) Intel Pentium or equivalent
1.0 GB minimum (1.5GB recommended)
Disk Space – 800 MB and more
eScan Console can be accessed by using below browsers :
Internet Explorer 7 / 8 / 9 / 10
Firefox 14 & above
Google Chrome latest version