Emsisoft Cloud Console is made for network administrators, managed service providers and IT professionals and provides centralized remote management of Emsisoft Anti-Malware (including Home, Business Security and Enterprise Security license plans).
It’s part of my.emsisoft.com and can also be pinned as an app to your app launcher.
- Create a new workspace
- Add new devices to a workspace
- Apply a license to a workspace
- Invite users to your workspaces
- Workspace overview: Protection status of your devices
- Edit global protection policies for groups of devices
- Edit local user permission policies for groups of devices
- Reports and notifications (coming soon!)
- Update proxy to save bandwidth (coming soon!)
- Device overview: Protection status and quick access
- Protection settings of a device
- Scan for malware
- Manage quarantined objects
- Logs of a device
For partners and MSPs (Managed Service Providers):
Create a new workspace
Open MyEmsisoft and navigate to the Workspaces Dashboard. Click the ‘Create Workspace’ button and enter a new, unique name for your workspace.
If you already see an automatically created workspace in MyEmsisoft, feel free to rename it in its Workspace Settings panel any time.
What is a workspace?
Workspaces typically represent the boundaries of your company or organization, but can also define your home computers group.
Licenses are applied on workspace level, which means your workspace can either be in trial mode or have a full version license assigned for all your devices.
When creating a new workspace, you automatically become the Primary Owner, but you can invite other users to join your workspace. E.g. you may want to request feedback on your protection status from an IT professional. See ‘Inviting users‘ for details.
Add new devices to a workspace
Go to your workspace overview panel and click the ‘Add Device’ button.
Install protection on this device
Select that option to download your workspace-specific installer right away. After installation, the device will show up in your Devices list right away. No separate license activation or user account login is required.
Note that the download filename must not be changed. It contains a unique identifier (36 characters sequence) to authenticate the installed device directly with your workspace.
Warning: Never share your installer with the public! For security reasons, the authentication sequence expires after 7 days. Check the Workspace Settings panel for details.
Send download instructions by email
Select that option to invite others to add their devices to your workspace. E.g. members of your organization who are instructed to install Emsisoft protection, or your clients if you are a managed service provider.
The invitation email contains a personalized download link that will expire as described above.
Apply a license to a workspace
When creating a new workspace, the first device that gets added automatically activates a free trial license. You can add multiple devices during the trial period.
To switch to a full version license, go to the Workspace Settings panel and click the ‘Apply license key’ link. Once confirmed, your license will be deployed to all your devices.
Invite users to your workspaces
As a Primary Owner or Workspace Admin you can invite additional users and assign them different user roles. Go to the Workspace Settings panel and click the ‘Invite a user’ button to send an invitation by email.
If the invited user doesn’t yet have an Emsisoft user account, we will guide them through sign up first.
|Billing Contact||Protection Manager||Workspace Admin||Primary Workspace Owner|
Primary Workspace Owner
Is the legal owner of the workspace and responsible for all activities within a workspace. Has full access to everything and can re-assign ownership to another user.
Typical use case: The buyer of the license.
Has full access to your workspace and can view/edit all devices, policies, alerts, logs, reports, users and the license of your workspace. Workspace Admins can change all user permissions except those of the Primary Workspace Owner.
Typical use case: An organization has multiple full-access administrators to share management tasks of the workspace.
Can view/edit all devices, policies, alerts, logs, reports, but can’t change the workspace settings such as user roles and licensing.
Typical use case: A trusted third party who has more experience with security software manages the protection for the workspace, i.e. an IT professional or the ‘computer geek’ in the family.
Is responsible for license payments. Can view/edit license information, but doesn’t have access to devices or other workspace settings.
The billing contact receives license renewal reminders from us.
Typical use case: A managed service provider (MSP) or reseller who sells the malware protection in a bundle with other services, i.e. general computer maintenance services.
Workspace overview: Protection status of your devices
Select any of your workspaces in your Workspaces Dashboard to see all connected devices in that workspace. The table provides a quick overview of what’s going on in your environment and will signal issues printed in red.
Pay special attention to the Protection Status and Last Update columns, as they indicate potential issues that may affect your security.
The column ‘Protection Policy’ tells you which device settings policy currently applies to a particular device.
‘Last User’ and ‘User Policy’ indicate which user is currently (or was last) logged on at the device and which permission policy applies.
The last column provides a hamburger menu with shortcuts to common tasks such as malware scans, or to edit the device settings.
Tip: Hover your workspace name on the left side menu and you’ll see a little pin icon. Click that to pin your workspace permanently to your menu for quick access.
Edit global protection policies for groups of devices
We recommend the use of device groups that reflect your internal organization structure, e.g. your marketing team may require to exclude specific work related programs from protection for best performance; or your customer support team may require silent operation of the Emsisoft protection to avoid any kind of popups during work.
Instead of changing the configuration for each device individually, you can save a lot of time by simply creating groups and applying specific settings either globally or for selected sub-groups, as required.
The ‘Protection Policies’ panel allows you to edit and re-arrange the hierarchy of groups on the left, and modify the policy settings of the selected group on the right.
The panel includes all software settings as they are displayed on the endpoint. Additionally, you can modify some customization properties, e.g. to hide news popups or to redirect the purchase links to a custom website. See ‘Customer Care‘ settings.
Policy groups with inheritance
The highest hierarchy is always your Workspace root group. Any changes you apply there will automatically be inherited to all sub-groups. Click ‘Add’ and drag&drop a group to the desired hierarchy level.
Assign devices to groups
Click the ‘Devices in this group’ tab on the right top to see all devices in the selected group. Drag&drop a device to a different group to re-assign the device.
Newly added devices will automatically be added to the ‘New devices’ group that comes with more restricted default settings.
Modify group settings
Select a group on the left and switch to the ‘Group settings’ tab on the right to see all protection settings.
Note that all settings that are different to the next higher hierarchy level are printed in bold, have a light grey background and a blue handle on the left. Click the ‘Reset’ icon on the right to restore inheritance of a particular setting.
Settings are saved in real-time and typically applied to your devices within the minute.
Edit local user permission policies for groups of devices
Similar to the Protection Policies you can define default permissions for user accounts. Select a user group on the left and switch to the ‘Users’ tab on the right to see the assigned users.
Users can either be local user accounts on your devices or Active Directory Domain users in your network. Click ‘Add’ to specific a new user.
For simplification we recommend working with default groups though. The protection software on the endpoint can automatically assign permissions based on available local account permissions.
- Administrators have ‘Full access‘ and can view and edit all software settings.
- All other users have ‘Basic access‘ which allows them to view settings but not change them. They can also run malware scans, decide what to do on alerts and quarantine found objects. Recommended for users with a basic understanding of protection software.
Alternatively, you can change the default permissions to one of the following:
- ‘Read-only access‘ can view settings, but can’t change them. All alerts and events are handled automatically by the software. Recommended for non-experienced users.
- ‘No access‘ can’t view the program interface. All alerts and events are handled automatically by the software. Recommended if your users shouldn’t be distracted by the malware protection at all.
Device overview: Protection status and quick access
The content of the device overview panel matches what users see locally on those devices when they open the protection software.
The first tile shows the current protection status. The background color of the tile provides basic information about potential issues:
- Green: All real-time protection components are enabled and the latest updates are installed.
- Orange: One or more real-time protection components are disabled or the latest updates are missing. Please investigate and fix the issue.
- Red: All real-time protection components are off. Please investigate and fix the issue.
- Grey: The device is currently offline. You can still edit the settings which will be synchronized as soon as the device gets online again, but you can’t start malware scans or change quarantined objects.
Protection settings of a device
While it is strongly recommended to work with protection policies and groups, you can also change software settings on individual devices if required. Such changes override any inherited policies.
Once your edits are completely synchronized with the device (usually within the minute) they will be printed in bold with a grey background and a blue handle on the left on the actual devices in their Settings panel. Hover the setting and click the ‘Reset’ icon on the right to restore the inherited setting value.
Scan for malware
We recommend to run a manual malware scan right after installing the protection software, or at any time when you suspect an infection. It makes sure that the system hasn’t been compromised and the real-time protection components can reliably do their job.
The following scan types are available:
- Quick Scan – Scans only active programs and checks for malware traces. Run a Quick Scan if you are sure that the system is clean (e.g. if you have a freshly installed or otherwise trustworthy operating system available.)
- Malware Scan – Scans all places that malware typically infects. A Malware Scan is the best choice for most users. It’s fast and thoroughly examines the whole computer for any active malware infections.
- Custom Scan – All scanner settings can be manually set. This is particularly useful if you want to scan additional drives for any inactive Malware files. Default settings represent a full system scan, including all drives.
Manage quarantined objects
All findings of the on-demand scanner and the real-time protection are first put in quarantine instead of deleting them right away. That security measure allows to restore potentially wrongly detected objects later.
Emsisoft Anti-Malware automatically re-scans quarantined objects after each online update and offers to restore the data to its original location if it turns out the detection was wrong. You can run a manual quarantine re-scan at any time by hitting the ‘Re-scan all’ button on the right bottom corner.
If you suspect a wrong detection, tick the checkbox in front of the object in question and hit the ‘False detection’ button at the bottom. That submits the quarantined item to the Emsisoft Lab for further investigation.
Select an object and click ‘Restore’ to get the file and its settings restored to their original locations. By clicking ‘Delete’ the data will be permanently removed and can not be restored any longer.
Logs of a device
Emsisoft protection software logs a number of events, such as the date and time of online updates, malware scans, real-time protection alerts, and more. Use those logs to investigate in issues or to verify proper use of the software.
Policy templates for use in multiple workspaces
Managed service providers (MSPs) and other Emsisoft partners that manage a larger number of workspaces with their user accounts can create policy templates to avoid that they have to manually edit the policies for each customer manually.
To manage your templates, click your username on the right top of the screen and select ‘My Policy Templates’. Click ‘Add’ and enter a name to set up a new template.
Policy templates are stored in your user profile, but you can choose whether you want to keep a template private or share it with other administrators that have access to the same workspaces that you manage.
Just like in a workspace’s policy panel, you can arrange your templates in hierarchies with inheritance support. We recommend creating one root template with the basic settings that never change (such as placing your partner contact details in Emsisoft Anti-Malware’s user interface), and then having sub-templates for groups of similar users/departments (e.g. enabling silent mode for teams that can’t be distracted by alerts).
To apply a template, please switch to the customer’s ‘Workspace Settings’ panel, select either the root policy level or a specific group and assign the template via the top most option on the right. We recommend doing that right away when creating new workspaces.
Software customization with Customer Care settings
Managed service providers (MSPs) and other Emsisoft partners who require modifications of the software user interface can use the following protection policy settings:
Navigate to the ‘Protection Policies’ in your workspace and then select a specific device group. Scroll down to the section ‘CUSTOMER CARE’. There you can change the following:
- Disable license expiration notifications: Disables all notification popups that are displayed 30, 14 and 7 days before the license period ends. Note: This potentially puts users at risk to lose protection if a license doesn’t get renewed in time. Notifications will still be displayed 3 days before license ends.
- Hide customer referral rewards program: Hides all suggestions to renew a license for free by referring new software users.
- Hide license key: Prevents users from reading and changing the license key to avoid that it gets misused somewhere else.
- Disable purchase and renewal buttons: Stops user from buying a license online at Emsisoft directly.
- Alternative message for purchase and renewal buttons: Insert administrator contact details or alternative notes for user, i.e. “To obtain a license, please contact Company Ltd, +1 234 567 89”.
- Alternative URL for purchase and renewal buttons: Specify a website address where user can find purchase information, i.e. “https://www.company.com/order/”.
- Hide news area on overview screen: Hides the entire news section on the bottom of the main Overview screen. Note: No advertising is displayed there, only security education and product news. Additionally you can also disable the news popups by disabling the relevant option in “NOTIFICATIONS” group.
- Alternative static text: Insert administrator contact details or alternative notes for user, i.e. “Managed by Company Ltd, +1 234 567 89”.
- Alternative URL: Specify a website address where user can find purchase information, i.e. “https://www.company.com/order/”.