ESET FILE SECURITY - FOR LINUX BSD AND SOLARIS Installation Manual

Linux, bsd and solaris

Advertisement

Quick Links

ESET
File Security
Installation Manual and User Guide
Linux, BSD and Solaris

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FILE SECURITY - FOR LINUX BSD AND SOLARIS and is the answer not in the manual?

Questions and answers

Summary of Contents for ESET FILE SECURITY - FOR LINUX BSD AND SOLARIS

  • Page 1 ESET File Security Installation Manual and User Guide Linux, BSD and Solaris...
  • Page 2: Table Of Contents

    ESET, spol. s r. o. reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support...
  • Page 3: Introduction

    1. Introduction Dear user, you have acquired ESET File Security - the premier security system running under the Linux, BSD and Solaris OS. As you will soon find out, ESET's state-of-the-art scanning engine has unsurpassed scanning speed and detection rates combined with a very small footprint that makes it the ideal choice for any Linux, BSD and Solaris OS server.
  • Page 4 Performance and scalability From lower-powered, small office servers to enterprise-class ISP servers with thousands of users, ESET File Security delivers the performance and scalability you expect from a UNIX based solution, in addition to the unequaled security of ESET products.
  • Page 5: Terminology And Abbreviations

    ESETS ESET Security is a standard acronym for all security products developed by ESET, spol. s r. o. for Linux, BSD and Solaris operating systems. It is also the name (or its part) of the software package containing the products.
  • Page 6 ESETS object files directory The directory where the relevant ESET File Security object files and libraries are stored. The abbreviation @ LIBDIR@ will be used for future references to this directory. The @ LIBDIR@ value for the following Operating Systems is listed below:...
  • Page 7: Installation

    After purchasing ESET File Security, you will receive your authorization data (username, password and license key). This data is necessary for both identifying you as our customer and allowing you to download updates for ESET File Security. The username/password data is also required for downloading the initial installation package from our web site. ESET File Security is distributed as a binary file: esets.i386.ext.bin...
  • Page 8: Architecture Overview

    The structure of ESET File Security is shown in Figure 4-1. The system is comprised of the following parts: CORE The Core of ESET File Security is the ESETS daemon (esets_daemon). The daemon uses ESETS API library libesets.so and ESETS loading modules em00X_xx.dat to provide base system tasks such as scanning, maintenance of the agent daemon processes, maintenance of the samples submission system, logging, notification, etc.
  • Page 9 please refer to the esets.cfg (5 ) and esets_da emon(8 ) man pages, as well as relevant agents‘ man pages. @ETCDIR@/certs This directory is used to store the certificates used by the ESETS web interface for authentication. Please see the esets_wwwi(8 ) man page for details.
  • Page 10: Integration With File System Services

    ESET File Security’s scanning power is derived from the On-demand scanner command ‘esets_sca n’ and the On-access scanner command ‘esets_da c’ . The Linux version of ESET File Security offers an additional On-access scanner technique which uses the preloaded library module libesets_pa c.so . All of these commands are described in the following sections.
  • Page 11: Installation And Configuration

    will enable the ON_EXEC bit of the Dazuko access mask. The On-access scanner ensures that all opened, closed and executed files are first scanned by the esets_daemon for viruses. Depending on the scan results, access to specific files is denied or allowed. 5.2.2 Installation and configuration The Dazuko kernel module must be compiled and installed within the running kernel before initializing esets_da c .
  • Page 12: Operation Principle 5.3.2

    5.3.1 Operation principle The On-access scanner libesets_pa c.so (ESETS Preload library based file Access Controller) is a shared objects library which is activated at system start-up. This library is used for LIBC calls by file system servers such as FTP server, Samba server etc. Every file system object is scanned based on customizable file access event types.
  • Page 13: Important Eset File Security Mechanisms

    6. Important ESET File Security mechanisms 6.1 Handle Object Policy The Handle Object Policy (see figure 6-1) mechanism provides filtering of scanned objects based on their status. This functionality is based on the following configuration options: action_av action_av_infected action_av_notscanned action_av_deleted For detailed information on these options, please refer to the esets.cfg (5 ) man page.
  • Page 14: Samples Submission System

    ‘sa mples_provider_ma il’ and/or ‘sa mples_provider_country’ configuration options. The information collected using these options will assist in providing the ESET team with an overview about a given infiltration which may be spreading over the Internet. For more information on the Samples Submission System, refer to the esets_da emon(8 ) man page.
  • Page 15: License Management

    Figure 6-1. ESET Security for Linux - Home screen. The web interface window of ESET File Security is divided into two main sections. The primary window, that serves to display the contents of the selected menu option and the main menu. This horizontal bar on the top lets you navigate between the...
  • Page 16: On-Access Scanner (Dac) Configuration Example

    6.4.2 On-Access scanner (DAC) configuration example There are two ways you can to configure ESETS. In our example we will demonstrate how to use either of them to setup the DAC module, described in section 5.2. You can choose the option that best suits you. Using the ESETS configuration file: [dac] agent_enabled = yes...
  • Page 17: Statistics

    Figure 6-4. ESETS - Control > On-Demand scanner. ESET Command-line scanner will automatically run in the background. To see the scanning progress, click the V iew link. A new browser window will open. 6.4.4 Statistics You can view statistics for all of active ESETS agents here. Sta tistics summary refreshes every 10 seconds.
  • Page 18: Remote Administration Usage Example

    Figure 6-6. ERA Console tabs. For more information, please read the ESET Remote Administrator manual. This manual is located on our web site at the following link: http://www.eset.com/documentation 6.5.1 Remote Administration usage example Before commencing any remote administration process ensure your system fulfills the three following prerequisites:...
  • Page 19 You can select the desired product, that you wish to set the task for, in the O n-Dema nd Sca n pop-up window in the Config ura tion Section drop-down menu. Make sure that you select the O n-dema nd Sca n ta sk for Unix ESET Security Product option (i.e.
  • Page 20: Logging

    -f /var/log/syslog tail -100 /var/log/syslog | less cat /var/log/syslog | grep esets | less If you enable ESET Remote Administration, ERA log entries older than given days by the option ‘ra cl_log s_lifetime’ will be automatically deleted.
  • Page 21: Eset Security System Update

    These modules can be mirrored from the ESET server. NOTE: Once you set your username, password and license for ESET File Security to download PCU's for ESET NOD32 Antivirus / ESET Smart Security, please contact our Technical Support and request a change, that will enable your ESET File Security to download PCU's for our Windows-based products.
  • Page 22: Let Us Know

    8. Let us know Dear user, we hope this Guide has provided you with a thorough understanding of the requirements for ESET File Security installation, configuration and maintenance. However, our goal is to continually improve the quality and effectiveness of our documentation.
  • Page 23: Appendix A. Php License

    9. Appendix A. PHP License The PHP License, version 3.01 Copyright (c) 1999 - 2006 The PHP Group. All rights reserved. Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met: 1.

This manual is also suitable for:

File security

Table of Contents