ESET, spol. s r. o. reserves the right to change any of the described application software without prior notice. Customer Care Worldwide: www.eset.eu/support Customer Care North America: www.eset.com/support...
1. Introduction Dear user, you have acquired ESET File Security - the premier security system running under the Linux, BSD and Solaris OS. As you will soon find out, ESET's state-of-the-art scanning engine has unsurpassed scanning speed and detection rates combined with a very small footprint that makes it the ideal choice for any Linux, BSD and Solaris OS server.
Page 4
Performance and scalability From lower-powered, small office servers to enterprise-class ISP servers with thousands of users, ESET File Security delivers the performance and scalability you expect from a UNIX based solution, in addition to the unequaled security of ESET products.
ESETS ESET Security is a standard acronym for all security products developed by ESET, spol. s r. o. for Linux, BSD and Solaris operating systems. It is also the name (or its part) of the software package containing the products.
Page 6
ESETS object files directory The directory where the relevant ESET File Security object files and libraries are stored. The abbreviation @ LIBDIR@ will be used for future references to this directory. The @ LIBDIR@ value for the following Operating Systems is listed below:...
After purchasing ESET File Security, you will receive your authorization data (username, password and license key). This data is necessary for both identifying you as our customer and allowing you to download updates for ESET File Security. The username/password data is also required for downloading the initial installation package from our web site. ESET File Security is distributed as a binary file: esets.i386.ext.bin...
The structure of ESET File Security is shown in Figure 4-1. The system is comprised of the following parts: CORE The Core of ESET File Security is the ESETS daemon (esets_daemon). The daemon uses ESETS API library libesets.so and ESETS loading modules em00X_xx.dat to provide base system tasks such as scanning, maintenance of the agent daemon processes, maintenance of the samples submission system, logging, notification, etc.
Page 9
please refer to the esets.cfg (5 ) and esets_da emon(8 ) man pages, as well as relevant agents‘ man pages. @ETCDIR@/certs This directory is used to store the certificates used by the ESETS web interface for authentication. Please see the esets_wwwi(8 ) man page for details.
ESET File Security’s scanning power is derived from the On-demand scanner command ‘esets_sca n’ and the On-access scanner command ‘esets_da c’ . The Linux version of ESET File Security offers an additional On-access scanner technique which uses the preloaded library module libesets_pa c.so . All of these commands are described in the following sections.
will enable the ON_EXEC bit of the Dazuko access mask. The On-access scanner ensures that all opened, closed and executed files are first scanned by the esets_daemon for viruses. Depending on the scan results, access to specific files is denied or allowed. 5.2.2 Installation and configuration The Dazuko kernel module must be compiled and installed within the running kernel before initializing esets_da c .
5.3.1 Operation principle The On-access scanner libesets_pa c.so (ESETS Preload library based file Access Controller) is a shared objects library which is activated at system start-up. This library is used for LIBC calls by file system servers such as FTP server, Samba server etc. Every file system object is scanned based on customizable file access event types.
6. Important ESET File Security mechanisms 6.1 Handle Object Policy The Handle Object Policy (see figure 6-1) mechanism provides filtering of scanned objects based on their status. This functionality is based on the following configuration options: action_av action_av_infected action_av_notscanned action_av_deleted For detailed information on these options, please refer to the esets.cfg (5 ) man page.
‘sa mples_provider_ma il’ and/or ‘sa mples_provider_country’ configuration options. The information collected using these options will assist in providing the ESET team with an overview about a given infiltration which may be spreading over the Internet. For more information on the Samples Submission System, refer to the esets_da emon(8 ) man page.
Figure 6-1. ESET Security for Linux - Home screen. The web interface window of ESET File Security is divided into two main sections. The primary window, that serves to display the contents of the selected menu option and the main menu. This horizontal bar on the top lets you navigate between the...
6.4.2 On-Access scanner (DAC) configuration example There are two ways you can to configure ESETS. In our example we will demonstrate how to use either of them to setup the DAC module, described in section 5.2. You can choose the option that best suits you. Using the ESETS configuration file: [dac] agent_enabled = yes...
Figure 6-4. ESETS - Control > On-Demand scanner. ESET Command-line scanner will automatically run in the background. To see the scanning progress, click the V iew link. A new browser window will open. 6.4.4 Statistics You can view statistics for all of active ESETS agents here. Sta tistics summary refreshes every 10 seconds.
Figure 6-6. ERA Console tabs. For more information, please read the ESET Remote Administrator manual. This manual is located on our web site at the following link: http://www.eset.com/documentation 6.5.1 Remote Administration usage example Before commencing any remote administration process ensure your system fulfills the three following prerequisites:...
Page 19
You can select the desired product, that you wish to set the task for, in the O n-Dema nd Sca n pop-up window in the Config ura tion Section drop-down menu. Make sure that you select the O n-dema nd Sca n ta sk for Unix ESET Security Product option (i.e.
-f /var/log/syslog tail -100 /var/log/syslog | less cat /var/log/syslog | grep esets | less If you enable ESET Remote Administration, ERA log entries older than given days by the option ‘ra cl_log s_lifetime’ will be automatically deleted.
These modules can be mirrored from the ESET server. NOTE: Once you set your username, password and license for ESET File Security to download PCU's for ESET NOD32 Antivirus / ESET Smart Security, please contact our Technical Support and request a change, that will enable your ESET File Security to download PCU's for our Windows-based products.
8. Let us know Dear user, we hope this Guide has provided you with a thorough understanding of the requirements for ESET File Security installation, configuration and maintenance. However, our goal is to continually improve the quality and effectiveness of our documentation.
9. Appendix A. PHP License The PHP License, version 3.01 Copyright (c) 1999 - 2006 The PHP Group. All rights reserved. Redistribution and use in source and binary forms, with or without modification, is permitted provided that the following conditions are met: 1.
Need help?
Do you have a question about the FILE SECURITY - FOR LINUX BSD AND SOLARIS and is the answer not in the manual?
Questions and answers