Architecture Overview - ESET FILE SECURITY - FOR LINUX BSD AND SOLARIS Installation Manual

Linux, bsd and solaris
Table of Contents

Advertisement

4. Architecture Overview

Once ESET File Security is successfully installed, you should become familiar with its architecture.
Figure 4-1. Structure of ESET File Security.
The structure of ESET File Security is shown in Figure 4-1. The system is comprised of the following parts:
CORE
The Core of ESET File Security is the ESETS daemon (esets_daemon). The daemon uses ESETS API library libesets.so and ESETS
loading modules em00X_xx.dat to provide base system tasks such as scanning, maintenance of the agent daemon processes,
maintenance of the samples submission system, logging, notification, etc. Please refer to the esets_da emon(8 ) man page for
details.
AGENTS
The purpose of ESETS agent modules is to integrate ESETS with the Linux, BSD and Solaris Server environment.
UTILITIES
The utility modules provide simple and effective management of the system. They are responsible for relevant system tasks
such as license management, quarantine management, system setup and update.
CONFIGURATION
Proper configuration is the most important aspect of a smooth-running security system - the remainder of this chapter is
dedicated to explaining all related components. A thorough understanding of the esets.cfg file is also highly recommended, as
this file contains information essential to the configuration of ESET File Security.
After the product is successfully installed, all its configuration components are stored in the ESETS configuration directory.
The directory consists of the following files:
@ETCDIR@/esets.cfg
This is the most important configuration file, as it controls all major aspects of the product's functionality. The esets.cfg file is
made up of several sections, each of which contains various parameters. The file contains one global and several "agent"
sections, with all section names enclosed in square brackets. Parameters in the global section are used to define configuration
options for the ESETS daemon as well as default values for the ESETS scanning engine configuration. Parameters in agent sections
are used to define configuration options of modules used to intercept various data flow types in the computer and/or its
neighborhood, and prepare it for scanning. Note that in addition to the various parameters used for system configuration, there
are also rules governing the organization of the file. For detailed information on the most effective way to organize this file,
8

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FILE SECURITY - FOR LINUX BSD AND SOLARIS and is the answer not in the manual?

Questions and answers

This manual is also suitable for:

File security

Table of Contents