ESET FILE SECURITY Installation Manual

Hide thumbs Also See for FILE SECURITY:

Advertisement

Quick Links

w e p r o t e c t d i g i t a l w o r l d s
ESET File Security
Installation Manual
and User Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FILE SECURITY and is the answer not in the manual?

Questions and answers

Summary of Contents for ESET FILE SECURITY

  • Page 1 ESET File Security Installation Manual and User Guide...
  • Page 2: Table Of Contents

    Appendix A. PHP License ..............29 ESET File Security Copyright © 2008 ESET, spol. s r.o. ESET File Security was developed by ESET, spol. s r.o. For more information visit www.eset.com. All rights reserved. No part of this documentation may be...
  • Page 3: Introduction

    Chapter 1: Introduction...
  • Page 4 LIBC. • The system can be configured to notify any user in the event of a detected infiltration. To run efficiently, ESET File Security requires just 16MB of hard disk space and 32MB of RAM. It runs smoothly under the 2.2.x, 2.4.x and 2.6.x Linux OS kernel versions and the 5.x, 6.x FreeBSD OS kernel versions.
  • Page 5: Terminology And Abbreviations

    Chapter 2: Terminology and abbreviations...
  • Page 6 ESETS ESET Security is a standard acronym for all security products developed by ESET, spol. s r.o. for Linux, BSD and Solaris operating systems. It is also the name (or its part) of the software package containing the products.
  • Page 7 Solaris: /opt/esets/sbin ESETS object files directory The directory where the relevant ESET File Security object files and libraries are stored. The abbreviation @LIBDIR@ will be used for future references to this directory. The @LIBDIR@ value for the following Operating Systems is listed below:...
  • Page 9: Installation

    Chapter 3: Installation...
  • Page 10 After a purchase of the ESET Gateway Security, you will get your authorization data (Username/ password and a license key). The data are needed to identify you as our customer, who has right to download updates for ESET Gateway Security. The Username/password data are required for downloading installation package from our website.
  • Page 11: Architecture Overview

    Chapter 4: Architecture Overview...
  • Page 12 The structure of ESET File Security is shown in Figure 4-1. The system is comprised of the following parts: CORE The core of ESET File Security is the daemon esets_daemon. The daemon uses ESETS API library libesets.so and ESETS loading modules em00X_xx.dat to provide base system tasks...
  • Page 13 ESETS daemon as well as default values for the ESETS scanning engine configuration. Parameters in the agent sections are used to define configuration options for all ESET File Security agents and modules. These agents are used to intercept various data types received by the computer and prepare this data for scanning. Note that in addition to the various parameters used for the system configuration, there are also rules governing the organization of the file. For detailed information on the most effective way to organize this file, please refer to the...
  • Page 15: Integration With File System Services

    Chapter 5: Integration with File System services...
  • Page 16: On-Demand Scanner

    This chapter describes the On-demand and On-access scanner configuration which will provide the most effective protection from virus and worm file system infections. ESET File Security's scanning power is derived from the On-demand scanner command 'esets_scan' and the On-access scanner command 'esets_dac'. The Linux version of ESET File Security offers an additional On-access scanner technique which uses the preloaded library module libesets_pac.
  • Page 17: Installation And Configuration

    Every file system object is scanned based on customizable file access event types. The following event types are supported by the current version: Open events This file access type is activated if the word 'open' is present in the 'event_mask‘ parameter in the eset.cfg file ([dac] section). In this case, the ON_OPEN bit of Dazuko access mask is set to on. Close events This file access type is activated if the word 'close' is present in the 'event_mask‘ parameter in the eset.cfg file ([dac] section). In this case, the ON_CLOSE bit and ON_CLOSE_MODIFIED bit of Dazuko access mask is set to on.
  • Page 18: On-Access Scanner Using Preload Libc Library

    This file access type is activated if the word 'open' is present in the 'event_mask‘ parameter in the eset.cfg file ([pac] section). close events This file access type is activated if the word ‘close‘ is present in the ‘event_mask‘ parameter in the eset.cfg file ([pac] section). In this case, all file descriptor and FILE stream close functions of the LIBC are intercepted. exec events This file access type is activated if the word ‘exec‘ is present in the ‘event_mask‘ parameter in the eset.cfg ([pac] section). In this case, all exec functions of the LIBC are intercepted. All opened, ESET File Security...
  • Page 19: Installation And Configuration

    closed and executed files are scanned by the ESETS daemon for viruses. Based on the result of such scans, access to given files is denied or allowed. 5.3.2. Installation and configuration The libesets_pac.so library module is installed using a standard installation mechanism of the preloaded libraries. One has just to define the environment variable ‘LD_PRELOAD‘ with the absolute path to the libesets_pac.so library. For more information, please refer to the ld.so(8) man page. NOTE: It is important that the ‘ LD_PRELOAD‘ environment variable is defined only for the network server daemon processes (ftp, Samba, etc.) that will be under control of the On-access scanner. Generally, preloading LIBC calls for all operating system processes is not recommended, as this can dramatically slow the performance of the system or even cause the system to hang.
  • Page 21: Important Eset File Security Mechanisms

    Chapter 6: Important ESET File Security mechanisms...
  • Page 22: Handle Object Policy

    In this example, the goal is to use the esets_dac module to control the ON_OPEN and ON_ EXEC access events for an external disc mounted under the ”/home” directory. The module can be configured in the [dac] section of the ESETS configuration file. See below: [dac] agent_enabled = yes event_mask = ”open” ctl_incl = ”/home” action_av = ”scan” To specify scan settings for an individual user, the ‘user_config’ parameter must specify the ESET File Security...
  • Page 23: Samples Submission System

    All virus samples collected by the sample submission system will be processed by the ESET virus laboratory and if necessary, added to the ESET virus signature database.
  • Page 24: World Wideweb Interface

    6.5. Remote Administration ESETS supports ESET Remote Administration for file security management in large computer networks. For more information, please read the ESET Remote Administrator Manual. This manual is located on our web site, here: http://download.eset.com/manuals/ESET_ERA_User_Guide_EN.pdf The ESETS Remote Administration Client is part of the main ESETS daemon. For basic set up, specify the address of your ERA Server using the ‘racl_server_addr‘ parameter in the [global]...
  • Page 25: Eset Security System Update

    Chapter 7: ESET Security system update...
  • Page 26: Esets Update Utility

    HTTP server directory path–this is the first place the update utility will search for update modules. The second stage of the update process is the compilation of modules loadable by the ESET Mail Security scanner from those stored in the local mirror. Typically, the following ESETS loading modules are created: loader module (em000.dat), scanner module (em001.dat), virus signature...
  • Page 27: Let Us Know

    Chapter 8: Let us know...
  • Page 28 Guide are unclear or incomplete, please let us know by contacting Customer Care: http://www.eset.com/support We are dedicated to providing the highest level of support and look forward to helping you should you experience any problems concerning this product. ESET File Security...
  • Page 29: Appendix A. Php License

    Appendix A. PHP License...
  • Page 30 INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ESET File Security...

Table of Contents