Page 4
LIBC. • The system can be configured to notify any user in the event of a detected infiltration. To run efficiently, ESET File Security requires just 16MB of hard disk space and 32MB of RAM. It runs smoothly under the 2.2.x, 2.4.x and 2.6.x Linux OS kernel versions and the 5.x, 6.x FreeBSD OS kernel versions.
Page 6
ESETS ESET Security is a standard acronym for all security products developed by ESET, spol. s r.o. for Linux, BSD and Solaris operating systems. It is also the name (or its part) of the software package containing the products.
Page 7
Solaris: /opt/esets/sbin ESETS object files directory The directory where the relevant ESET File Security object files and libraries are stored. The abbreviation @LIBDIR@ will be used for future references to this directory. The @LIBDIR@ value for the following Operating Systems is listed below:...
Page 10
After a purchase of the ESET Gateway Security, you will get your authorization data (Username/ password and a license key). The data are needed to identify you as our customer, who has right to download updates for ESET Gateway Security. The Username/password data are required for downloading installation package from our website.
Page 12
The structure of ESET File Security is shown in Figure 4-1. The system is comprised of the following parts: CORE The core of ESET File Security is the daemon esets_daemon. The daemon uses ESETS API library libesets.so and ESETS loading modules em00X_xx.dat to provide base system tasks...
Page 13
ESETS daemon as well as default values for the ESETS scanning engine configuration. Parameters in the agent sections are used to define configuration options for all ESET File Security agents and modules. These agents are used to intercept various data types received by the computer and prepare this data for scanning. Note that in addition to the various parameters used for the system configuration, there are also rules governing the organization of the file. For detailed information on the most effective way to organize this file, please refer to the...
This chapter describes the On-demand and On-access scanner configuration which will provide the most effective protection from virus and worm file system infections. ESET File Security's scanning power is derived from the On-demand scanner command 'esets_scan' and the On-access scanner command 'esets_dac'. The Linux version of ESET File Security offers an additional On-access scanner technique which uses the preloaded library module libesets_pac.
Every file system object is scanned based on customizable file access event types. The following event types are supported by the current version: Open events This file access type is activated if the word 'open' is present in the 'event_mask‘ parameter in the eset.cfg file ([dac] section). In this case, the ON_OPEN bit of Dazuko access mask is set to on. Close events This file access type is activated if the word 'close' is present in the 'event_mask‘ parameter in the eset.cfg file ([dac] section). In this case, the ON_CLOSE bit and ON_CLOSE_MODIFIED bit of Dazuko access mask is set to on.
This file access type is activated if the word 'open' is present in the 'event_mask‘ parameter in the eset.cfg file ([pac] section). close events This file access type is activated if the word ‘close‘ is present in the ‘event_mask‘ parameter in the eset.cfg file ([pac] section). In this case, all file descriptor and FILE stream close functions of the LIBC are intercepted. exec events This file access type is activated if the word ‘exec‘ is present in the ‘event_mask‘ parameter in the eset.cfg ([pac] section). In this case, all exec functions of the LIBC are intercepted. All opened, ESET File Security...
closed and executed files are scanned by the ESETS daemon for viruses. Based on the result of such scans, access to given files is denied or allowed. 5.3.2. Installation and configuration The libesets_pac.so library module is installed using a standard installation mechanism of the preloaded libraries. One has just to define the environment variable ‘LD_PRELOAD‘ with the absolute path to the libesets_pac.so library. For more information, please refer to the ld.so(8) man page. NOTE: It is important that the ‘ LD_PRELOAD‘ environment variable is defined only for the network server daemon processes (ftp, Samba, etc.) that will be under control of the On-access scanner. Generally, preloading LIBC calls for all operating system processes is not recommended, as this can dramatically slow the performance of the system or even cause the system to hang.
In this example, the goal is to use the esets_dac module to control the ON_OPEN and ON_ EXEC access events for an external disc mounted under the ”/home” directory. The module can be configured in the [dac] section of the ESETS configuration file. See below: [dac] agent_enabled = yes event_mask = ”open” ctl_incl = ”/home” action_av = ”scan” To specify scan settings for an individual user, the ‘user_config’ parameter must specify the ESET File Security...
All virus samples collected by the sample submission system will be processed by the ESET virus laboratory and if necessary, added to the ESET virus signature database.
6.5. Remote Administration ESETS supports ESET Remote Administration for file security management in large computer networks. For more information, please read the ESET Remote Administrator Manual. This manual is located on our web site, here: http://download.eset.com/manuals/ESET_ERA_User_Guide_EN.pdf The ESETS Remote Administration Client is part of the main ESETS daemon. For basic set up, specify the address of your ERA Server using the ‘racl_server_addr‘ parameter in the [global]...
HTTP server directory path–this is the first place the update utility will search for update modules. The second stage of the update process is the compilation of modules loadable by the ESET Mail Security scanner from those stored in the local mirror. Typically, the following ESETS loading modules are created: loader module (em000.dat), scanner module (em001.dat), virus signature...
Page 28
Guide are unclear or incomplete, please let us know by contacting Customer Care: http://www.eset.com/support We are dedicated to providing the highest level of support and look forward to helping you should you experience any problems concerning this product. ESET File Security...
Page 30
INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ESET File Security...
Need help?
Do you have a question about the FILE SECURITY and is the answer not in the manual?
Questions and answers