Advertisement

Quick Links

w e p r o t e c t d i g i t a l w o r l d s
ESET File Security
Installation Manual
and User Guide

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the FILE SECURITY - ANNEXE 22 and is the answer not in the manual?

Questions and answers

Summary of Contents for ESET FILE SECURITY - ANNEXE 22

  • Page 1 ESET File Security Installation Manual and User Guide...
  • Page 2: Table Of Contents

    ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice. This product includes PHP software, freely available from http://www.
  • Page 3: Introduction

    Chapter 1: Introduction...
  • Page 4 Dear user, you have acquired ESET File Security - the premier security system running under the Linux/BSD/Solaris OS. As you will soon find out, ESET's state-of-the-art scanning engine has unsurpassed scanning speed and detection rates combined with a very small footprint that makes it the ideal choice for any Linux/BSD/Solaris OS server.
  • Page 5: Terminology And Abbreviations

    Chapter 2: Terminology and abbreviations...
  • Page 6 ESETS ESET Security is a standard acronym for all security products developed by ESET, spol. s r.o. for Linux, BSD and Solaris operating systems. It is also the name (or its part) of the software package containing the products.
  • Page 7 Solaris: /opt/esets/sbin ESETS object files directory The directory where the relevant ESET File Security object files and libraries are stored. The abbreviation @LIBDIR@ will be used for future references to this directory. The @LIBDIR@ value for the following Operating Systems is listed below:...
  • Page 9: Installation

    Chapter 3: Installation...
  • Page 10 This data is necessary for both identifying you as our customer and allowing you to download updates for ESET File Security. The username/password data is also required for downloading the initial installation package from our web site. ESET File Security is distributed as a binary file: esets.i386.ext.bin...
  • Page 11: Architecture Overview

    Chapter 4: Architecture Overview...
  • Page 12 The structure of ESET File Security is shown in Figure 4-1. The system is comprised of the following parts: CORE The Core of ESET File Security is the ESETS daemon (esets_daemon). The daemon uses ESETS API library libesets.so and ESETS loading modules em00X_xx.dat to provide base system tasks such as scanning, maintenance of the agent daemon processes, maintenance of the samples submission system, logging, notification, etc. Please refer to the esets_daemon (8) man page...
  • Page 13 After the product is successfully installed, all its configuration components are stored in the ESETS configuration directory. The directory consists of the following files: @ETCDIR@/esets.cfg This is the most important configuration file, as it controls all major aspects of the product‘s functionality.
  • Page 15: Integration With File System Services

    Chapter 5: Integration with File System services...
  • Page 16: On-Demand Scanner

    This chapter describes the On-demand and On-access scanner configuration which will provide the most effective protection from virus and worm file system infections. ESET File Security's scanning power is derived from the On-demand scanner command 'esets_scan' and the On-access scanner command 'esets_dac'. The Linux version of ESET File Security offers an additional On-access scanner technique which uses the preloaded library module libesets_pac.
  • Page 17: Installation And Configuration

    Every file system object is scanned based on customizable file access event types. The following event types are supported by the current version: Open events This file access type is activated if the word 'open' is present in the 'event_mask‘ parameter in the eset.cfg file ([dac] section). In this case, the ON_OPEN bit of Dazuko access mask is set to on. Close events This file access type is activated if the word 'close' is present in the 'event_mask‘ parameter in the eset.cfg file ([dac] section). In this case, the ON_CLOSE bit and ON_CLOSE_MODIFIED bit of Dazuko access mask is set to on.
  • Page 18: On-Access Scanner Using Preload Libc Library

    This file access type is activated if the word 'open' is present in the 'event_mask‘ parameter in the eset.cfg file ([pac] section). close events This file access type is activated if the word ‘close‘ is present in the ‘event_mask‘ parameter in the eset.cfg file ([pac] section). In this case, all file descriptor and FILE stream close functions of the LIBC are intercepted. exec events This file access type is activated if the word ‘exec‘ is present in the ‘event_mask‘ parameter in the eset.cfg ([pac] section). In this case, all exec functions of the LIBC are intercepted.
  • Page 19: Installation And Configuration

    All opened, closed and executed files are scanned by the ESETS daemon for viruses. Based on the result of such scans, access to given files is denied or allowed. 5.3.2. Installation and configuration The libesets_pac.so library module is installed using a standard installation mechanism of the preloaded libraries. One has just to define the environment variable ‘LD_PRELOAD‘ with the absolute path to the libesets_pac.so library.
  • Page 21: Important Eset File Security Mechanisms

    Chapter 6: Important ESET File Security mechanisms...
  • Page 22: Handle Object Policy

    EXEC access events for an external disc mounted under the ”/home” directory. The module can be configured in the [dac] section of the ESETS configuration file. See below: [dac] agent_enabled = yes event_mask = ”open” ctl_incl = ”/home” action_av = ”scan” To specify scan settings for an individual user, the ‘user_config’ parameter must specify the ESET File Security...
  • Page 23: Samples Submission System

    All virus samples collected by the sample submission system will be processed by the ESET virus laboratory and if necessary, added to the ESET virus signature database.
  • Page 24: World Wide Web Interface

    The Web Interface allows user-friendly configuration, administration and license management of ESET Security systems. This module is a separate agent and must be explicitly enabled. To quickly configure the Web Interface, set the following options in the ESETS configuration file and...
  • Page 25: Eset Security System Update

    Chapter 7: ESET Security system update...
  • Page 26: Esets Update Utility

    The second stage of the update process is the compilation of modules loadable by the ESET File Security scanner from those stored in the local mirror. Typically, the following ESETS loading modules are created: loader module (em000.dat), scanner module (em001.dat), virus signature database module (em002.dat), archives support module (em003.dat), advanced heuristics...
  • Page 27: Esets Mirror Http Daemon

    7.3. ESETS mirror http daemon ESETS mirror http daemon is installed automatically with ESET File Security. The http mirror daemon starts if the option 'av_mirror_httpd_enabled' in the [global] section of the ESETS configuration file is set to 'yes' and the Mirror is enabled. Options 'av_mirror_httpd_port' and ´av_mirror_httpd_addr´ define the port (default 2221) and address (default: all local tcp addresses) where the http server listens.
  • Page 29: Let Us Know

    Chapter 8: Let us know...
  • Page 30 Dear user, we hope this Guide has provided you with a thorough understanding of the requirements for ESET File Security installation, configuration and maintenance. However, our goal is to continually improve the quality and effectiveness of our documentation. If you feel that any sections in this Guide are unclear or incomplete, please let us know by contacting Customer Care: http://www.eset.com/support...
  • Page 31: Appendix A. Php License

    Appendix A. PHP License...
  • Page 32 PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ESET File Security...

This manual is also suitable for:

File security

Table of Contents