ESET, spol. s r.o. reserves the right to change any of the described application software without prior notice. This product includes PHP software, freely available from http://www.
Page 4
Dear user, you have acquired ESET File Security - the premier security system running under the Linux/BSD/Solaris OS. As you will soon find out, ESET's state-of-the-art scanning engine has unsurpassed scanning speed and detection rates combined with a very small footprint that makes it the ideal choice for any Linux/BSD/Solaris OS server.
Page 6
ESETS ESET Security is a standard acronym for all security products developed by ESET, spol. s r.o. for Linux, BSD and Solaris operating systems. It is also the name (or its part) of the software package containing the products.
Page 7
Solaris: /opt/esets/sbin ESETS object files directory The directory where the relevant ESET File Security object files and libraries are stored. The abbreviation @LIBDIR@ will be used for future references to this directory. The @LIBDIR@ value for the following Operating Systems is listed below:...
Page 10
This data is necessary for both identifying you as our customer and allowing you to download updates for ESET File Security. The username/password data is also required for downloading the initial installation package from our web site. ESET File Security is distributed as a binary file: esets.i386.ext.bin...
Page 12
The structure of ESET File Security is shown in Figure 4-1. The system is comprised of the following parts: CORE The Core of ESET File Security is the ESETS daemon (esets_daemon). The daemon uses ESETS API library libesets.so and ESETS loading modules em00X_xx.dat to provide base system tasks such as scanning, maintenance of the agent daemon processes, maintenance of the samples submission system, logging, notification, etc. Please refer to the esets_daemon (8) man page...
Page 13
After the product is successfully installed, all its configuration components are stored in the ESETS configuration directory. The directory consists of the following files: @ETCDIR@/esets.cfg This is the most important configuration file, as it controls all major aspects of the product‘s functionality.
This chapter describes the On-demand and On-access scanner configuration which will provide the most effective protection from virus and worm file system infections. ESET File Security's scanning power is derived from the On-demand scanner command 'esets_scan' and the On-access scanner command 'esets_dac'. The Linux version of ESET File Security offers an additional On-access scanner technique which uses the preloaded library module libesets_pac.
Every file system object is scanned based on customizable file access event types. The following event types are supported by the current version: Open events This file access type is activated if the word 'open' is present in the 'event_mask‘ parameter in the eset.cfg file ([dac] section). In this case, the ON_OPEN bit of Dazuko access mask is set to on. Close events This file access type is activated if the word 'close' is present in the 'event_mask‘ parameter in the eset.cfg file ([dac] section). In this case, the ON_CLOSE bit and ON_CLOSE_MODIFIED bit of Dazuko access mask is set to on.
This file access type is activated if the word 'open' is present in the 'event_mask‘ parameter in the eset.cfg file ([pac] section). close events This file access type is activated if the word ‘close‘ is present in the ‘event_mask‘ parameter in the eset.cfg file ([pac] section). In this case, all file descriptor and FILE stream close functions of the LIBC are intercepted. exec events This file access type is activated if the word ‘exec‘ is present in the ‘event_mask‘ parameter in the eset.cfg ([pac] section). In this case, all exec functions of the LIBC are intercepted.
All opened, closed and executed files are scanned by the ESETS daemon for viruses. Based on the result of such scans, access to given files is denied or allowed. 5.3.2. Installation and configuration The libesets_pac.so library module is installed using a standard installation mechanism of the preloaded libraries. One has just to define the environment variable ‘LD_PRELOAD‘ with the absolute path to the libesets_pac.so library.
EXEC access events for an external disc mounted under the ”/home” directory. The module can be configured in the [dac] section of the ESETS configuration file. See below: [dac] agent_enabled = yes event_mask = ”open” ctl_incl = ”/home” action_av = ”scan” To specify scan settings for an individual user, the ‘user_config’ parameter must specify the ESET File Security...
All virus samples collected by the sample submission system will be processed by the ESET virus laboratory and if necessary, added to the ESET virus signature database.
The Web Interface allows user-friendly configuration, administration and license management of ESET Security systems. This module is a separate agent and must be explicitly enabled. To quickly configure the Web Interface, set the following options in the ESETS configuration file and...
The second stage of the update process is the compilation of modules loadable by the ESET File Security scanner from those stored in the local mirror. Typically, the following ESETS loading modules are created: loader module (em000.dat), scanner module (em001.dat), virus signature database module (em002.dat), archives support module (em003.dat), advanced heuristics...
7.3. ESETS mirror http daemon ESETS mirror http daemon is installed automatically with ESET File Security. The http mirror daemon starts if the option 'av_mirror_httpd_enabled' in the [global] section of the ESETS configuration file is set to 'yes' and the Mirror is enabled. Options 'av_mirror_httpd_port' and ´av_mirror_httpd_addr´ define the port (default 2221) and address (default: all local tcp addresses) where the http server listens.
Page 30
Dear user, we hope this Guide has provided you with a thorough understanding of the requirements for ESET File Security installation, configuration and maintenance. However, our goal is to continually improve the quality and effectiveness of our documentation. If you feel that any sections in this Guide are unclear or incomplete, please let us know by contacting Customer Care: http://www.eset.com/support...
Page 32
PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. ESET File Security...
Need help?
Do you have a question about the FILE SECURITY - ANNEXE 22 and is the answer not in the manual?
Questions and answers