Installation manual
ESET FILE SECURITY
Copyright ©2013 by ESET, spol. s r. o.
ESET File Security was developed by ESET, spol. s r. o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be reproduced,
stored in a retrieval system or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning, or
otherwise without permission in writing from the author.
ESET, spol. s r. o. reserves the right to change any of the described
application software without prior notice.
Worldwide Customer Support: www.eset.com/support
REV. 7/2/2013
Contents
..................................................................31. Introduction
.........................................................................................3
Main functionality1.1
.........................................................................................3
Key features of the system1.2
..................................................................52. Terminology and abbreviations
..................................................................63. System requirements
..................................................................74. Installation
..................................................................95. Architecture Overview
..................................................................116. Integration with File System services
.........................................................................................11
On-demand scanner6.1
.........................................................................................11
On-access scanner using preload LIBC library6.2
...........................................................................11Operation principle6.2.1
...........................................................................12Installation and configuration6.2.2
...........................................................................12Tips6.2.3
.........................................................................................12
On-access scanner powered by Dazuko6.3
...........................................................................12Operation principle6.3.1
...........................................................................13Installation and configuration6.3.2
...........................................................................13Tips6.3.3
..................................................................147. Important ESET File Security mechanisms
.........................................................................................14
Handle Object Policy7.1
.........................................................................................14
User Specific Configuration7.2
.........................................................................................15
Samples Submission System7.3
.........................................................................................15
Scheduler7.4
.........................................................................................16
Web Interface7.5
...........................................................................16License management7.5.1
...........................................................................17On-Access scanner (DAC) configuration example7.5.2
...........................................................................18On-Demand scanner7.5.3
...........................................................................18Scheduler7.5.4
...........................................................................19Statistics7.5.5
.........................................................................................19
Remote Administration7.6
...........................................................................20Remote Administration usage example7.6.1
.........................................................................................22
Logging7.7
.........................................................................................22
Command-line scripts7.8
..................................................................238. ESET Security system update
.........................................................................................23
ESETS update utility8.1
.........................................................................................23
ESETS update process description8.2
.........................................................................................23
ESETS mirror http daemon8.3
..................................................................249. Let us know
..................................................................2510. Appendix A. PHP License