ESET File Security
Copyright ©2011 by ESET, spol. s r. o.
ESET File Security was developed by ESET, spol. s r. o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be reproduced,
stored in a retrieval system or transmitted in any form or by any
means, electronic, mechanical, photocopying, recording, scanning, or
otherwise without permission in writing from the author.
ESET, spol. s r. o. reserves the right to change any of the described
application software without prior notice.
Customer Care Worldwide: www.eset.eu/support
Customer Care North America: www.eset.com/support
REV. 2011-02-08
Contents
..................................................................3
1. Introduction
.........................................................................................3
Main functionality1.1
.........................................................................................3
Key features of the system1.2
..................................................................5
2. Terminology and abbreviations
..................................................................7
3. Installation
..................................................................8
4. Architecture Overview
..................................................................10
5. Integration with File System services
.........................................................................................10
On-demand scanner5.1
.........................................................................................10
On-access scanner powered by Dazuko5.2
................................................................................10Operation principle5.2.1
................................................................................11Installation and configuration5.2.2
................................................................................11Tips5.2.3
.........................................................................................11
On-access scanner using preload LIBC library5.3
................................................................................12Operation principle5.3.1
................................................................................12Installation and configuration5.3.2
................................................................................12Tips5.3.3
..................................................................13
6. Important ESET File Security mechanisms
.........................................................................................13
Handle Object Policy6.1
.........................................................................................13
User Specific Configuration6.2
.........................................................................................14
Samples Submission System6.3
.........................................................................................14
Web Interface6.4
................................................................................15License management6.4.1
................................................................................16On-Access scanner (DAC) configuration example6.4.2
................................................................................16On-Demand scanner6.4.3
................................................................................17Statistics6.4.4
.........................................................................................17
Remote Administration6.5
................................................................................18Remote Administration usage example6.5.1
.........................................................................................20
Logging6.6
..................................................................21
7. ESET Security system update
.........................................................................................21
ESETS update utility7.1
.........................................................................................21
ESETS update process description7.2
.........................................................................................21
ESETS mirror http daemon7.3
..................................................................22
8. Let us know
..................................................................23
9. Appendix A. PHP License