ESET File Security
Copyright ©2011 by ESET, spol. s r. o.
ESET File Security was developed by ESET, spol. s r. o.
For more information visit www.es et.com.
All rights res erved. No part of this documentation ma y be reproduce d,
stored in a retri eva l syste m or transmi tte d in any form or by any
mea ns, ele ctronic, mecha nical , photocopying, recording, scanning, or
othe rwis e without permis sion in wri ting from the author.
ESET, spol . s r. o. res erve s the right to cha nge any of the describe d
applic ation software without prior notic e.
Customer Care Worldwide : www.es et.eu/support
Customer Care North America: www.e se t.com/support
REV. 2011-02 -08
Contents
..................................................................3
1. Introduction
.........................................................................................3
Mai n functionali ty1.1
.........................................................................................3
Key features of the sys tem1.2
..................................................................5
2. Terminology and abbreviations
..................................................................7
3. Installation
..................................................................8
4. Architecture Overview
..................................................................10
5. Integration with File System services
.........................................................................................10
On-demand scanner5.1
.........................................................................................10
On-access scanner powered by Dazuko5.2
................................................................................10Opera tion principle5.2.1
................................................................................11Installa tion and configuration5.2.2
................................................................................11Tips5.2.3
.........................................................................................11
On-access scanner us ing prel oad LIBC l ibra ry5.3
................................................................................12Opera tion principle5.3.1
................................................................................12Installa tion and configuration5.3.2
................................................................................12Tips5.3.3
..................................................................13
6. Important ESET File Security mechanisms
.........................................................................................13
Handle Object Pol i cy6.1
.........................................................................................13
User Speci fi c Configura tion6.2
.........................................................................................14
Sampl es Submis sion Sys tem6.3
.........................................................................................14
Web Interface6.4
................................................................................15Licens e ma nagement6.4.1
................................................................................16On-Access scanner (DAC) configuration example6.4.2
................................................................................16On-Dema nd scanner6.4.3
................................................................................17Statis tic s6.4.4
.........................................................................................17
Remote Admini s tration6.5
................................................................................18Remote Admini stration us age example6.5.1
.........................................................................................20
Logging6.6
..................................................................21
7. ESET Security system update
.........................................................................................21
ESETS update utility7.1
.........................................................................................21
ESETS update process description7.2
.........................................................................................21
ESETS mirror http daemon7.3
..................................................................22
8. Let us know
..................................................................23
9. Appendix A. PHP License