1 Introduction 1 ...................................................................................................................................................
1.1 Key features of the system 1 ....................................................................................................................
2 Release notes 1 ..............................................................................................................................................
3 System requirements 2 ..............................................................................................................................
4 Installation 2 .....................................................................................................................................................
4.1 Uninstall 3 ....................................................................................................................................................
4.2 Mass deployment 4 .....................................................................................................................................
5 Update, upgrade 9 ........................................................................................................................................
5.1 Update mirror 11 .........................................................................................................................................
6 Activate ESET Endpoint Antivirus for Linux 12 ..............................................................................
6.1 Where can I find my license 13 .................................................................................................................
6.2 Activation status 13 ....................................................................................................................................
7 Using ESET Endpoint Antivirus for Linux 14 ....................................................................................
7.1 Scans 14 .......................................................................................................................................................
7.1.1 Exclusions 17 .............................................................................................................................................
7.2 Quarantine 18 ..............................................................................................................................................
7.3 Events 19 ......................................................................................................................................................
8 Configuration 20 .............................................................................................................................................
8.1 Detection engine 21 ...................................................................................................................................
8.1.1 Exclusions 21 .............................................................................................................................................
8.1.2 Real-time file system protection 22 ..................................................................................................................
8.1.3 Cloud-based protection 23 .............................................................................................................................
8.1.4 Malware scans 24 ........................................................................................................................................
8.1.5 Shared local cache 24 ..................................................................................................................................
8.1.6 ThreatSense parameters 25 ...........................................................................................................................
8.1.6.1 Additional ThreatSense parameters 27 ...........................................................................................................
8.2 Update 27 .....................................................................................................................................................
8.3 Device control 27 ........................................................................................................................................
8.3.1 Device control rules editor 28 .........................................................................................................................
8.3.2 Device groups 29 ........................................................................................................................................
8.3.3 Adding Device control rules 29 ........................................................................................................................
8.4 Tools 31 ........................................................................................................................................................
8.4.1 Proxy Server 31 ..........................................................................................................................................
8.4.2 Log files 31 ................................................................................................................................................
8.5 User interface 32 .........................................................................................................................................
9 Remote Management 32 ............................................................................................................................
10 Use case examples 32 ..............................................................................................................................
10.1 Retrieve module information 32 .............................................................................................................
10.2 Schedule scan 33 ......................................................................................................................................
11 File and folder structure 34 ...................................................................................................................
12 Troubleshooting 37 .....................................................................................................................................
12.1 Collect logs 37 ...........................................................................................................................................
12.2 Using the noexec flag 37 .........................................................................................................................
12.3 Realtime protection cannot start 38 .....................................................................................................
13 Known issues 39 ...........................................................................................................................................
14 Glossary 40 .....................................................................................................................................................
15 End User License Agreement 40 .........................................................................................................
16 Privacy Policy 46 ..........................................................................................................................................