1 Introduction 1 ...................................................................................................................................................
1.1 Key features of the system 1 ....................................................................................................................
2 Release notes 1 ..............................................................................................................................................
3 System requirements 1 ..............................................................................................................................
4 Installation 2 .....................................................................................................................................................
4.1 Uninstall 3 ....................................................................................................................................................
4.2 Mass deployment 4 .....................................................................................................................................
5 Update, upgrade 7 ........................................................................................................................................
5.1 Update mirror 10 .........................................................................................................................................
6 Activate ESET Endpoint Antivirus 8 for Linux 10 ..........................................................................
6.1 Where can I find my license 11 .................................................................................................................
6.2 Activation status 11 ....................................................................................................................................
7 Using ESET Endpoint Antivirus 8 for Linux 12 ................................................................................
7.1 User interface 12 .........................................................................................................................................
7.2 Scans 13 .......................................................................................................................................................
7.2.1 Exclusions 15 .............................................................................................................................................
7.3 Quarantine 16 ..............................................................................................................................................
7.4 Events 17 ......................................................................................................................................................
7.5 Notifications 18 ...........................................................................................................................................
8 Configuration 18 .............................................................................................................................................
8.1 Detection engine 19 ...................................................................................................................................
8.1.1 Exclusions 19 .............................................................................................................................................
8.1.2 Real-time file system protection 20 ..................................................................................................................
8.1.3 ThreatSense parameters 21 ...........................................................................................................................
8.1.3.1 Additional ThreatSense parameters 23 ...........................................................................................................
8.1.4 Cloud-based protection 23 .............................................................................................................................
8.1.5 Malware scans 25 ........................................................................................................................................
8.1.6 Shared local cache 25 ..................................................................................................................................
8.2 Update 25 .....................................................................................................................................................
8.3 Device control 26 ........................................................................................................................................
8.3.1 Device control rules editor 27 .........................................................................................................................
8.3.2 Device groups 28 ........................................................................................................................................
8.3.3 Adding Device control rules 28 ........................................................................................................................
8.4 Tools 29 ........................................................................................................................................................
8.4.1 Proxy Server 30 ..........................................................................................................................................
8.4.2 Log files 30 ................................................................................................................................................
8.5 User interface 31 .........................................................................................................................................
8.5.1 Application status 31 ....................................................................................................................................
9 Remote Management 31 ............................................................................................................................
10 Use case examples 31 ..............................................................................................................................
10.1 Retrieve module information 31 .............................................................................................................
10.2 Schedule scan 32 ......................................................................................................................................
11 File and folder structure 33 ...................................................................................................................
12 Troubleshooting 35 .....................................................................................................................................
12.1 Collect logs 35 ...........................................................................................................................................
12.2 Using the noexec flag 35 .........................................................................................................................
12.3 Realtime protection cannot start 36 .....................................................................................................
13 Known issues 37 ...........................................................................................................................................
14 Glossary 37 .....................................................................................................................................................