1 Introduction 1 .......................................................................................................................................
1.1 Key features of the system 1 ..........................................................................................................
2 Release notes 1 ....................................................................................................................................
3 System requirements 1 ........................................................................................................................
3.1 Secure boot 4 ...............................................................................................................................
4 Installation 6 ........................................................................................................................................
4.1 Reinstall 7 ....................................................................................................................................
4.2 Uninstall 7 ....................................................................................................................................
4.3 Mass deployment 8 .......................................................................................................................
5 Activate ESET Server Security for Linux 12 ..........................................................................................
5.1 Where can I find my license 14 .......................................................................................................
5.2 Check the activation status 14 .......................................................................................................
6 Update, upgrade 14 .............................................................................................................................
6.1 Update mirror 16 ..........................................................................................................................
6.2 Automatic product updates 17 .......................................................................................................
7 Using ESET Server Security for Linux 18 ..............................................................................................
7.1 Dashboard 20 ...............................................................................................................................
7.2 Detections 22 ...............................................................................................................................
7.3 Scans 23 ......................................................................................................................................
7.3 Run On-demand scan from a Terminal window 24 .....................................................................................
7.3 Exclusions 25 .............................................................................................................................
7.3 Detection exclusions criteria 27 .........................................................................................................
7.4 Events 27 .....................................................................................................................................
7.5 Quarantine 28 ..............................................................................................................................
7.6 Status Overview 31 .......................................................................................................................
7.6 Sent files 32 ..............................................................................................................................
7.6 Submit sample for analysis 32 ...........................................................................................................
7.6 Blocked files 33 ...........................................................................................................................
7.6 Filtered Websites 33 .....................................................................................................................
7.6 Network Protection 34 ...................................................................................................................
8 Configuration 34 ..................................................................................................................................
8.1 Detection engine 35 ......................................................................................................................
8.1 Exclusions 35 .............................................................................................................................
8.1 Detection exclusions 36 ..................................................................................................................
8.1 Add or Edit detection exclusions 38 .....................................................................................................
8.1 Cloud-based protection 39 ...............................................................................................................
8.1 Malware scans 42 ........................................................................................................................
8.1 Remote scanning (ICAP scan) 42 ........................................................................................................
8.2 Update 43 ....................................................................................................................................
8.3 Protections 44 ..............................................................................................................................
8.3 Real-time file system protection 45 .....................................................................................................
8.3 Processes exclusions 46 .................................................................................................................
8.3 ThreatSense parameters 48 .............................................................................................................
8.3 Additional ThreatSense parameters 50 .................................................................................................
8.3 Cleaning levels 50 ........................................................................................................................
8.3 Web access protection 51 ...............................................................................................................
8.3 Excluded applications 52 ................................................................................................................
8.3 Excluded IPs 53 ...........................................................................................................................
8.3 URL address management 53 ...........................................................................................................
8.3 Create new list 54 ........................................................................................................................