1 Introduction 1 ...................................................................................................................................................
1.1 Key features of the system 1 ....................................................................................................................
2 Release notes 1 ..............................................................................................................................................
3 System requirements 3 ..............................................................................................................................
4 Installation 5 .....................................................................................................................................................
4.1 Uninstall 6 ....................................................................................................................................................
4.2 Mass deployment 6 .....................................................................................................................................
5 Update, upgrade 11 ......................................................................................................................................
5.1 Update mirror 13 .........................................................................................................................................
5.2 Automatic product component updates 14 ............................................................................................
6 Activate ESET File Security for Linux 14 ...........................................................................................
6.1 Where can I find my license 15 .................................................................................................................
6.2 Activation status 15 ....................................................................................................................................
7 Using ESET File Security for Linux 16 .................................................................................................
7.1 Dashboard 18 ...............................................................................................................................................
7.2 Scans 18 .......................................................................................................................................................
7.2.1 Exclusions 21 .............................................................................................................................................
7.3 Detections 24 ...............................................................................................................................................
7.3.1 Quarantine 24 ............................................................................................................................................
7.4 Events 25 ......................................................................................................................................................
8 Configuration 26 .............................................................................................................................................
8.1 Detection engine 26 ...................................................................................................................................
8.1.1 Exclusions 27 .............................................................................................................................................
8.1.2 Real-time file system protection 30 ..................................................................................................................
8.1.3 Cloud-based protection 30 .............................................................................................................................
8.1.4 Malware scans 32 ........................................................................................................................................
8.1.5 ICAP scan 32 ..............................................................................................................................................
8.1.6 Cleaning levels 32 .......................................................................................................................................
8.1.7 Shared local cache 33 ..................................................................................................................................
8.1.8 ThreatSense parameters 33 ...........................................................................................................................
8.1.8.1 Additional ThreatSense parameters 35 ...........................................................................................................
8.2 Update 35 .....................................................................................................................................................
8.3 Tools 35 ........................................................................................................................................................
8.3.1 Proxy Server 35 ..........................................................................................................................................
8.3.2 Web interface 36 .........................................................................................................................................
8.3.3 Log files 36 ................................................................................................................................................
8.3.4 Scheduler 37 ..............................................................................................................................................
8.4 Listen address and port 38 ........................................................................................................................
9 Remote Management 38 ............................................................................................................................
10 Use case examples 38 ..............................................................................................................................
10.1 Integrate ICAP server with EMC Isilon 38 .............................................................................................
10.2 Retrieve module information 40 .............................................................................................................
10.3 Schedule scan 41 ......................................................................................................................................
11 File and folder structure 41 ...................................................................................................................
12 Troubleshooting 44 .....................................................................................................................................
12.1 Collect logs 44 ...........................................................................................................................................
12.2 Forgot my password 45 ...........................................................................................................................
12.3 Update failed 45 ........................................................................................................................................
12.4 Using the noexec flag 45 .........................................................................................................................
12.5 Realtime protection cannot start 46 .....................................................................................................
12.6 Disable Realtime protection at boot 47 ................................................................................................