1 Introduction to ESET File Security 1 ....................................................................................................
1.1 Main functionality 1 ....................................................................................................................................
1.2 Key features of the system 1 ....................................................................................................................
1.3 What's new 2 ...............................................................................................................................................
2 Terminology and abbreviations 4 .........................................................................................................
3 System requirements 5 ..............................................................................................................................
4 Installation 6 .....................................................................................................................................................
4.1 Upgrading to a more recent version 8 ....................................................................................................
4.2 Uninstall 8 ....................................................................................................................................................
5 Architecture Overview 8 ............................................................................................................................
6 Integration with File System services 10 ..........................................................................................
6.1 On-demand scanner 10 ..............................................................................................................................
6.2 On-access scanner using preload LIBC library 10 ..................................................................................
6.2.1 Operation principle 10 ..................................................................................................................................
6.2.2 Installation and configuration 11 .....................................................................................................................
6.2.3 Tips 11 .....................................................................................................................................................
6.3 On-access scanner powered by Dazuko 11 .............................................................................................
6.3.1 Operation principle 12 ..................................................................................................................................
6.3.2 Installation and configuration 12 .....................................................................................................................
6.3.3 Tips 12 .....................................................................................................................................................
6.4 Handle Object Policy 13 .............................................................................................................................
6.5 User Specific Configuration 14 ..................................................................................................................
6.6 Samples Submission System 15 ...............................................................................................................
6.7 Scheduler 15 ................................................................................................................................................
6.8 Web Interface 16 .........................................................................................................................................
6.8.1 License management 17 ...............................................................................................................................
6.8.2 On-Access scanner (DAC) configuration example 18 .............................................................................................
6.8.3 On-Demand scanner 19 ................................................................................................................................
6.8.4 Scheduler 20 ..............................................................................................................................................
6.8.5 Statistics 20 ...............................................................................................................................................
6.9 Remote Administration 21 .........................................................................................................................
6.9.1 Connecting with ESET Remote Administrator 21 ..................................................................................................
6.9.2 ESET Remote Administrator usage example (6.1 and later) 22 ................................................................................
6.9.3 ESET Remote Administrator usage example (5.x) 24 .............................................................................................
6.10 Logging 26 .................................................................................................................................................
6.11 Command-line programs 27 ....................................................................................................................
7 Enable systemwide real-time protection 27 ...................................................................................
7.1 ESETS update utility 28 ..............................................................................................................................
7.2 ESETS update process description 28 .....................................................................................................
7.3 ESETS mirror http daemon 29 ...................................................................................................................
8 Let us know 29 .................................................................................................................................................
8.1 Setting ESETS $PATH environment variable 29 .....................................................................................
8.2 Setting ESETS for Samba (Ubuntu upstart) 30 ......................................................................................
9 End User License Agreement 30 ............................................................................................................
9.1 Appendix A. PHP License 36 ......................................................................................................................
10 Privacy Policy 36 ..........................................................................................................................................