1 Introduction 1 .......................................................................................................................................
1.1 Key features of the system 1 ..........................................................................................................
2 Release notes 1 ....................................................................................................................................
3 System requirements 1 ........................................................................................................................
3.1 Secure boot 4 ...............................................................................................................................
4 Installation 6 ........................................................................................................................................
4.1 Reinstall 7 ....................................................................................................................................
4.2 Uninstall 7 ....................................................................................................................................
4.3 Mass deployment 8 .......................................................................................................................
5 Activate ESET Server Security for Linux 12 ..........................................................................................
5.1 Where can I find my license 14 .......................................................................................................
5.2 Check the activation status 14 .......................................................................................................
6 Update, upgrade 14 .............................................................................................................................
6.1 Update mirror 16 ..........................................................................................................................
6.2 Automatic product updates 17 .......................................................................................................
7 Using ESET Server Security for Linux 18 ..............................................................................................
7.1 Dashboard 20 ...............................................................................................................................
7.2 Status Overview 22 .......................................................................................................................
7.3 Scans 23 ......................................................................................................................................
7.3 Run On-demand scan from a Terminal window 24 .....................................................................................
7.3 Exclusions 26 .............................................................................................................................
7.3 Detection exclusions criteria 27 .........................................................................................................
7.4 Detections 27 ...............................................................................................................................
7.4 Quarantine 28 ............................................................................................................................
7.4 Filtered Websites 31 .....................................................................................................................
7.5 Sent files 32 .................................................................................................................................
7.5 Submit sample for analysis 32 ...........................................................................................................
7.6 Events 33 .....................................................................................................................................
7.7 Blocked files 34 ............................................................................................................................
8 Configuration 34 ..................................................................................................................................
8.1 Detection engine 35 ......................................................................................................................
8.1 Exclusions 35 .............................................................................................................................
8.1 Detection exclusions 36 ..................................................................................................................
8.1 Add or Edit detection exclusions 37 .....................................................................................................
8.1 Cloud-based protection 39 ...............................................................................................................
8.1 Malware scans 42 ........................................................................................................................
8.1 Remote scanning (ICAP scan) 42 ........................................................................................................
8.2 Update 43 ....................................................................................................................................
8.3 Protections 44 ..............................................................................................................................
8.3 Real-time file system protection 45 .....................................................................................................
8.3 Processes exclusions 46 .................................................................................................................
8.3 ThreatSense parameters 48 .............................................................................................................
8.3 Additional ThreatSense parameters 50 .................................................................................................
8.3 Cleaning levels 50 ........................................................................................................................
8.3 Web access protection 51 ...............................................................................................................
8.3 Excluded applications 52 ................................................................................................................
8.3 Excluded IPs 53 ...........................................................................................................................
8.3 URL address management 53 ...........................................................................................................
8.3 Create new list 54 ........................................................................................................................
8.3 HTTPS traffic scanning 57 ................................................................................................................