1 Introduction 1 .......................................................................................................................................
1.1 Key features of the system 1 ..........................................................................................................
2 Release notes 1 ....................................................................................................................................
3 System requirements 2 ........................................................................................................................
3.1 Secure boot 4 ...............................................................................................................................
4 Installation 6 ........................................................................................................................................
4.1 Uninstall 7 ....................................................................................................................................
4.2 Mass deployment 8 .......................................................................................................................
5 Activate ESET Endpoint Antivirus for Linux 12 .....................................................................................
5.1 Where can I find my license 13 .......................................................................................................
5.2 Activation status 13 ......................................................................................................................
6 Update, upgrade 14 .............................................................................................................................
6.1 Update mirror 16 ..........................................................................................................................
7 Using ESET Endpoint Antivirus for Linux 17 .........................................................................................
7.1 User interface 17 ..........................................................................................................................
7.2 Scans 19 ......................................................................................................................................
7.2 Exclusions 22 .............................................................................................................................
7.3 Quarantine 23 ..............................................................................................................................
7.4 Events 24 .....................................................................................................................................
7.5 Notifications 25 ............................................................................................................................
8 Configuration 26 ..................................................................................................................................
8.1 Detection engine 27 ......................................................................................................................
8.1 Exclusions 27 .............................................................................................................................
8.1 Real-time file system protection 29 .....................................................................................................
8.1 ThreatSense parameters 30 .............................................................................................................
8.1 Additional ThreatSense parameters 32 .................................................................................................
8.1 Cloud-based protection 33 ...............................................................................................................
8.1 Malware scans 35 ........................................................................................................................
8.1 Shared local cache 35 ....................................................................................................................
8.2 Update 36 ....................................................................................................................................
8.3 Device control 37 ..........................................................................................................................
8.3 Device control rules editor 38 ...........................................................................................................
8.3 Device groups 39 .........................................................................................................................
8.3 Adding Device control rules 39 ..........................................................................................................
8.4 Tools 41 .......................................................................................................................................
8.4 Proxy Server 41 ..........................................................................................................................
8.4 Log files 41 ...............................................................................................................................
8.5 User interface 43 ..........................................................................................................................
8.5 Application status 43 .....................................................................................................................
9 Remote Management 43 ......................................................................................................................
10 Use case examples 44 .......................................................................................................................
10.1 Retrieve module information 44 ....................................................................................................
10.2 Schedule scan 44 ........................................................................................................................
11 File and folder structure 45 ................................................................................................................
12 Troubleshooting 47 ............................................................................................................................
12.1 Collect logs 48 ............................................................................................................................
12.2 Using the noexec flag 49 ..............................................................................................................
12.3 Realtime protection cannot start 50 ..............................................................................................
13 Glossary 51 ........................................................................................................................................