1 Introduction 1 .......................................................................................................................................
1.1 Key features of the system 1 ..........................................................................................................
2 Release notes 1 ....................................................................................................................................
3 System requirements 3 ........................................................................................................................
4 Installation 5 ........................................................................................................................................
4.1 Uninstall 7 ....................................................................................................................................
4.2 Mass deployment 7 .......................................................................................................................
5 Update, upgrade 13 .............................................................................................................................
5.1 Update mirror 15 ..........................................................................................................................
5.2 Automatic product component updates 15 .......................................................................................
6 Activate ESET File Security for Linux 16 ...............................................................................................
6.1 Where can I find my license 17 .......................................................................................................
6.2 Activation status 18 ......................................................................................................................
7 Using ESET File Security for Linux 18 ...................................................................................................
7.1 Dashboard 20 ...............................................................................................................................
7.2 Scans 21 ......................................................................................................................................
7.2 On-Demand Scan via Terminal 22 .......................................................................................................
7.2 Exclusions 23 .............................................................................................................................
7.3 Detections 27 ...............................................................................................................................
7.3 Quarantine 27 ............................................................................................................................
7.4 Events 29 .....................................................................................................................................
8 Configuration 30 ..................................................................................................................................
8.1 Detection engine 30 ......................................................................................................................
8.1 Exclusions 31 .............................................................................................................................
8.1 Real-time file system protection 34 .....................................................................................................
8.1 Cloud-based protection 35 ...............................................................................................................
8.1 Malware scans 37 ........................................................................................................................
8.1 ICAP scan 37 ..............................................................................................................................
8.1 Cleaning levels 37 ........................................................................................................................
8.1 Shared local cache 38 ....................................................................................................................
8.1 ThreatSense parameters 38 .............................................................................................................
8.1 Additional ThreatSense parameters 40 .................................................................................................
8.2 Update 41 ....................................................................................................................................
8.3 Tools 41 .......................................................................................................................................
8.3 Proxy Server 41 ..........................................................................................................................
8.3 Web interface 41 .........................................................................................................................
8.3 Log files 43 ...............................................................................................................................
8.3 Scheduler 44 .............................................................................................................................
8.4 Listen address and port 44 .............................................................................................................
9 Remote Management 45 ......................................................................................................................
10 Use case examples 45 .......................................................................................................................
10.1 Integrate ICAP server with EMC Isilon 45 .......................................................................................
10.2 Retrieve module information 47 ....................................................................................................
10.3 Schedule scan 47 ........................................................................................................................
11 File and folder structure 48 ................................................................................................................
12 Troubleshooting 51 ............................................................................................................................
12.1 Collect logs 51 ............................................................................................................................
12.2 Forgot my password 52 ................................................................................................................
12.3 Update failed 53 .........................................................................................................................