1 Introduction 1 .......................................................................................................................................
1.1 Key features of the system 1 ..........................................................................................................
2 System requirements 1 ........................................................................................................................
2.1 Secure boot 3 ...............................................................................................................................
3 Installation 5 ........................................................................................................................................
3.1 Uninstall 6 ....................................................................................................................................
3.2 Mass deployment 6 .......................................................................................................................
4 Activate ESET Endpoint Antivirus for Linux 11 .....................................................................................
4.1 Where can I find my license 12 .......................................................................................................
4.2 Activation status 12 ......................................................................................................................
5 Update, upgrade 13 .............................................................................................................................
5.1 Update mirror 15 ..........................................................................................................................
6 Using ESET Endpoint Antivirus for Linux 16 .........................................................................................
6.1 User interface 16 ..........................................................................................................................
6.2 Scans 18 ......................................................................................................................................
6.2 Exclusions 20 .............................................................................................................................
6.3 Quarantine 21 ..............................................................................................................................
6.4 Events 23 .....................................................................................................................................
6.5 Notifications 24 ............................................................................................................................
7 Configuration 24 ..................................................................................................................................
7.1 Detection engine 25 ......................................................................................................................
7.1 Exclusions 26 .............................................................................................................................
7.1 Real-time file system protection 27 .....................................................................................................
7.1 ThreatSense parameters 29 .............................................................................................................
7.1 Additional ThreatSense parameters 31 .................................................................................................
7.1 Cloud-based protection 31 ...............................................................................................................
7.1 Malware scans 34 ........................................................................................................................
7.1 Shared local cache 34 ....................................................................................................................
7.2 Update 34 ....................................................................................................................................
7.3 Device control 35 ..........................................................................................................................
7.3 Device control rules editor 36 ...........................................................................................................
7.3 Device groups 38 .........................................................................................................................
7.3 Adding Device control rules 38 ..........................................................................................................
7.4 Tools 40 .......................................................................................................................................
7.4 Proxy Server 40 ..........................................................................................................................
7.4 Log files 40 ...............................................................................................................................
7.5 User interface 41 ..........................................................................................................................
7.5 Application status 42 .....................................................................................................................
8 Remote Management 42 ......................................................................................................................
9 Use case examples 42 .........................................................................................................................
9.1 Retrieve module information 42 .....................................................................................................
9.2 Schedule scan 43 ..........................................................................................................................
10 File and folder structure 43 ................................................................................................................
11 Troubleshooting 46 ............................................................................................................................
11.1 Collect logs 46 ............................................................................................................................
11.2 Using the noexec flag 47 ..............................................................................................................
11.3 Realtime protection cannot start 48 ..............................................................................................
12 Glossary 49 ........................................................................................................................................
13 End User License Agreement 49 ........................................................................................................