1 Introduction 1 .......................................................................................................................................
1.1 Key features of the system 1 ..........................................................................................................
2 Release notes 1 ....................................................................................................................................
3 System requirements 1 ........................................................................................................................
3.1 Secure boot 3 ...............................................................................................................................
4 Installation 5 ........................................................................................................................................
4.1 Reinstall 7 ....................................................................................................................................
4.2 Uninstall 7 ....................................................................................................................................
4.3 Mass deployment 8 .......................................................................................................................
5 Activate ESET Server Security for Linux 12 ..........................................................................................
5.1 Where can I find my license 14 .......................................................................................................
5.2 Check the activation status 14 .......................................................................................................
6 Update, upgrade 14 .............................................................................................................................
6.1 Update mirror 16 ..........................................................................................................................
6.2 Automatic product updates 17 .......................................................................................................
7 Using ESET Server Security for Linux 18 ..............................................................................................
7.1 Dashboard 20 ...............................................................................................................................
7.2 Status Overview 22 .......................................................................................................................
7.3 Scans 23 ......................................................................................................................................
7.3 Run On-demand scan from a Terminal window 24 .....................................................................................
7.3 Exclusions 26 .............................................................................................................................
7.3 Detection exclusions criteria 27 .........................................................................................................
7.4 Detections 27 ...............................................................................................................................
7.4 Quarantine 28 ............................................................................................................................
7.5 Sent files 31 .................................................................................................................................
7.5 Submit sample for analysis 31 ...........................................................................................................
7.6 Events 32 .....................................................................................................................................
7.7 Blocked files 33 ............................................................................................................................
8 Configuration 33 ..................................................................................................................................
8.1 Detection engine 34 ......................................................................................................................
8.1 Exclusions 35 .............................................................................................................................
8.1 Processes exclusions 36 .................................................................................................................
8.1 Detection exclusions 38 ..................................................................................................................
8.1 Add or Edit detection exclusions 39 .....................................................................................................
8.1 Real-time file system protection 40 .....................................................................................................
8.1 ThreatSense parameters 42 .............................................................................................................
8.1 Additional ThreatSense parameters 44 .................................................................................................
8.1 Cloud-based protection 44 ...............................................................................................................
8.1 Malware scans 47 ........................................................................................................................
8.1 Remote scanning (ICAP scan) 48 ........................................................................................................
8.1 Cleaning levels 48 ........................................................................................................................
8.2 Update 48 ....................................................................................................................................
8.3 Tools 49 .......................................................................................................................................
8.3 Proxy Server 50 ..........................................................................................................................
8.3 Web interface 50 .........................................................................................................................
8.3 Listen address and port 51 ..............................................................................................................
8.3 Log files 51 ...............................................................................................................................
8.3 Scheduler 52 .............................................................................................................................
8.4 User interface 53 ..........................................................................................................................
8.4 Statuses 53 ...............................................................................................................................