1 Introduction 1 ...................................................................................................................................................
1.1 Key features of the system 1 ....................................................................................................................
2 Release notes 1 ..............................................................................................................................................
3 System requirements 2 ..............................................................................................................................
3.1 Secure boot 3 ..............................................................................................................................................
4 Installation 5 .....................................................................................................................................................
4.1 Reinstall 6 ....................................................................................................................................................
4.2 Uninstall 6 ....................................................................................................................................................
4.3 Mass deployment 6 .....................................................................................................................................
5 Update, upgrade 10 ......................................................................................................................................
5.1 Update mirror 12 .........................................................................................................................................
5.2 Automatic product updates 12 .................................................................................................................
6 Activate ESET File Security 8 for Linux 13 .......................................................................................
6.1 Where can I find my license 14 .................................................................................................................
6.2 Activation status 15 ....................................................................................................................................
7 Using ESET File Security 8 for Linux 15 .............................................................................................
7.1 Dashboard 17 ...............................................................................................................................................
7.2 Scans 17 .......................................................................................................................................................
7.2.1 Exclusions 20 .............................................................................................................................................
7.2.2 Detection exclusions criteria 21 ......................................................................................................................
7.3 Detections 21 ...............................................................................................................................................
7.3.1 Quarantine 21 ............................................................................................................................................
7.4 Events 23 ......................................................................................................................................................
7.5 Submit sample for analysis 24 ..................................................................................................................
8 Configuration 25 .............................................................................................................................................
8.1 Detection engine 25 ...................................................................................................................................
8.1.1 Shared local cache 25 ..................................................................................................................................
8.1.2 Exclusions 26 .............................................................................................................................................
8.1.2.1 Processes exclusions 27 .............................................................................................................................
8.1.2.2 Detection exclusions 28 ..............................................................................................................................
8.1.2.2.1 Add or Edit detection exclusions 29 .............................................................................................................
8.1.3 Real-time file system protection 31 ..................................................................................................................
8.1.4 ThreatSense parameters 31 ...........................................................................................................................
8.1.4.1 Additional ThreatSense parameters 33 ...........................................................................................................
8.1.5 Cloud-based protection 34 .............................................................................................................................
8.1.6 Malware scans 35 ........................................................................................................................................
8.1.7 Remote scanning (ICAP scan) 35 .....................................................................................................................
8.1.8 Cleaning levels 35 .......................................................................................................................................
8.2 Update 36 .....................................................................................................................................................
8.3 Tools 36 ........................................................................................................................................................
8.3.1 Proxy Server 37 ..........................................................................................................................................
8.3.2 Web interface 37 .........................................................................................................................................
8.3.2.1 Listen address and port 38 ..........................................................................................................................
8.3.3 Log files 38 ................................................................................................................................................
8.3.4 Scheduler 38 ..............................................................................................................................................
8.4 User interface 39 .........................................................................................................................................
8.4.1 Statuses 39 ...............................................................................................................................................
9 Remote Management 40 ............................................................................................................................
10 Use case examples 40 ..............................................................................................................................
10.1 Integrate ICAP server with EMC Isilon 40 .............................................................................................
10.2 Retrieve module information 42 .............................................................................................................
10.3 Schedule scan 42 ......................................................................................................................................