Contents
.......................................................5Preface1.
.......................................................7Overview2.
....................................................................................................7Key Features2.1
....................................................................................................8What's new2.2
....................................................................................................9Deployment2.3
..............................................................................9SharePoint Farm deployment
2.3.1
..............................................................................10Insta lla tion in a clus ter environment
2.3.2
....................................................................................................10Types of SharePoint protection2.4
..............................................................................10Integration into the SharePoint
2.4.1
..................................................................................10On-access filter
2.4.1.1
..................................................................................11On-dema nd da tabase scan
2.4.1.2
.......................................................13Preparing for installation3.
....................................................................................................14System requirements3.1
....................................................................................................15SHA-2 required compatibility3.2
....................................................................................................16
ESET Security for Microsoft SharePoint
installation steps
3.3
..............................................................................19Modifying an existing installation
3.3.1
....................................................................................................20Silent / Unattended installation3.4
..............................................................................21Command line installation
3.4.1
....................................................................................................25Product activation3.5
..............................................................................26ESET Business Account
3.5.1
..............................................................................26Activation s uccessful
3.5.2
..............................................................................26Activation failure
3.5.3
..............................................................................26License
3.5.4
....................................................................................................27Upgrading to a newer version3.6
..............................................................................28Upgrading via ESMC
3.6.1
..............................................................................31Upgrading via ESET Clus ter
3.6.2
....................................................................................................33Terminal server3.7
.......................................................34Getting started4.
....................................................................................................34
Managed via ESET Security Management
Center
4.1
....................................................................................................35Monitoring4.2
..............................................................................36Status
4.2.1
..............................................................................39Windows update a vaila ble
4.2.2
..............................................................................39Network isola tion
4.2.3
.......................................................41Using ESET Security for Microsoft SharePoint5.
....................................................................................................41Scan5.1
..............................................................................43Scan window and sca n log
5.1.1
....................................................................................................45Log files5.2
..............................................................................47Log filtering
5.2.1
....................................................................................................49Update5.3
....................................................................................................51Setup5.4
..............................................................................52Server
5.4.1
..............................................................................52Computer
5.4.2
..............................................................................53Network
5.4.3
..................................................................................53Network troubles hooting wizard
5.4.3.1
..............................................................................53Web and ema il
5.4.4
..............................................................................54Tools - Diagnostic logging
5.4.5
..............................................................................55Import and export settings
5.4.6
....................................................................................................55Tools5.5
..............................................................................57Running processes
5.5.1
..............................................................................58Watch activity
5.5.2
..............................................................................60Protection s tatistics
5.5.3
..............................................................................61Cluster
5.5.4
..................................................................................62Cluster wizard - Select nodes
5.5.4.1
..................................................................................63Cluster wizard - Cluster settings
5.5.4.2
..................................................................................64Cluster wizard - Cluster setup settings
5.5.4.3
..................................................................................64Cluster wizard - Nodes check
5.5.4.4
..................................................................................67Cluster wizard - Nodes ins tall
5.5.4.5
..............................................................................69ESET Shell
5.5.5
..................................................................................71Usage
5.5.5.1
..................................................................................76Commands
5.5.5.2
..................................................................................79Batch files / Scripting
5.5.5.3
..............................................................................80ESET SysInspector
5.5.6
..............................................................................80ESET SysRes cue Live
5.5.7
..............................................................................81Scheduler
5.5.8
..................................................................................82Scheduler - Add task
5.5.8.1
........................................................................84Task type
5.5.8.1.1
........................................................................84Task timing
5.5.8.1.2
........................................................................85Event triggered
5.5.8.1.3
........................................................................85Run application
5.5.8.1.4
........................................................................85Skipped task
5.5.8.1.5
........................................................................85Scheduled tas k overview
5.5.8.1.6
..............................................................................86Submit samples for analysis
5.5.9
..................................................................................86Sus picious file
5.5.9.1
..................................................................................87Sus picious s ite
5.5.9.2
..................................................................................87False positive file
5.5.9.3
..................................................................................87False positive site
5.5.9.4
..................................................................................88Other
5.5.9.5
..............................................................................88Quarantine
5.5.10
.......................................................90Server protection settings6.
....................................................................................................91Performance Counters6.1
....................................................................................................93On-access filter6.2
..............................................................................94Antivirus and antispyware
6.2.1
....................................................................................................95On-demand database scan6.3
..............................................................................96On-demand da tabase sca n targets
6.3.1
..................................................................................97Antivirus a nd antispyware
6.3.1.1
....................................................................................................97Rules6.4
..............................................................................97Rules list
6.4.1
..................................................................................99Rule wizard
6.4.1.1
........................................................................100Rule condition
6.4.1.1.1
........................................................................101Rule action
6.4.1.1.2
.......................................................103General settings7.
....................................................................................................103Computer7.1
..............................................................................105Machine lea rning protection
7.1.1
..............................................................................107Exclusions
7.1.2