ESET Security for Microsoft SharePoint 7.0 Owner's manual

Category
Antivirus security software
Type
Owner's manual

This manual is also suitable for

ESET SECURITY
FOR MICROSOFT SHAREPOINT SERVER
Installation Manual and User Guide
Microsoft® Windows® Server 2008 R2 SP1 / 2012 / 2012 R2 / 2016 / 2019
Click here to display Online help version of this document
ESET SECURITY
Copyright ©2021 by ESET, spol. s r.o.
ESET Security for Microsoft SharePoint wa s de ve l ope d by ESET, spol. s r.o.
For more information visit www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a
retrieval system or transmitted in any form or by any means, electronic, mechanical,
photocopying, recording, scanning, or otherwise without permission in writing from
the author.
ESET, spol. s r.o. reserves the right to change any of the described application software
without prior notice.
Customer Care: www.eset.com/support
REV. 1/8/2021
Contents
.......................................................5Preface1.
.......................................................7Overview2.
....................................................................................................7Key Features2.1
....................................................................................................8What's new2.2
....................................................................................................9Deployment2.3
..............................................................................9SharePoint Farm deployment
2.3.1
..............................................................................10Insta lla tion in a clus ter environment
2.3.2
....................................................................................................10Types of SharePoint protection2.4
..............................................................................10Integration into the SharePoint
2.4.1
..................................................................................10On-access filter
2.4.1.1
..................................................................................11On-dema nd da tabase scan
2.4.1.2
.......................................................13Preparing for installation3.
....................................................................................................14System requirements3.1
....................................................................................................15SHA-2 required compatibility3.2
....................................................................................................16
ESET Security for Microsoft SharePoint
installation steps
3.3
..............................................................................19Modifying an existing installation
3.3.1
....................................................................................................20Silent / Unattended installation3.4
..............................................................................21Command line installation
3.4.1
....................................................................................................25Product activation3.5
..............................................................................26ESET Business Account
3.5.1
..............................................................................26Activation s uccessful
3.5.2
..............................................................................26Activation failure
3.5.3
..............................................................................26License
3.5.4
....................................................................................................27Upgrading to a newer version3.6
..............................................................................28Upgrading via ESMC
3.6.1
..............................................................................31Upgrading via ESET Clus ter
3.6.2
....................................................................................................33Terminal server3.7
.......................................................34Getting started4.
....................................................................................................34
Managed via ESET Security Management
Center
4.1
....................................................................................................35Monitoring4.2
..............................................................................36Status
4.2.1
..............................................................................39Windows update a vaila ble
4.2.2
..............................................................................39Network isola tion
4.2.3
.......................................................41Using ESET Security for Microsoft SharePoint5.
....................................................................................................41Scan5.1
..............................................................................43Scan window and sca n log
5.1.1
....................................................................................................45Log files5.2
..............................................................................47Log filtering
5.2.1
....................................................................................................49Update5.3
....................................................................................................51Setup5.4
..............................................................................52Server
5.4.1
..............................................................................52Computer
5.4.2
..............................................................................53Network
5.4.3
..................................................................................53Network troubles hooting wizard
5.4.3.1
..............................................................................53Web and ema il
5.4.4
..............................................................................54Tools - Diagnostic logging
5.4.5
..............................................................................55Import and export settings
5.4.6
....................................................................................................55Tools5.5
..............................................................................57Running processes
5.5.1
..............................................................................58Watch activity
5.5.2
..............................................................................60Protection s tatistics
5.5.3
..............................................................................61Cluster
5.5.4
..................................................................................62Cluster wizard - Select nodes
5.5.4.1
..................................................................................63Cluster wizard - Cluster settings
5.5.4.2
..................................................................................64Cluster wizard - Cluster setup settings
5.5.4.3
..................................................................................64Cluster wizard - Nodes check
5.5.4.4
..................................................................................67Cluster wizard - Nodes ins tall
5.5.4.5
..............................................................................69ESET Shell
5.5.5
..................................................................................71Usage
5.5.5.1
..................................................................................76Commands
5.5.5.2
..................................................................................79Batch files / Scripting
5.5.5.3
..............................................................................80ESET SysInspector
5.5.6
..............................................................................80ESET SysRes cue Live
5.5.7
..............................................................................81Scheduler
5.5.8
..................................................................................82Scheduler - Add task
5.5.8.1
........................................................................84Task type
5.5.8.1.1
........................................................................84Task timing
5.5.8.1.2
........................................................................85Event triggered
5.5.8.1.3
........................................................................85Run application
5.5.8.1.4
........................................................................85Skipped task
5.5.8.1.5
........................................................................85Scheduled tas k overview
5.5.8.1.6
..............................................................................86Submit samples for analysis
5.5.9
..................................................................................86Sus picious file
5.5.9.1
..................................................................................87Sus picious s ite
5.5.9.2
..................................................................................87False positive file
5.5.9.3
..................................................................................87False positive site
5.5.9.4
..................................................................................88Other
5.5.9.5
..............................................................................88Quarantine
5.5.10
.......................................................90Server protection settings6.
....................................................................................................91Performance Counters6.1
....................................................................................................93On-access filter6.2
..............................................................................94Antivirus and antispyware
6.2.1
....................................................................................................95On-demand database scan6.3
..............................................................................96On-demand da tabase sca n targets
6.3.1
..................................................................................97Antivirus a nd antispyware
6.3.1.1
....................................................................................................97Rules6.4
..............................................................................97Rules list
6.4.1
..................................................................................99Rule wizard
6.4.1.1
........................................................................100Rule condition
6.4.1.1.1
........................................................................101Rule action
6.4.1.1.2
.......................................................103General settings7.
....................................................................................................103Computer7.1
..............................................................................105Machine lea rning protection
7.1.1
..............................................................................107Exclusions
7.1.2
..................................................................................108Performa nce exclusions
7.1.2.1
..................................................................................109Detection exlusions
7.1.2.2
........................................................................111Crea te exclusion wizard
7.1.2.2.1
..............................................................................111Advanced options
7.1.3
..............................................................................111Automa tic exclusions
7.1.4
..............................................................................112Sha red local ca che
7.1.5
..............................................................................112An infiltration is detected
7.1.6
..............................................................................113Rea l-time file system protection
7.1.7
..................................................................................114ThreatSense pa rameters
7.1.7.1
........................................................................117Additional ThreatSense parameters
7.1.7.1.1
........................................................................117File extenstions excluded from sca nning
7.1.7.1.2
..............................................................................118Processes exclus ions
7.1.8
..............................................................................119Cloud-based protection
7.1.9
..................................................................................121Exclusion filter
7.1.9.1
..............................................................................122Malware scans
7.1.10
..................................................................................123Profile mana ger
7.1.10.1
..................................................................................124Profile ta rgets
7.1.10.2
..................................................................................125Scan targets
7.1.10.3
..................................................................................127Idle-state scan
7.1.10.4
..................................................................................127Startup sca n
7.1.10.5
........................................................................127Automatic startup file check
7.1.10.5.1
..................................................................................128Removable media
7.1.10.6
..................................................................................128Document protection
7.1.10.7
..............................................................................129Hyper-V sca n
7.1.11
..............................................................................130HIPS
7.1.12
..................................................................................132HIPS rule settings
7.1.12.1
..................................................................................135HIPS advanced settings
7.1.12.2
....................................................................................................135Update configuration7.2
..............................................................................138Update rollba ck
7.2.1
..............................................................................138Scheduled Tas k - Upda te
7.2.2
..............................................................................139Update mirror
7.2.3
....................................................................................................141Network protection7.3
..............................................................................142IDS exceptions
7.3.1
..............................................................................142Tempora ry IP a ddress blacklist
7.3.2
....................................................................................................143Web and email7.4
..............................................................................143Protocol filtering
7.4.1
..................................................................................144Web a nd email clients
7.4.1.1
..............................................................................144SSL/TLS
7.4.2
..................................................................................145Lis t of known certificates
7.4.2.1
..................................................................................145Encrypted SSL communication
7.4.2.2
..............................................................................146Email client protection
7.4.3
..................................................................................147Email protocols
7.4.3.1
..................................................................................148Alerts and notifica tions
7.4.3.2
..................................................................................148MS Outlook toolbar
7.4.3.3
..................................................................................148Outlook Express and Windows Mail toolbar
7.4.3.4
..................................................................................149Confirmation dia log
7.4.3.5
..................................................................................149Rescan mes sages
7.4.3.6
..............................................................................149Web access protection
7.4.4
..................................................................................150URL address ma nagement
7.4.4.1
........................................................................151Crea te new list
7.4.4.1.1
..............................................................................152Anti-Phishing web protection
7.4.5
....................................................................................................153Device control7.5
..............................................................................154Device rules
7.5.1
..............................................................................156Device groups
7.5.2
....................................................................................................157Tools configuration7.6
..............................................................................157Time slots
7.6.1
..............................................................................157Microsoft Windows upda te
7.6.2
..............................................................................157ESET CMD
7.6.3
..............................................................................159ESET RMM
7.6.4
..............................................................................160License
7.6.5
..............................................................................160WMI Provider
7.6.6
..................................................................................161Provided data
7.6.6.1
..................................................................................167Accessing Provided Data
7.6.6.2
..............................................................................167ERA/ESMC s can targets
7.6.7
..............................................................................168Override mode
7.6.8
..............................................................................171Log files
7.6.9
..............................................................................172Proxy server
7.6.10
..............................................................................173Notifications
7.6.11
..................................................................................173Application notifications
7.6.11.1
..................................................................................174Desktop notifications
7.6.11.2
..................................................................................174Email notifications
7.6.11.3
..................................................................................175Customization
7.6.11.4
..............................................................................176Presentation mode
7.6.12
..............................................................................176Diagnostics
7.6.13
..................................................................................177Technical support
7.6.13.1
..............................................................................177Cluster
7.6.14
....................................................................................................178User interface7.7
..............................................................................179Alerts and message boxes
7.7.1
..............................................................................180Access setup
7.7.2
..............................................................................180ESET Shell
7.7.3
..............................................................................181Disa ble GUI on Terminal Server
7.7.4
..............................................................................181Disa bled messages and s tatuses
7.7.5
..................................................................................182Application s tatuses settings
7.7.5.1
..............................................................................183System tray icon
7.7.6
....................................................................................................184Revert to default settings7.8
....................................................................................................184Help and support7.9
..............................................................................185Submit support request
7.9.1
..............................................................................186About ESET Security for Microsoft SharePoint
7.9.2
....................................................................................................186Glossary7.10
5
1. Preface
This guide is intended to help you make the best use of ESET Security for Microsoft SharePoint. To learn more about
any window in the program, press F1 on your keyboard with the given window open. The help page related to the
window you are currently viewing will be displayed.
For consistency and to help prevent confusion, terminology used throughout this guide is based on the ESET
Security for Microsoft SharePoint parameter names. We also used a uniform set of symbols to highlight topics of
particular interest or significance.
NOTE
A note is just a short observation. Although you can omit it, notes can provide valuable information, such as
specific features or a link to some related topic.
IMPORTANT
This requires your attention and is not recommended to skip over it. Important notes include significant but
non-critical information.
WARNING
Critical information you should treat with increased caution. Warnings are placed specifically to deter you from
committing potentially harmful mistakes. Please read and understand text placed in warning brackets, as it
references highly sensitive system settings or something risky.
EXAMPLE
This is a use case or a practical example that aims to help you understand how a certain function or feature can
be used.
If you see the following element in the upper-right corner of a help page, it indicates a navigation within the
windows of a graphical user interface (GUI) of ESET Security for Microsoft SharePoint. Use these directions to get to
the window that is being described on the respective help page.
Open ESET Security for Microsoft SharePoint
Click Setup > Server > OneDrive Scan setup > Register
Formatting conventions:
Convention
Meaning
Bold type
Section headings, feature names or user interface items, such as buttons.
Italic type
Placeholders for the information that you provide. For example, file name or path means you type
the actual path or a name of file.
Courier New
Code samples or commands.
6
Convention
Meaning
Hyperlink
Provides quick and easy access to cross-referenced topics or external web locations. Hyperlinks are
highlighted in blue and may be underlined.
%ProgramFiles
%
The Windows system directory which stores installed programs of Windows and others.
ESET Security for Microsoft SharePoint online help pages are divided into several chapters and sub-chapters. You can
find relevant information by browsing the contents of the help pages. Alternatively, you can use full-text search by
typing words or phrases.
7
2. Overview
ESET Security for Microsoft SharePoint is an integrated solution specifically designed for the Microsoft SharePoint
family of products running on Microsoft Windows Server in standalone or farm configuration. It delivers effective
and robust protection against various types of malware, viruses and other infiltrations. ESET Security for Microsoft
SharePoint works by protecting files stored in the SharePoint content database. Both user provided files stored in
document libraries, asset libraries, wiki pages, etc. and ASP pages, (JavaScript) scripts, images, etc. that form the
SharePoint site itself are protected.
ESET Security for Microsoft SharePoint protects your content:
· by filtering during file access (On-access filter)
· using on-demand database scan (On-demand scan)
The on-access filter is run at SharePoint’s discretion and its behavior differs slightly depending on the generation of
SharePoint being used (2010 vs. 2007). In general, on-access filter is run when any file is first accessed and the result
of the scan is cached until the version of the virus database has changed or some time elapses.
On-demand scan hierarchically crawls all the files and directories of a web site that are selected by the
administrator. Files are accessed using the SharePoint object model (.NET based), which provides a unified view of
all content stored on a SharePoint farm and abstracts the actual database server technology used.
Both on-access filter and on-demand scan apply following checks:
· Antivirus and antispyware protection
· User-defined rules with different types of conditions
2.1 Key Features
The following table provides a list of features that are available in the ESET Security for Microsoft SharePoint. ESET
Security for Microsoft SharePoint supports most editions of Microsoft Windows Server 2008 R2 SP1, 2012, 2016 and
2019 in standalone and clustered environments. Remotely manage ESET Security for Microsoft SharePoint in larger
networks with the help of ESET Security Management Center.
True 64-bit product core
Adding higher performance and stability to the product core components.
Performance Counters
ESET Security for Microsoft SharePoint Counters enable you to monitor the overall ESET
Security for Microsoft SharePoint performance.
On-access filter
File protection that works by filtering during file access.
On-demand scan
File protection by database scan, initiated by user or scheduled to run at a certain time.
User defined rules
Allow administrators to create and manage custom rules for file filtering by defining
conditions and actions to take with filtered files.
Automatic exclusions
Automatic detection and exclusion of critical applications and server files for smooth
operation and performance.
Self-Defense
Protects ESET security solutions from being modified or deactivated.
Effective
Troubleshooting
Built-in tools for resolving various issues: ESET SysInspector for system diagnostics and
ESET SysRescue Live to create a bootable rescue CD or USB.
ESET Cluster
ESET server products are able to communicate with each other and exchange data such
as configuration and notifications, as well as synchronize data necessary for correct
operation of a group of product instances. This provides for same configuration of the
8
True 64-bit product core
Adding higher performance and stability to the product core components.
product across the whole cluster. Windows Failover Clusters and Network Load
Balancing (NLB) Clusters are supported by ESET Security for Microsoft SharePoint.
Additionally, you can add ESET Cluster members manually without the need for a
specific Windows Cluster. ESET Clusters work in both domain and workgroup
environments.
Component-based
installation
Choose which components you want to add or remove.
Storage scan
Scans all shared files on a local server. This makes it easy to selectively scan only user
data that is stored on the file server.
Processes exclusions
Excludes specific processes from Antivirus on-access scanning. Due to the critical role of
dedicated servers (application server, storage server, etc.) regular backups are
mandatory to guarantee timely recovery from fatal incidents of any kind. To improve
backup speed, process integrity and service availability, some techniques that are
known to conflict with file-level antivirus protection are used during backup. Similar
problems can occur when attempting live migrations of virtual machines. The only
effective way to avoid both situations is to deactivate antivirus software. By excluding
specific process (for example those of the backup solution) all file operations attributed
to such excluded process are ignored and considered safe, thus minimizing interference
with the backup process. We recommend that you use caution when creating exclusions
a backup tool that has been excluded can access infected files without triggering an
alert which is why extended permissions are only allowed in the real-time protection
module.
eShell (ESET Shell)
eShell 2.0 is now available in ESET Security for Microsoft SharePoint. eShell is a
command line interface that offers advanced users and administrators more
comprehensive options to manage ESET server products.
ESET Security
Management Center
Better integration with ESET Security Management Center including the ability to
schedule On-demand scan. For more information about ESMC, see ESET Security
Manageme nt Ce nter Online help .
Hyper-V scan
Is a new technology that allows for scanning of Virtual Machine (VM) disks on Microsoft
Hyper-V Server without the need of any "Agent" on the particular VM.
2.2 What's new
ESET Security for Microsoft SharePoint introduces the following new features:
· True 64-bit product core
· Direct access to SQL database
· Performance Counters
· ESET Enterprise Inspector support
· ESET RMM
· Network isolation
· Machine learning protection
9
2.3 Deployment
The next chapters will help plan the deployment of ESET Security for Microsoft SharePoint to your SharePoint
infrastructure, especially if you use a SharePoint Server Farm or cluster environment.
2.3.1 SharePoint Farm deployment
ESET Security for Microsoft SharePoint must be installed on all SharePoint machines with the Web Server role to
guarantee user protection using the On-access file scanner. Any of those machines can also be used to execute On-
demand database scans. Optionally, ESET Security for Microsoft SharePoint can be installed on SharePoint
machine(s) with the Application Server role, where it can be used to perform On-demand database scans of the
SharePoint content database, but cannot serve as an On-access filter.
In the diagram below, the server environment is divided to show tiers where ESET protection is required and tiers
where it is optional.
NOTE
In a SharePoint farm setting, it is only necessary to run the On-demand database scan from one machine. The
entire SharePoint farm database will be scanned.
Because On-demand scan is a resource intensive operation, we recommend that you run it on a machine where
increased load during the scan is not a problem. From a functional point of view, it is perfectly fine to run the On-
demand database scan from any SharePoint farm machine that can access the content database, regardless of its
role.
The speed of On-demand database scan depends heavily on the throughput of the database server and of the
network used. To increase database scanning throughput in large SharePoint farms, run On-demand database scan
on more than one machine and configure each machine to scan different (non-overlapping) parts of the content
database. Note that this will increase database server load and its benefits should be evaluated by the farm
administrator.
10
2.3.2 Installation in a cluster environment
You can deploy ESET Security for Microsoft SharePoint in a cluster environment (for example, in a Failover cluster).
We recommend that you install ESET Security for Microsoft SharePoint on an active node and then redistribute the
installation on passive node(s) using the ESET Cluster feature of ESET Security for Microsoft SharePoint. Apart from
the installation, the ESET Cluster will serve as a replication of ESET Security for Microsoft SharePoint configuration to
ensures consistency between cluster nodes necessary for correct operation.
2.4 Types of SharePoint protection
There are two types of ESET Security for Microsoft SharePoint SharePoint protection:
· Antivirus protection
· Antispyware protection
This protection is provided by:
· Filtering during file access (On-access filter)
· On-demand database scan (On-demand scan)
2.4.1 Integration into the SharePoint
This section describes the On-access filter and On-demand database scan features and how these integrate into
SharePoint.
2.4.1.1 On-access filter
The On-access filter scans all files according to ”SharePoint protection settings“. For example, an MS Office
document stored in SharePoint, pictures, .aspx files (which are actual SharePoint pages), css styles, and icons
associated with the document will be scanned. The scope of the files that will be sent for scanning via VSAPI
determined by SharePoint settings. ESET Security for Microsoft SharePoint cannot actively select which files will be
scanned. When a file is sent for scanning/cleaning, its file name and size are recognized by ESET Security for
Microsoft SharePoint. Details about the file, such as its owner, location and whether it will be scanned during
upload or download cannot be determined by ESET.. If Scan document versions is enabled, only the file name of the
current version will be displayed, for older versions alternate text will be used.
The process of On-access filter file scan is shown in the diagram below. This diagram illustrates possible actions
performed by the On-access filter file scan:
11
2.4.1.2 On-demand database scan
The On-demand database scan feature is used to scan the SharePoint content database that contains SharePoint
Web sites and files. ESET Security will scan the hierarchy of files and folders that corresponds to each web site
targeted for scanning.
If an infiltration is found, there are three possible actions (retain, clean and delete) that can be performed. If
deletion is executed for any reason, including during cleaning, the file is sent to the Recycle Bin. If the Recycle Bin is
turned off deletion is definitive.
If older versions of a particular file are present and the Scan document versions feature is enabled, then the older
versions of the document are scanned first.
Notes on document version scanning:
· Scanning of older document versions can be activated in ESET Security for Microsoft SharePoint settings (Scan
document versions).
· If a document must be cleaned, a new version of the document will be created. The Infected version will be
moved to trash.
· It is impossible to clean older versions of documents, they can only be deleted.
· If the most current version of a document is deleted, the older versions are kept. The most recent clean
version will be used as the current document. This behavior can be activated in the settings (On document
delete restore the latest clean version) and works even if Scan document versions is disabled.
12
This diagram illustrates file scan result processing and subsequent action(s) taken during the On-demand database
scan:
13
3. Preparing for installation
There are a few steps we recommend you to take in preparation of the product installation:
· After purchasing ESET Security for Microsoft SharePoint, download .msi installation package from ESET’s
website .
· Make sure that the server on which you plan to install ESET Security for Microsoft SharePoint meets system
requirements.
· Log on to the server using an Administrator account.
NOTE
Please note that you must to execute the installer using the Built-in Administrator account or a domain
Administrator account (in the event that local Administrator account is disabled). Any other user, despite being
a member of Administrators group, will not have sufficient access rights. Therefore you need to use the Built-
in Administrator account, as you will not be able to successfully complete installation under any other user
account than local or domain Administrator.
· If you are going to do an upgrade from an existing installation of ESET Security for Microsoft SharePoint, we
recommend you to backup its current configuration using the Export settings feature.
· Remove /uninstall any third-party antivirus software from your system, if applicable. We recommend that
you use the ESET AV Remover . For a list of third-party antivirus software that can be removed using ESET AV
Remover, see this KB article .
· If you are installing ESET Security for Microsoft SharePoint on Windows Server 2016, Microsoft recommends
to uninstall Windows Defender Features and withdraw from Windows Defender ATP enrollment to prevent
problems caused by having multiple antivirus products installed on a machine.
You can run ESET Security for Microsoft SharePoint installer in two installation modes:
· Graphical user interface (GUI)
This is the recommended installation type in a from of an installation wizard.
· Silent / Unattended installation
In addition to the installation wizard, you can choose to install ESET Security for Microsoft SharePoint silently
via command line.
IMPORTANT
We highly recommend installing ESET Security for Microsoft SharePoint on a freshly installed and configured
OS, if possible. If you do need to install it on an existing system, we recommend that you uninstall previous
version of ESET Security for Microsoft SharePoint, restart the server and install the new ESET Security for
Microsoft SharePoint afterwards.
· Upgrading to a newer version
If you are using an older version of ESET Security for Microsoft SharePoint, you can choose suitable upgrade
method.
After you've successfully installed or upgraded your ESET Security for Microsoft SharePoint, further activities are:
· Product activation
Availability of a particular activation scenario in the activation window may vary depending on the country, as
well as the means of distribution.
14
· Configuring server protection
You can fine-tune your ESET Security for Microsoft SharePoint by modifying advanced settings of each of its
features to suite on your needs.
IMPORTANT
We highly recommend installing ESET Security for Microsoft SharePoint on a freshly installed and configured
OS, if possible. If you do need to install it on an existing system, we recommend that you uninstall the version
of ESET Security for Microsoft SharePoint, restart the server and install the new ESET Security for Microsoft
SharePoint afterwards.
· Upgrading to a newer version - If you are using an older version ESET Security for Microsoft SharePoint, you
can use upgrades methods.
· Product activation - Availability of a particular activation scenario in the activation window may vary
depending on the country, as well as the means of distribution.
· Management and configuration - You can manage and configure
3.1 System requirements
Supported Operating Systems:
· Microsoft Windows Server 2019
· Microsoft Windows Server 2016
· Microsoft Windows Server 2012 R2
· Microsoft Windows Server 2012
· Microsoft Windows Server 2008 R2 SP1 with KB4474419 and KB4490628 installed
NOTE
If you are running Microsoft Windows Server 2008 R2 SP1, read the SHA-2 required compatibility and ensure
your operating system has all necessary patches applied.
Small Business servers:
· Microsoft Windows Server 2019 Essentials
· Microsoft Windows Server 2016 Essentials
· Microsoft Windows Server 2012 R2 Essentials
· Microsoft Windows Server 2012 Essentials
· Microsoft Windows Small Business Server 2011 SP1 (x64) with KB4474419 and KB4490628 installed
and any of the following application servers:
· Microsoft SharePoint Server 2019 (x64) - all editions
· Microsoft SharePoint Server 2016 (x64) - all editions
· Microsoft SharePoint Server 2013 (x64) - all editions
· Microsoft SharePoint Server 2010 (x64) - all editions
· Microsoft SharePoint Server 2007 (x86 and x64) - all editions
Supported Hyper-V Host Operating Systems:
· Microsoft Windows Server 2019
· Microsoft Windows Server 2016
· Microsoft Windows Server 2012 R2
· Microsoft Windows Server 2012
· Microsoft Windows Server 2008 R2 SP1- Virtual Machines can be scanned only while they are offline
15
Hardware requirements depend on the operating system version in use. We recommend reading the Microsoft
Windows Server and Microsoft SharePoint Server product documentation for detailed information on hardware
requirements.
NOTE
We strongly recommend that you install the latest Service Pack for your Microsoft Server operating system and
server application before installing ESET security product. We also recommend that you install the latest
Windows updates and hotfixes whenever available.
3.2 SHA-2 required compatibility
Microsoft announced deprecation of Secure Hash Algorithm 1 (SHA-1) and started migration process to SHA-2 in
early 2019. Therefore, all certificates signed with the SHA-1 algorithm will no longer be recognized and will cause
security alerts. Unfortunately, the security of the SHA-1 hash algorithm has become less secure over time due to
weaknesses found in the algorithm, increased processor performance, and the advent of cloud computing.
The SHA-2 hashing algorithm (as a successor to SHA-1) is now the preferred method to guarantee SSL security
durability. See Microsoft Docs article about Hash and Signature Algorithms for further details.
NOTE
This change means that on operating systems without SHA-2 support, your ESET security solution will no longer
be able to update its modules, including the detection engine, ultimately making your ESET Security for
Microsoft SharePoint not fully functional and unable to provide sufficient protection.
If you are running Microsoft Windows Server 2008 R2 SP1, Microsoft Windows Small Business Server 2011 SP1,
ensure your system is compatible with SHA-2. Apply the patches according to your particular operating system
version as follows:
· Microsoft Windows Server 2008 R2 SP1 appl y KB4474419 and KB4490628 (an additional system restart
might be necessary)
· Microsoft Windows Small Business Server 2011 SP1 (x64) apply KB4474419 and KB4490628 (an
additional system restart might be necessary)
IMPORTANT
Once you have installed the updates and restarted your system, open ESET Security for Microsoft SharePoint
GUI to check its status. In case the status is orange, perform an additional system restart. The status should
then be green indicating maximum protection.
NOTE
We strongly recommend that you install the latest Service Pack for your Microsoft Server operating system and
server application. We also recommend that you install the latest Windows updates and hotfixes whenever
available.
16
3.3 ESET Security for Microsoft SharePoint installation steps
This is a typical GUI installation wizard. Double-click the .msi package and follow the steps to install ESET Security
for Microsoft SharePoint:
1. Click Next to continue or click Cancel if you want to quit the installation.
2. The installation wizard runs in a language that is specified as Home location of a Region > Location setting of
your operating system (or Current location of a Region and Language > Location setting in older systems).
Use the drop-down menu to select Product language in which your ESET Security for Microsoft SharePoint
will be installed. Selected language for ESET Security for Microsoft SharePoint is independent of the
language you see in the installation wizard.
3. Click Next, the End-User License Agreement will be displayed. After you acknowledge your acceptance of
the End User License Agreement and Privacy policy, click Next.
17
4. Choose one of available installation types (availability depend on your operating system):
Complete
Installs all ESET Security for Microsoft SharePoint features. Also called a full installation. This is the
recommended installation type, available for Windows Server 2012, 2012 R2, 2016, 2019, Windows Server 2012
Essentials, 2012 R2 Essentials, 2016 Essentials and 2019 Essentials.
Typical
Installs recommended ESET Security for Microsoft SharePoint features. Avai labl e for Windows Server 2008 R2
SP1, Microsoft Windows Small Business Server 2011 SP1.
18
Core
This installation type is intended for Windows Server Core editions. Installation steps are the same as complete
installation, but only core features and the command line user interface will be installed. Although core
installation is mainly for use on Windows Server Core, you can still install it on a regular Windows Servers if you
prefer. ESET security product installed using core installation will not have any GUI. This means that you can only
use the command line user interface when working with ESET Security for Microsoft SharePoint. For more
detailed information and other special parameters, see Command line installation section.
EXAMPLE
To execute Core installation via command line, use the following sample command:
msiexec /qn /i efsw_nt64.msi ADDLOCAL=_Base
Custom
Lets you choose which features of ESET Security for Microsoft SharePoint will be installed on your system. A list
of product modules and features will be displayed before the installation starts. It is useful when you want to
customize ESET Security for Microsoft SharePoint with only the components you need.
NOTE
On Windows Server 2008 R2 SP1, installation of Network protection component is disabled by default (Typical
installation). If you want to have this component installed, choose Custom installation type.
5. You will be prompted to select the location where ESET Security for Microsoft SharePoint will be installed.
By default, the program installs in C:\Program Files\ESET\ESET Security for Microsoft SharePoint. Cl i ck Browse
to change this location (not recommended).
19
6. Click Install to begin the installation. When the installation finishes, ESET GUI starts and tray icon is
displayed in the notification area (system tray).
3.3.1 Modifying an existing installation
You can add or remove components included in your installation. To do so, either run the .msi installer package you
used during initial installation, or go to Programs and Features (accessible from the Windows Control Panel), right-
click ESET Security for Microsoft SharePoint and select Change. Follow the steps below to add or remove
components.
There are 3 options available. You can Modify i nstall ed compone nts, Repair your installation of ESET Security for
Microsoft SharePoint or Remove (uninstall) it completely.
20
If you choose Modify, a list of available program components is displayed.
Choose the components you want to add or remove. You can add/remove multiple components at the same time.
Click the component and select an option from the drop-down menu:
When you have selected an option, click Modify to perform the modifications.
NOTE
You can modify installed components at any time by running the installer. For most components, a server
restart is not necessary to carry out the change. The GUI will restart and you'll only see only the components
you chose to install. For components that require a server restart, the Windows Installer will prompt you to
restart and new components will become available once the server is back online.
3.4 Silent / Unattended installation
Run the following command to complete installation via command line: msiexec /i <packagename> /qn /l*xv
msi.log
NOTE
On Windows Server 2008 R2 SP1 the Network protection feature will not be installed.
To make sure the installation was successful or in case of any issues with the installation, use Windows Event
Viewer to check the Application Log (look for records from Source: MsiInstaller).
EXAMPLE
Full installation on a 64-bit system:
msiexec /i eshp_nt64.msi /qn /l*xv msi.log ADDLOCAL=NetworkProtection,RealtimeProtection,^
DeviceControl,DocumentProtection,Cluster,GraphicUserInterface,SysInspector,SysRescue,Rmm,eula
  • Page 1 1
  • Page 2 2
  • Page 3 3
  • Page 4 4
  • Page 5 5
  • Page 6 6
  • Page 7 7
  • Page 8 8
  • Page 9 9
  • Page 10 10
  • Page 11 11
  • Page 12 12
  • Page 13 13
  • Page 14 14
  • Page 15 15
  • Page 16 16
  • Page 17 17
  • Page 18 18
  • Page 19 19
  • Page 20 20
  • Page 21 21
  • Page 22 22
  • Page 23 23
  • Page 24 24
  • Page 25 25
  • Page 26 26
  • Page 27 27
  • Page 28 28
  • Page 29 29
  • Page 30 30
  • Page 31 31
  • Page 32 32
  • Page 33 33
  • Page 34 34
  • Page 35 35
  • Page 36 36
  • Page 37 37
  • Page 38 38
  • Page 39 39
  • Page 40 40
  • Page 41 41
  • Page 42 42
  • Page 43 43
  • Page 44 44
  • Page 45 45
  • Page 46 46
  • Page 47 47
  • Page 48 48
  • Page 49 49
  • Page 50 50
  • Page 51 51
  • Page 52 52
  • Page 53 53
  • Page 54 54
  • Page 55 55
  • Page 56 56
  • Page 57 57
  • Page 58 58
  • Page 59 59
  • Page 60 60
  • Page 61 61
  • Page 62 62
  • Page 63 63
  • Page 64 64
  • Page 65 65
  • Page 66 66
  • Page 67 67
  • Page 68 68
  • Page 69 69
  • Page 70 70
  • Page 71 71
  • Page 72 72
  • Page 73 73
  • Page 74 74
  • Page 75 75
  • Page 76 76
  • Page 77 77
  • Page 78 78
  • Page 79 79
  • Page 80 80
  • Page 81 81
  • Page 82 82
  • Page 83 83
  • Page 84 84
  • Page 85 85
  • Page 86 86
  • Page 87 87
  • Page 88 88
  • Page 89 89
  • Page 90 90
  • Page 91 91
  • Page 92 92
  • Page 93 93
  • Page 94 94
  • Page 95 95
  • Page 96 96
  • Page 97 97
  • Page 98 98
  • Page 99 99
  • Page 100 100
  • Page 101 101
  • Page 102 102
  • Page 103 103
  • Page 104 104
  • Page 105 105
  • Page 106 106
  • Page 107 107
  • Page 108 108
  • Page 109 109
  • Page 110 110
  • Page 111 111
  • Page 112 112
  • Page 113 113
  • Page 114 114
  • Page 115 115
  • Page 116 116
  • Page 117 117
  • Page 118 118
  • Page 119 119
  • Page 120 120
  • Page 121 121
  • Page 122 122
  • Page 123 123
  • Page 124 124
  • Page 125 125
  • Page 126 126
  • Page 127 127
  • Page 128 128
  • Page 129 129
  • Page 130 130
  • Page 131 131
  • Page 132 132
  • Page 133 133
  • Page 134 134
  • Page 135 135
  • Page 136 136
  • Page 137 137
  • Page 138 138
  • Page 139 139
  • Page 140 140
  • Page 141 141
  • Page 142 142
  • Page 143 143
  • Page 144 144
  • Page 145 145
  • Page 146 146
  • Page 147 147
  • Page 148 148
  • Page 149 149
  • Page 150 150
  • Page 151 151
  • Page 152 152
  • Page 153 153
  • Page 154 154
  • Page 155 155
  • Page 156 156
  • Page 157 157
  • Page 158 158
  • Page 159 159
  • Page 160 160
  • Page 161 161
  • Page 162 162
  • Page 163 163
  • Page 164 164
  • Page 165 165
  • Page 166 166
  • Page 167 167
  • Page 168 168
  • Page 169 169
  • Page 170 170
  • Page 171 171
  • Page 172 172
  • Page 173 173
  • Page 174 174
  • Page 175 175
  • Page 176 176
  • Page 177 177
  • Page 178 178
  • Page 179 179
  • Page 180 180
  • Page 181 181
  • Page 182 182
  • Page 183 183
  • Page 184 184
  • Page 185 185
  • Page 186 186

ESET Security for Microsoft SharePoint 7.0 Owner's manual

Category
Antivirus security software
Type
Owner's manual
This manual is also suitable for

Ask a question and I''ll find the answer in the document

Finding information in a document is now easier with AI