ESET File SecurityInstallation Manualand User Guide
10After purchasing ESET File Security, you will receive your authorization data (username/password and license key). This data is necessary
Chapter 4:Architecture Overview
12ESET File SecurityOnce ESET File Security is successfully installed, you should become familiar with its architecture.The structure of
13After the product is successfully installed, all its conguration components are stored in the ESETS conguration directory. The directory consis
Chapter 5:Integration with File System services
16ESET File SecurityThis chapter describes the On-demand and On-access scanner conguration which will provide the most eective protec
17system hang-up. An example of a typical directory to be excluded is the ‘/dev’ directory and any directories used by ESETS.5.2.1. Operation principl
18ESET File Security Use the kernel utilities ‘depmod’ and ‘modprobe’ (For BSD OS, use ‘kldconfig’ and ‘kldload’) to handle dependencies and suc
19This le access type is activated if the word ‘exec‘ is present in the ‘event_mask‘ parameter in the eset.cfg ([pac] section). In this case, all exe
2ESET File SecurityTable of contents1. Introduction ...32. Ter
Chapter 6:Important ESET File Security mechanisms
22ESET File Security6.1. Handle Object PolicyThe Handle Object Policy (see gure 6-1) mechanism provides ltering of scanned objects based on thei
23special conguration lename where the individual scanning rules will be stored. In the example shown here, the special conguration le is called
24ESET File Security6.4. Web InterfaceThe Web Interface allows user-friendly conguration, administration and license management of ESET Security s
Chapter 7:ESET Security system update
26ESET File Security7.1. ESETS update utilityTo maintain the eectiveness of ESET File Security, the virus signature database must be kept up to date
277.3. ESETS mirror http daemonESETS mirror http daemon is installed automatically with ESET File Security. The http mirror daemon starts if the o
Chapter 8:Let us know
Chapter 1:Introduction
30ESET File SecurityDear user, we hope this Guide has provided you with a thorough understanding of the requirements for ESET File Sec
Appendix A. PHP License
32ESET File SecurityThe PHP License, version 3.01 Copyright (c) 1999 - 2006 The PHP Group. All rights reserved.Redistribution and use in source and b
4ESET File SecurityDear user, you have acquired ESET File Security - the premier security system running under the Linux/BSD/Solaris OS. As you will
Chapter 2:Terminology and abbreviations
6ESET File SecurityIn this section we will review the terms and abbreviations used in this document. Note that a boldface font is reserved for produc
7@BINDIR@ will be used for future references to this directory. The @BINDIR@ value for the following Operating Systems is listed below:
Chapter 3:Installation
Comments to this Manuals