User manual ESET FILE SECURITY

DON'T FORGET : ALWAYS READ THE USER GUIDE BEFORE BUYING !!!

If this document matches the user guide, instructions manual or user manual, feature sets, schematics you are looking for, download it now. Diplodocs provides you a fast and easy access to the user manual ESET FILE SECURITY. We hope that this ESET FILE SECURITY user guide will be useful to you.


ESET FILE SECURITY : Download the complete user guide (358 Ko)

You may also download the following manuals related to this product:

   ESET FILE SECURITY (463 ko)
   ESET FILE SECURITY (358 ko)
   ESET FILE SECURITY ANNEXE 22 (1075 ko)
   ESET FILE SECURITY FOR LINUX BSD AND SOLARIS (488 ko)
   ESET FILE SECURITY FOR LINUX-BSD-SOLARIS DATASHEET (53 ko)

Manual abstract: user guide ESET FILE SECURITY

Detailed instructions for use are in the User's Guide.

[. . . ] we protect digital worlds ESET File Security Installation Manual and User Guide Table of contents 1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Terminology and abbreviations. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 3. Installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . [. . . ] A thorough understanding of the esets. cfg file (page 6) is also highly recommended, as this file contains informationessentialtotheconfigurationofESETFileSecurity. Aftertheproductissuccessfullyinstalled, allofitsconfigurationcomponentsarestoredin 12 ESET File Security theESETSconfigurationdirectory. Thisdirectoryconsistsofthefollowingfiles: @ETCDIR@/esets. cfg Thisisthemostimportantconfigurationfile, asitcontrolsallmajoraspectsoftheproduct's functionality. Theesets. cfgfileismadeupofseveralsections, eachsectioncontainingvarious parameters. The file contains one global and several "agent" sections, with all section names enclosedinsquarebrackets. Parametersintheglobalsectionareusedtodefineconfiguration options for the ESETS daemon as well as default values for the ESETS scanning engine configuration. Parametersintheagentsectionsareusedtodefineconfigurationoptionsforall ESET File Security agents and modules. These agents are used to intercept various data types received by the computer and prepare this data for scanning. The On-demand scanner does not require special configuration in order to run. After the ESETS package has been properly installed and a valid license has been moved to the license keys directory (@ETCDIR@/license), the On-demand scanner can be run immediately using the command line interface or scheduler tool. To run the On-demand scanner from the command line, use the following syntax: @SBINDIR@/esets_scan [option(s)] FILES whereFILESisalistofdirectoriesand/orfilestobescanned. Multiple command line options are available using ESETS On-demand scanner. To see the full listofoptions, pleaseseetheesets_scan(8)manpage. 5. 2. On-access scanner powered by Dazuko The On-access scanner is invoked by user(s) access and/or operating system access to file systemobjects. Thisalsoexplainstheterm"On-access";thescannerisinitializedonanyattempt to access a selected file system object. The technique used by ESETS On-access scanner is powered by the Dazuko (da-tzu-ko) kernel module and is based on the interception of kernel calls. The Dazuko project is open source, which means that its source code is freely distributed. This allows users to compile the kernel module for their own custom kernels. Note that the Dazuko kernel module is not a part of any ESETS product and must be compiled and installed into the kernel prior to using the On-access command esets_dac. On the other hand the Dazuko technique makes On-access scanning independent of the file system type used. It is also suitable for controlling file system objects via Network File System (NFS), Nettalk and Samba. IMPORTANT: Before we provide detailed information related to the On-access scanner's configuration and operation, it should be noted that the scanner has been primarily developed andtestedtoprotectfilesystemsmountedexternally. Iftherearemultiplefilesystemswhichare not externally mounted, they will need to be excluded from file access control in order to prevent system hang-up. An example of a typical directory to be excluded is the `/dev' directory and any directories used by ESETS. Operation principle TheOn-accessscanneresets_dac(ESETSDazuko-poweredfileAccessController)isaresident 16 ESET File Security program which provides continuous monitoring and control over the file system. Every file system object is scanned based on customizable file access event types. The following event types are supported by the current version: Open events Thisfileaccesstypeisactivatediftheword'open'ispresentinthe'event_mask`parameterin theeset. cfgfile([dac]section). Inthiscase, theON_OPENbitofDazukoaccessmaskissettoon. Close events Thisfileaccesstypeisactivatediftheword'close'ispresentinthe'event_mask`parameterin theeset. cfgfile([dac]section). Inthiscase, theON_CLOSEbitandON_CLOSE_MODIFIEDbitof Dazuko access mask is set to on. NOTE:SomeOSkernelversionsdonotsupporttheinterceptionofON_CLOSEevents. Inthese cases, closeeventswillnotbemonitoredbyesets_dac. Exec events Thisfileaccesstypeisactivatediftheword'exec'ispresentinthe'event_mask'parameterin theeset. cfgfile([dac]section). InthiscasetheON_EXECbitofDazukoaccessmaskissettoon. [. . . ] IntheeventthatyourserveraccessestheInternetviaHTTPproxy, theadditionalconfiguration options`proxy_addr`, `proxy_port`mustbedefined. IfaccesstotheHTTPrequiresausername andpassword, the`proxy_username`and`proxy_password`optionsmustalsobedefinedinthis section. To initiate an update, enter the following command: @SBINDIR@/esets_update To provide the highest possible security for the end user, the ESET team continuously collects virus definitions from all over the world­new patterns can appear within the virus signature database in very short intervals. For this reason, we recommend that updates be initiated on a regularbasis. Tospecifytheupdatefrequency, the`av_update_period`optionmustbedefinedin the[global]sectionoftheESETSconfigurationfile. TheESETSdaemonmustbeupandrunning in order to successfully update the virus signature database. 7. 2. ESETS update process description The update process consists of two stages: First, the precompiled update modules are downloaded from the ESET server. [. . . ]

DISCLAIMER TO DOWNLOAD THE USER GUIDE ESET FILE SECURITY




Click on "Download the user Manual" at the end of this Contract if you accept its terms, the downloading of the manual ESET FILE SECURITY will begin.

 

Copyright © 2015 - manualRetreiver - All Rights Reserved.
Designated trademarks and brands are the property of their respective owners.