2
ESET File Security
Table of contents
1. Introduction .........................................................................................3
2. Terminology and abbreviations..........................................................5
3. Installation .............................................................................................9
4. Architecture Overview ......................................................................11
5. Integration with File System services .............................................15
5.1. On-demand scanner .................................................................................. 16
5.2. On-access scanner powered by Dazuko ............................................. 16
5.2.1. Operation principle ................................................................................. 17
5.2.2. Installation and configuration ............................................................ 17
5.2.3. Tips ................................................................................................................ 17
5.3. On-access scanner using preload LIBC library...................................18
5.3.1. Operation principle ................................................................................. 18
5.3.2. Installation and configuration ............................................................ 19
5.3.3. Tips ................................................................................................................ 19
6. Important ESET File Security mechanisms
21
6.1. Handle Object Policy .................................................................................. 22
6.2. User Specific Configuration ..................................................................... 22
6.3. Samples Submission System ................................................................... 23
6.4. World Wide Web Interface.........................................................................24
6.5. Remote Administration..............................................................................24
7. ESET Security system update ...........................................................25
7.1. ESETS update utility.................................................................................... 26
7.2. ESETS update process description ........................................................ 26
7.3. ESETS mirror http daemon........................................................................27
8. Let us know ..........................................................................................29
Appendix A. PHP License .....................................................................31
ESET File Security
Copyright © 2009 ESET, spol. s r.o.
ESET File Security was developed by ESET, spol. s r.o. For more
information visit
www.eset.com
.
All rights reserved. No part of this documentation may be
reproduced, stored in a retrieval system or transmitted in any form
or by any means, electronic, mechanical, photocopying, recording,
scanning, or otherwise without permission in writing from the author.
ESET, spol. s r.o. reserves the right to change any of the described
application software without prior notice.
This product includes PHP software, freely available from http://www.
php.net/software/.
REV.20090224-007
Summary of Contents for FILE SECURITY
Page 1: ...ESET File Security Installation Manual and User Guide we protect digital worlds...
Page 3: ...Chapter 1 Introduction...
Page 5: ...Chapter 2 Terminology and abbreviations...
Page 8: ......
Page 9: ...Chapter 3 Installation...
Page 11: ...Chapter 4 Architecture Overview...
Page 14: ......
Page 15: ...Chapter 5 Integration with File System services...
Page 20: ......
Page 21: ...Chapter 6 Important ESET File Security mechanisms...
Page 25: ...Chapter 7 ESET Security system update...
Page 28: ......
Page 29: ...Chapter 8 Let us know...
Page 31: ...Appendix A PHP License...