10
After purchasing ESET Mail Security, you will receive your authorization data (username/
password and license key). This data is required in order to identify you as our customer, to
download updates for ESET Mail Security, and for downloading the installation package from
our web site. ESET Mail Security is distributed as a binary file:
esets.i386.ext.bin
In the above binary file, ‘ext’ is a Linux/BSD/Solaris OS distribution dependent suffix, i.e. ‘deb’
for Debian, ‘rpm’ for RedHat and SuSE, ‘tgz’ for other Linux OS distributions, ‘fbs5.tgz’ for FreeBSD
5.xx, ‘fbs6.tgz‘ for FreeBSD 6.xx, ‘nbs4.tgz‘ for NetBSD 4.xx and ‘sol10.pkg.gz‘ for Solaris 10.
Note that the Linux
RSR
binary file format is:
esets-rsr.i386.rpm.bin
In order to install or update (upgrade??) the product, use the following command:
sh ./esets.i386.ext.bin
For Linux
RSR
variations of the product, use the command:
sh ./esets-rsr.i386.rpm.bin
to display the product’s User License Acceptance Agreement. Once you have confirmed the
Acceptance Agreement, the installation package is placed into the current working directory and
relevant information regarding the package’s installation, un-installation or update is displayed
onscreen.
Once the package is installed, you can verify that the main
ESETS
service is running by using
the following command:
Linux OS:
ps -C esets_daemon
BSD OS:
ps -ax | grep esets_daemon
Solaris:
ps -A | grep esets_daemon
After pressing ENTER, you should see the following (or similar) message:
PID TTY TIME CMD
2226 ? 00:00:00 esets_daemon
2229 ? 00:00:00 esets_daemon
At least two ESETS daemon processes are running in the background. The first PID represents
the process and threads manager of the system. The second PID represents the ESETS scanning
process.
ESET Mail Security
Summary of Contents for MAIL SECURITY
Page 1: ...ESET Mail Security Installation Manual and User Guide we protect digital worlds...
Page 3: ...Chapter 1 Introduction...
Page 5: ...Chapter 2 Terminology and abbreviations...
Page 8: ......
Page 9: ...Chapter 3 Installation...
Page 11: ...Chapter 4 Architecture Overview...
Page 14: ......
Page 15: ...Chapter 5 Integration with Email Messaging System...
Page 21: ...Chapter 6 Important ESET Mail Security mechanisms...
Page 27: ...Chapter 7 Updating ESET Mail Security...
Page 29: ...Chapter 8 Let us know...
Page 31: ...Appendix A ESETS setup and configuration...
Page 40: ......
Page 41: ...Appendix B PHP License...