12
ESET Mail Security
Once ESET Mail Security is successfully installed, you should become familiar with its
configuration.
The structure of ESET Mail Security is shown in Figure 4-1. The system is comprised of the
following parts:
CORE
The core of ESET Mail Security is the ESETS daemon (esets_daemon). The daemon uses
ESETS API library libesets.so and ESETS loading modules em00X_xx.dat to provide base system
tasks such as scanning, maintenance of the agent daemon processes, maintenance of the
samples submission system, logging, notification, etc. Please refer to the esets_daemon (8) man
page for details.
AGENTS
The purpose of ESETS agent modules is to integrate ESETS with the Linux/BSD/Solaris Server
environment.
UTILITIES
The utility modules provide simple and effective management of the system. They are
responsible for relevant system tasks such as license management, quarantine management,
system setup and update.
CONFIGURATION
Proper configuration is the most important aspect of a smooth-running security system–
the remainder of this chapter is dedicated to explaining all related components. A thorough
understanding of the esets.cfg file (page 6) is also highly recommended, as this file contains
information essential to the configuration of ESET Mail Security.
After the product is successfully installed, all of its configuration components are stored in
the ESETS configuration directory. This directory consists of the following files:
Figure 4-1. Structure of ESET Mail Security.
esets_mda
esets_imap
esets_cli
AGENTS
esets_pipe
esets_pop3
esets_smfi
esets_smtp
esets_lic
UTILITIES
esets_quar
esets_setup
esets_update
scanning
engine
CORE
system
service
esets.cfg
license
scripts
WWW INTERFACE
CONFIGURATION
Summary of Contents for MAIL SECURITY
Page 1: ...ESET Mail Security Installation Manual and User Guide we protect digital worlds...
Page 3: ...Chapter 1 Introduction...
Page 5: ...Chapter 2 Terminology and abbreviations...
Page 8: ......
Page 9: ...Chapter 3 Installation...
Page 11: ...Chapter 4 Architecture Overview...
Page 14: ......
Page 15: ...Chapter 5 Integration with Email Messaging System...
Page 21: ...Chapter 6 Important ESET Mail Security mechanisms...
Page 27: ...Chapter 7 Updating ESET Mail Security...
Page 29: ...Chapter 8 Let us know...
Page 31: ...Appendix A ESETS setup and configuration...
Page 40: ......
Page 41: ...Appendix B PHP License...