10
After purchasing ESET Mail Security, you will receive your authorization data (username/
password and license key). This data is required in order to identify you as our customer, to
download updates for ESET Mail Security, and for downloading the installation package from
our web site. ESET Mail Security is distributed as a binary file:
esets.i386.ext.bin
In the above binary file, ‘ext’ is a Linux/BSD/Solaris OS distribution dependent suffix, i.e. ‘deb’
for Debian, ‘rpm’ for RedHat and SuSE, ‘tgz’ for other Linux OS distributions, ‘fbs5.tgz’ for FreeBSD
5.xx, ‘fbs6.tgz‘ for FreeBSD 6.xx, ‘nbs4.tgz‘ for NetBSD 4.xx and ‘sol10.pkg.gz‘ for Solaris 10.
Note that the Linux
RSR
binary file format is:
esets-rsr.i386.rpm.bin
In order to install or update (upgrade??) the product, use the following command:
sh ./esets.i386.ext.bin
For Linux
RSR
variations of the product, use the command:
sh ./esets-rsr.i386.rpm.bin
to display the product’s User License Acceptance Agreement. Once you have confirmed the
Acceptance Agreement, the installation package is placed into the current working directory and
relevant information regarding the package’s installation, un-installation or update is displayed
onscreen.
Once the package is installed, you can verify that the main
ESETS
service is running by using
the following command:
Linux OS:
ps -C esets_daemon
BSD OS:
ps -ax | grep esets_daemon
Solaris:
ps -A | grep esets_daemon
After pressing ENTER, you should see the following (or similar) message:
PID TTY TIME CMD
2226 ? 00:00:00 esets_daemon
2229 ? 00:00:00 esets_daemon
At least two ESETS daemon processes are running in the background. The first PID represents
the process and threads manager of the system. The second PID represents the ESETS scanning
process.
ESET Mail Security
Содержание MAIL SECURITY
Страница 1: ...ESET Mail Security Installation Manual and User Guide we protect digital worlds...
Страница 3: ...Chapter 1 Introduction...
Страница 5: ...Chapter 2 Terminology and abbreviations...
Страница 8: ......
Страница 9: ...Chapter 3 Installation...
Страница 11: ...Chapter 4 Architecture Overview...
Страница 14: ......
Страница 15: ...Chapter 5 Integration with Email Messaging System...
Страница 21: ...Chapter 6 Important ESET Mail Security mechanisms...
Страница 27: ...Chapter 7 Updating ESET Mail Security...
Страница 29: ...Chapter 8 Let us know...
Страница 31: ...Appendix A ESETS setup and configuration...
Страница 40: ......
Страница 41: ...Appendix B PHP License...