12
ESET Mail Security
Once ESET Mail Security is successfully installed, you should become familiar with its
configuration.
The structure of ESET Mail Security is shown in Figure 4-1. The system is comprised of the
following parts:
CORE
The core of ESET Mail Security is the ESETS daemon (esets_daemon). The daemon uses
ESETS API library libesets.so and ESETS loading modules em00X_xx.dat to provide base system
tasks such as scanning, maintenance of the agent daemon processes, maintenance of the
samples submission system, logging, notification, etc. Please refer to the esets_daemon (8) man
page for details.
AGENTS
The purpose of ESETS agent modules is to integrate ESETS with the Linux/BSD/Solaris Server
environment.
UTILITIES
The utility modules provide simple and effective management of the system. They are
responsible for relevant system tasks such as license management, quarantine management,
system setup and update.
CONFIGURATION
Proper configuration is the most important aspect of a smooth-running security system–
the remainder of this chapter is dedicated to explaining all related components. A thorough
understanding of the esets.cfg file (page 6) is also highly recommended, as this file contains
information essential to the configuration of ESET Mail Security.
After the product is successfully installed, all of its configuration components are stored in
the ESETS configuration directory. This directory consists of the following files:
Figure 4-1. Structure of ESET Mail Security.
esets_mda
esets_imap
esets_cli
AGENTS
esets_pipe
esets_pop3
esets_smfi
esets_smtp
esets_lic
UTILITIES
esets_quar
esets_setup
esets_update
scanning
engine
CORE
system
service
esets.cfg
license
scripts
WWW INTERFACE
CONFIGURATION
Содержание MAIL SECURITY
Страница 1: ...ESET Mail Security Installation Manual and User Guide we protect digital worlds...
Страница 3: ...Chapter 1 Introduction...
Страница 5: ...Chapter 2 Terminology and abbreviations...
Страница 8: ......
Страница 9: ...Chapter 3 Installation...
Страница 11: ...Chapter 4 Architecture Overview...
Страница 14: ......
Страница 15: ...Chapter 5 Integration with Email Messaging System...
Страница 21: ...Chapter 6 Important ESET Mail Security mechanisms...
Страница 27: ...Chapter 7 Updating ESET Mail Security...
Страница 29: ...Chapter 8 Let us know...
Страница 31: ...Appendix A ESETS setup and configuration...
Страница 40: ......
Страница 41: ...Appendix B PHP License...