Eset File Security For Linux 7 Enu
Eset File Security For Linux 7 Enu
User guide
Click here to display the Online help version of this document
Copyright ©2021 by ESET, spol. s r.o.
ESET File Security for Linux was developed by ESET, spol. s r.o.
For more information visit https://www.eset.com.
All rights reserved. No part of this documentation may be reproduced, stored in a
retrieval system or transmitted in any form or by any means, electronic, mechanical,
photocopying, recording, scanning, or otherwise without permission in writing from
the author.
ESET, spol. s r.o. reserves the right to change any of the described application
software without prior notice.
REV. 3/9/2021
1 Introduction ..................................................................................................... 1
1.1 Key features of the system ...................................................................... 1
2 Release notes ................................................................................................. 1
3 System requirements ................................................................................ 4
4 Installation ....................................................................................................... 6
4.1 Uninstall ...................................................................................................... 8
4.2 Mass deployment ....................................................................................... 8
5 Update, upgrade ........................................................................................ 14
5.1 Update mirror ........................................................................................... 17
5.2 Automatic product component updates ............................................... 18
6 Activate ESET File Security for Linux .............................................. 19
6.1 Where can I find my license ................................................................... 20
6.2 Activation status ...................................................................................... 20
7 Using ESET File Security for Linux ................................................... 21
7.1 Dashboard ................................................................................................. 23
7.2 Scans .......................................................................................................... 24
7.2.1 Exclusions ............................................................................................... 27
7.3 Detections ................................................................................................. 31
7.3.1 Quarantine .............................................................................................. 31
7.4 Events ........................................................................................................ 33
8 Configuration ................................................................................................ 34
8.1 Detection engine ...................................................................................... 35
8.1.1 Exclusions ............................................................................................... 35
8.1.2 Real-time file system protection .................................................................... 39
8.1.3 Cloud-based protection ............................................................................... 40
8.1.4 Malware scans .......................................................................................... 42
8.1.5 ICAP scan ................................................................................................ 42
8.1.6 Cleaning levels ......................................................................................... 43
8.1.7 Shared local cache ..................................................................................... 43
8.1.8 ThreatSense parameters ............................................................................. 44
8.1.8.1 Additional ThreatSense parameters ............................................................. 47
8.2 Update ....................................................................................................... 47
8.3 Tools ........................................................................................................... 47
8.3.1 Proxy Server ............................................................................................ 48
8.3.2 Web interface ........................................................................................... 48
8.3.3 Log files .................................................................................................. 49
8.3.4 Scheduler ................................................................................................ 51
8.4 Listen address and port .......................................................................... 51
9 Remote Management .............................................................................. 52
10 Use case examples ................................................................................ 52
10.1 Integrate ICAP server with EMC Isilon ............................................... 52
10.2 Retrieve module information ............................................................... 54
10.3 Schedule scan ........................................................................................ 55
11 File and folder structure ...................................................................... 56
12 Troubleshooting ....................................................................................... 59
12.1 Collect logs ............................................................................................. 59
12.2 Forgot my password .............................................................................. 60
12.3 Update failed .......................................................................................... 60
12.4 Using the noexec flag ........................................................................... 61
12.5 Realtime protection cannot start ........................................................ 61
12.6 Disable Realtime protection at boot .................................................. 63
13 Known issues ............................................................................................. 63
14 Glossary ........................................................................................................ 64
15 End User License Agreement ........................................................... 64
16 Privacy Policy ............................................................................................ 74
Introduction
ESET's state-of-the-art scanning engine has unsurpassed scanning speed and
detection rates combined with a very small footprint that makes ESET File Security for
Linux (EFSL) the ideal choice for any server on Linux.
The On-access scanner is invoked whenever a user and/or operating system attempts
to access file system objects. This also clarifies the use of the term On-access;
because a scan is triggered by any attempt to access file system objects.
• Redesigned web interface for easy management and overview of security of your
system
• SELinux support
• Quarantine
Release notes
ESET File Security for Linux version 7.2 hotfix
• New: Ability to check for an update of application via the upd command-line
utility or from the WebGUI.
1
• New: Ability to enable automatic update of application during server restart
• Fixed: On-demand scan enabled from WebGUI might not remove all detections if
they exist in separate partitions
• Fixed: Real-time protection scanner could slow down a machine during the boot
process in certain scenarios
• Fixed: Error "Cannot accept the connection" when too many connections were
opened to icapd
• Fixed: Enabling "Shut down computer after scan" task from ESMC did not work
2
• Improved: Performance of Real-time protection scanner
• Fixed: An issue causing excessive error logging into event log during update
• Fixed: An issue where activation with offline licenses did not work
• Fixed: Some words in the scan detail page in WebGUI were not translated
• New: List of files which were not scanned during an on-demand scan (for
example, password-protected files) is available in scan details
3
• Fixed: SELinux denies port change of ICAP and Web interface
• Fixed: Cannot change ESET File Security for Linux Web interface password
through ESET Security Management Center
System requirements
Hardware requirements depend on the server role. The following minimum hardware
requirements must be met before the installation process in order to run ESET File
Security for Linux properly:
ESET File Security for Linux has been tested on the listed operating systems' latest
minor releases. Update your operating system before installing EFS.
• CentOS 6 64-bit
• CentOS 7 64-bit
• Centos 8 64-bit
4
• Ubuntu Server 16.04 LTS 64-bit
• Debian 9 64-bit
• Debian 10 64-bit
ESET File Security for Linux has been tested on the latest minor releases of the listed
operating systems. Update your operating system before installing ESET File Security
for Linux.
ESET File Security for Linux should also work on the most recent and frequently used
open-source Linux distributions if:
• and software dependencies are not missing in the Linux distribution used.
NOTE
Secure Boot is not supported.
Supported browsers
The ESET File Security for Linux Web interface works in the following browsers:
• Google Chrome
5
• Mozilla Firefox
• Microsoft Edge
• Safari
SELinux support
• Centos 6
• Centos 7
• Centos 8
Installation
ESET File Security for Linux is distributed as a binary file (.bin).
NOTE
Make sure your OS has the most recent updates installed before
installation of ESET File Security for Linux.
6
Installation via Terminal
To install or upgrade your product, run the ESET distribution script with root privileges
for the appropriate OS distribution that you have:
• ./efs-<VERSION>.x86_64.bin
• sh ./efs-<VERSION>.x86_64.bin
To see the dependencies of the installation package, run one of the following
commands:
Follow the on-screen instructions. Once you accept the product License Agreement,
installation will complete and displays the Web interface login details.
7
To deploy ESET File Security for Linux remotely on your computers, refer to the ESMC
Software Install online help section.
To enable regular updates of detection modules, activate ESET File Security for Linux.
Third-party apps
A summary of third-party apps used by ESET File Security for Linux can be
found in the NOTICE_mode file stored at
/opt/eset/efs/doc/modules_notice/.
Uninstall
To uninstall your ESET product, use the terminal window as a superuser to execute
the command of removing packages corresponding to your Linux distribution.
• rpm -e efs
Mass deployment
This topic provides a high-level overview of mass deployment of ESET File Security for
Linux via Puppet, Chef and Ansible. The code blocks below contain only basic
examples of how packages could be installed. They might differ per linux distribution.
Package selection
Before you start the mass deployment of ESET File Security for Linux, you have to
decide which package to use. ESET File Security for Linux is distributed as a .bin
package. However, you can obtain deb/rpm package by running the ESET distribution
script with "-n" command-line argument.
8
Puppet
Precondition
Bin package
Deployment steps:
Deb/rpm package
Deployment steps:
Dependencies
Dependencies have to be resolved before starting the installation
9
Puppet manifest sample
node default {
if $osfamily == 'Debian' {
file {"/tmp/efs-7.0.1081.0.x86_64.deb":
mode => "0700",
owner => "root",
group => "root",
source => "puppet:///modules/efs/efs-7.0.1081.0.x86_64.deb"
}
package {"efs":
ensure => "installed",
provider => 'dpkg',
source => "/tmp/efs-7.0.1081.0.x86_64.deb"
}
}
if $osfamily == 'RedHat' {
file {"/tmp/efs-7.0.1081.0.x86_64.rpm":
mode => "0700",
owner => "root",
group => "root",
source => "puppet:///modules/efs/efs-7.0.1081.0.x86_64.rpm"
}
package {"efs":
ensure => "installed",
provider => 'rpm',
source => "/tmp/efs-7.0.1081.0.x86_64.rpm"
}
}
}
Chef
Precondition
Bin package
Deployment steps:
10
Chef recipe sample
cookbook_file '/tmp/efs-7.0.1084.0.x86_64.bin' do
source 'efs-7.0.1084.0.x86_64.bin'
owner 'root'
group 'root'
mode '0700'
action :create
end
execute 'package_install' do
command '/tmp/efs-7.0.1084.0.x86_64.bin -y -f'
end
Deb/rpm package
Deployment steps:
Dependencies
Dependencies have to be resolved before starting the installation
11
Chef recipe sample
cookbook_file '/tmp/efs-7.0.1084.0.x86_64.deb' do
source 'efs-7.0.1084.0.x86_64.deb'
owner 'root'
group 'root'
mode '0700'
action :create
only_if { node['platform_family'] == 'debian'}
end
cookbook_file '/tmp/efs-7.0.1084.0.x86_64.rpm' do
source 'efs-7.0.1084.0.x86_64.rpm'
owner 'root'
group 'root'
mode '0700'
action :create
only_if { node['platform_family'] == 'rhel'}
dpkg_package 'efsu' do
source '/tmp/efs-7.0.1084.0.x86_64.deb'
action :install
only_if { node['platform_family'] == 'debian'}
end
rpm_package 'efsu' do
source '/tmp/efs-7.0.1084.0.x86_64.rpm'
action :install
only_if { node['platform_family'] == 'rhel'}
end
Ansible
Precondition
Bin package
Deployment steps:
12
Playbook task sample
....
- name: "INSTALL: Copy configuration json files"
copy:
src: efs-7.0.1084.0.x86_64.bin
dest: /home/ansible/
Deb/rpm package
Deployment steps:
13
Playbook task sample
....
- name: "Copy deb package to VM"
copy:
src: ./efs-7.0.1085.0.x86_64.deb
dest: /home/ansible/efs-7.0.1085.0.x86_64.deb
owner: ansible
mode: a+r
when:
- ansible_os_family == "Debian"
To launch the update of detection modules manually, click Modules update > Check
and update, and wait till the update completes.
If an ESET File Security for Linux update was not stable, roll back the module updates
14
to a previous state. Click Dashboard > Modules update > Module rollback, select
the desired duration, click Rollback now.
To update all product modules from a Terminal window, execute the following
command:
/opt/eset/efs/bin/upd -u
Important
The upd utility cannot be used to make changes in product configuration.
Example
To stop updates for 48 hours and roll back to the oldest snapshot of the scanner
module, execute the following command as a privileged user:
To resume automatic updates of the scanner module, execute the following command
as a privileged user:
To update from a mirror server available at IP address "192.168.1.2" and port "2221",
execute the following command as a privileged user:
New versions of ESET File Security for Linux are issued to implement improvements or
fix issues that cannot be resolved by automatic updates to program modules.
Note
An upgrade from ESET File Security for Linux version 4 to version 7 is not
possible. A clean new installation is needed. The settings from version 4
cannot be imported to version 7.
There are two methods to determine the product version of ESET File Security for
Linux:
16
Local options
• In the Web interface, navigate to Dashboard > Product update, click Check for
update
If managing ESET File Security for Linux through ESMC, you can initiate upgrade the
following ways:
• In the Web interface, navigate Dashboard > ESET Applications > right-click
ESET File Security for Linux > Update installed ESET products...
Update mirror
Several ESET security products (ESET Security Management Center, ESET Endpoint
Antivirus, etc.) allow you to create copies of update files that can be used to update
other workstations on the network. The use of a mirror— a copy of the update files in
the LAN environment—is convenient because the update files do not need to be
downloaded from the vendor update server repeatedly by each workstation. Updates
are downloaded to the local mirror server and then distributed to all workstations to
avoid the risk of network traffic overload. Updating client workstations from a mirror
optimizes network load balance and saves internet connection bandwidth.
1.In the Web interface navigate to Setup > Update > Primary Server.
2.In the Basic section, switch the toggle next to Choose automatically to turn it
off.
3.In the Update server field, type the URL address of the mirror server in one of
the following forms:
17
a.http://<IP>:<port>
b.http://<hostname>:<port>
5.Click Save.
If there are more mirror servers available in your network, repeat the steps above to
configure the secondary update servers.
In ESET File Security for Linux version 7.2 you can activate automatic product
component updates, including upgrade to later product versions:
If managing ESET File Security for Linux via ESET Security Management Center,
configure the above mentioned automatic updates through Policies.
1.In ESET Security Management Center click Policies > New policy and type a
name for the policy.
2.Click Settings, and select ESET Endpoint for Linux (V7+) from the drop-down
menu.
3.Adjust the desired settings and click Save in each dialog where you made a
change.
4.Click Finish.
Update mode
Auto-update - new packages are automatically downloaded and then installed upon
18
the next restart of OS. If there have been updates to the End User License
Agreement, the user has to accept the updated End User License Agreement before
downloading the new package.
Never-update - new packages are not downloaded, but the product displays the
availability of new packages in the Dashboard.
2.Click Dashboard > License tile and select the desired method of activation:
b.Offline license
If the license expires, you can change the license to a different one at the same
location.
Example
/opt/eset/efs/sbin/lic -k XXXX-XXXX-XXXX-XXXX-XXXX
or
Log in to ESMC Web interface, navigate to Client Tasks > Product Activation, and
follow the instructions on Product Activation.
Once the activation is complete, access the Web interface to launch the initial scan of
your system or to configure ESET File Security for Linux.
If you purchased a license, you should have received two emails from ESET. The first
email contains information about the ESET Business Account portal. The second email
contains details about your License Key (XXXXX-XXXXX-XXXXX-XXXXX-XXXXX) or
Username (EAV-xxxxxxxxxx) and Password when applicable, Public License ID (xxx-
xxx-xxx), product name (or list of products) and quantity.
If you have a Username and a Password, convert them to a License Key at the ESET
Business Account License converter page:
https://eba.eset.com/LicenseConverter
Check the activation status
The functionality described below is available in ESET File Security for Linux version
7.2 and later.
To verify the activation status and license validity, use the lic utility. Execute the
following commands as a privileged user:
20
Example
The commands below must be executed by a privileged user:
/opt/eset/efs/sbin/lic -s
or
/opt/eset/efs/sbin/lic --status
• English
• French
• Spanish
• Spanish (Latin)
• German
• Japanese
• Polish
21
If you complete the installation of ESET File Security for Linux remotely via ESET
Security Management Center, the Web interface is not enabled.
If you want to access the Web interface on the particular machine, run the following
command from a terminal window:
sudo /opt/eset/efs/sbin/setgui -gre
The final output will show the URL address of Web interface and the access
credentials.
To make the Web interface available at a custom IP address and port, for example
10.1.184.230:9999, run the following command from a terminal window:
sudo /opt/eset/efs/sbin/setgui -i 10.1.184.230:9999
To enable the Web interface via ESET Security Management Center, use the Run
Command task to execute the following command:
/opt/eset/efs/sbin/setgui -re --password=<password>
where <password> represents the desired password defined by you.
Available options for the setgui command.
Options -
Options - long form Description
short form
Generate a new password to access the
-g --gen-password
Web interface
Define a new password to access the
-p --password=PASSWORD
Web interface
Set a new password read from a file to
-f --passfile=FILE
access the Web interface
Generate a new private key and a
-r --gen-cert
certificate
-a --cert-password=PASSWORD Set certificate password
-l --cert-passfile=FILE Set certificate password read from file
-i --ip-address=IP:PORT Server address (IP and port number)
-c --cert=FILE Import certificate
-k --key=FILE Import private key
-d --disable Disable Web interface
-e --enable Enable Web interface
22
ESET File Security for Linux Web Interface certificate
ESET File Security for Linux Web console uses a self-signed certificate.
Accessing the Web interface for the first time will result in a certificate issue
message, unless you add a certificate exception.
• Add a certificate exception in Mozilla Firefox:
1.Click Advanced > Add Exception....
2.In the Add Security Exception window, verify Permanently store this
exception is selected.
3.Click Confirm Security Exception.
• Add a certificate exception in Google Chrome:
1.Click Advanced.
2.Click Proceed to <web address of ESA Web interface> (unsafe).
3.At this point Google Chrome remembers the exception.
To use your own SSL certificate for the Web interface, generate a certificate and
import it to ESET File Security for Linux.
openssl req -newkey rsa:2048 -new -nodes -x509 -days 3650 -keyout privatekey.pem -out certificate.pem
If you activated your instance of ESET File Security for Linux, update the detection
modules (click Dashboard > Module update > Check and update) and run an
initial scan of your file system.
Dashboard
Protection status
When everything is working without any issues, the protection status is green. If there
are options to improve the protection status of your system, or insufficient protection
status is detected, you will see "Attention required" on the Protection status tile.
Click the tile to see the details.
23
Mute or un-mute protection status alerts
Each non-green protection status alert can be muted by clicking Mute
this alert. The protection module status will turn grey, and the protection
module tile will be moved to the bottom of the list. Click Un-mute this
alert to turn the status notification back on.
If the protection status is disabled via ESET Security Management Center,
neither Un-mute this alert, nor Enable is available in the Dashboard.
Module update
If all modules are up to date, the Module update tile is green. If module updates are
suspended temporarily, the tile turns orange. If the update fails, the tile color changes
to red. Click the tile to see the details.
To launch the update of detection modules manually, click Module update > Check
and update, and wait till the update completes.
License
If the license is close to expiration, the License tile turns orange. If the license is
expired, the tile turns red. Click the tile to see available options on changing the
license.
Scans
Launch a new scan of all local drives manually from Scans > New Scan > Scan all
local drives.
Select Custom scan... where you can choose scan profile, define the location to be
scanned. If you select Scan with Cleaning, the cleaning level of selected scan profile
will be applied to each detected threat. Select Scan exclusions to scan everything,
including the configured exclusions.
• Local drives
• Network drives
• Removable media
• Boot sectors — the boot sector of every mounted drive/media will be scanned.
• Custom target — type in the desired path to be scanned and press the Tab key
on your keyboard.
24
Each executed scan is recorded in the Scans screen, including the information about
the number of found and cleaned threats. If the Cleaned column is highlighted red,
some infected files were not cleaned/deleted. To view more details of an entry, click
it, then click Show details.
• Overview - Shows the same information as seen in the Scans screen, plus the
number of disks scanned.
• Detections - Shows the details of detected infiltration and action taken against
it.
• Not scanned files - This tab is available from ESET File Security for Linux
version 7.1. Displays the details and reason of files that could not be scanned.
25
Syntax: /opt/eset/efs/bin/odscan [OPTIONS..]
Options -
Options - long form Description
short form
-l --list Show currently running scans
--list-profiles Show all available scan profiles
Show also scans executed by other user (requires root
--all
privileges)
Resume previously paused scan identified by
-r --resume=session_id
session_id
-p --pause=session_id Pause scan identified by session_id
-t --stop=session_id Stop scan identified by session_id
-s --scan Start scan
--profile=PROFILE Scan with selected PROFILE
Task will be run with the specified priority.
--profile-priority=PRIORITY
Priority can be: normal, lower, lowest, idle
--readonly Scan without cleaning
--local Scan local drives
--network Scan network drives
--removable Scan removable media
--boot-local Scan the boot sectors of local drive
--boot-removable Scan the boot sectors of removable media
--boot-main Scan the main boot sector
--exclude=FILE Skip selected file or directory
--ignore-exclusions Scan also excluded paths and extensions
Exit codes available from version 7.1.561
Exit codes Meaning
0 No threat found
1 Threat found and cleaned
10 Some files could not be scanned (may be threats)
50 Threat found
100 Error
Example
Run On-demand scan of /root/ directory recursively with "@Smart scan" scan profile as a background
process:
/opt/eset/efs/bin/odscan --scan --profile="@Smart scan" /root/ &
Run On-demand scan with "@Smart scan" scan profile regarding multiple destinations recursively:
/opt/eset/efs/bin/odscan --scan --profile="@Smart scan" /root/ /tmp/ /home/
List all running scans
/opt/eset/efs/bin/odscan -l
Pause scan with session-id "15". Each scan has its own unique session-id generated when it is started.
/opt/eset/efs/bin/odscan -p 15
Stop scan with session-id "15". Each scan has its own unique session-id generated when it is started.
/opt/eset/efs/bin/odscan -t 15
Run On-demand scan with an excluded directory /root/exc_dir and an excluded file /root/eicar.com:
/opt/eset/efs/bin/odscan --scan --exclude=/root/exc_dir --exclude=/root/eicar.com
Scan the boot sector of removable devices. Execute the command below as a privileged user.
sudo /opt/eset/efs/bin/odscan --scan --profile="@In-depth scan" --boot-removable
26
Scan profiles
Your preferred scan parameters (Threatsense parameters) can be saved for future
scanning. We recommend that you create a different profile (with various scan
targets, scan methods and other parameters) for each regularly used scan.
To create a new profile, click Setup > Detection engine > Malware scans > On-
demand scan > List of profiles.
Exclusions
Some exclusions and exclusion paths work differently in ESET File Security for Linux
version 7.0 and 7.1+.
File extension exclusions
This type of exclusion can be set up for Real-time file system protection and On-
demand scans.
2.Click:
• Real-time file system protection > Threatsense parameters to modify
exclusions related to Real-time file system protection
• Malware scans > On-demand scan > Threatsense parameters to modify
exclusions related to On-demand scan (custom scan)
3.Next to File extensions excluded from scanning, click Edit.
4.Click Add and type the extension to exclude. To define several
extensions at once, click Enter multiple values, and type the applicable
extensions separated by a new line or other separator you selected.
5.Click OK, then click Save to close the dialog.
6.Click Save to save the changes.
By excluding paths (folders) from being scanned, the time needed to scan the file
system for the presence of malware can be significantly decreased.
1.In the Web interface, click Setup > Detection Engine > Basic.
27
3.Click Add, define the Path to be skipped by the scanner. Optionally add a
comment for your information.
Detection exclusions
Detection exclusions allow you to exclude objects from cleaning (deletion or moving
to quarantine) by filtering the detection name, object path or its hash.
28
Detection exclusions object criteria
• Path – Detection exclusion for a specified path (or any if left empty).
• Detection name – A detected object will be excluded only if matches the defined
detection name. If the file becomes infected later with other malware, so its
detection name will not match the one in an exclusion rule anymore, it will be
detected as an infiltration and proper action will be taken against it. This type of
exclusion can only be used for certain types of detections. To add such detections to
the exclusion list, navigate to Quarantine, right-click a quarantined file and select
Restore and exclude. This option is displayed only for items the detection engine
evaluated as eligible for exclusion.
• Hash – Excludes a file based on a specified hash (SHA1), regardless of the file
type, location, name or its extension.
Exclusion paths
29
For ESET File Security for Linux v7.2
/root/* - The "root" directory and all of its sub-directories and their content.
/root/* - The "root" directory and all of its sub-directories and their content.
/root , /root/ - The "root" directory and all of its sub-directories and their content. .
This type of exclusions can help you to exclude desired files from being scanned for
presence of malicious software.
1.In the Web interface, click Setup > Detection Engine > Basic.
Detections
Every threat detected and action taken against it is recorded in the Detections
screen.
If a threat has been detected, but not cleaned, the whole row will by highlighted red.
To attempt cleaning of a detected malicious file, click the particular row, select
Rescan with cleaning.
To locate the file that has been detected as malicious, but not deleted yet, click the
related row, select Copy path and use a file browser to look up the file.
Quarantine
The main function of the quarantine is to safely store infected files. Files should be
quarantined if they cannot be cleaned, if it is not safe or advisable to delete them, or
if they are falsely detected by ESET File Security for Linux. You can choose to
quarantine any file. This is advisable if a file behaves suspiciously but is not detected
by the antivirus scanner. Quarantined files can be submitted for analysis to the ESET
Virus Lab.
The Quarantine screen displays a list of files stored in the quarantine folder. The list
displays: the date and time of quarantine, the path to the original location of the
quarantined file, reason of moving the file to quarantine, number of threats (for
example, if it is an archive containing multiple infiltrations), and size of quarantined
item.
Click the quarantined item to display the available actions: Restore, Restore and
Exclude, Copy path, Download, Delete from quarantine.
31
The Restore and Exclude option is displayed only for items the detection engine
evaluated as eligible for exclusion
Options -
Options - long form Description
short form
-i --import Import file to quarantine
-l --list Display list of files in quarantine
Restore quarantined item identified by id to
-r --restore=id
path defined by --restore-path
Restore quarantined item identified by id and
-e --restore-exclude=id
marked by 'x' in the excludable column
-d --delete=id Delete quarantined item identified by id
Wait for new items and append them to the
-f --follow
output
--restore-path=path New path to restore a quarantined item to
-h --help Show help and quit.
-v --version Show version information and quit
Example
/opt/eset/efs/bin/quar -d 0123456789
or
/opt/eset/efs/bin/quar --delete=0123456789
or
32
Restore a quarantined item with id "123456789" which is marked "x" in the
excludable column to the Download folder:
or
2.Look up the ID and name of the quarantined object you want to restore and run
the following command:
/opt/eset/efs/bin/quar --restore=ID_OF_OBJECT_TO_RESTORE --restore-
path=/final/path/of/restored/file
Events
Important actions taken in ESET File Security for Linux Web interface, failed login
attempts to Web interface, ESET File Security for Linux related commands executed
via Terminal and some more information is logged in the Events screen.
Each recorded action includes the following information: time the event occured,
component (if available), event, user
To display the content of Events screen via a Terminal window, use the lslog
command-line tool.
Options -
Options - long form Description
short form
Wait for new logs and append them to the
-f --follow
output
-o --optimize Optimize logs
-c --csv Display logs in CSV format.
33
-e --events List Event logs
-s --scans List On-Demand scan logs
-d --detections List Detection Log records
Examples
/opt/eset/efs/bin/lslog -e
Save all event logs in CSV format to a file in the Documents directory of current user:
Configuration
To alter the default configuration of ESET File Security for Linux navigate to the Setup
screen. You can adjust the detection behavior, alter product update and connection
settings, or change the password and certificate of Web interface. To apply the
changes, click Save in the Setup screen.
If you have configured ESET File Security for Linux according to your requirements
and you want to save the configuration for later use (or to use it with another instance
of ESET File Security for Linux), you can export it to an .xml file.
Execute the following commands with root privileges from a terminal window.
Export configuration
/opt/eset/efs/sbin/cfg --export-xml=/tmp/export.xml
Import configuration
/opt/eset/efs/sbin/cfg --import-xml=/tmp/export.xml
34
Available options
Detection engine
The default setup of detection behavior provides the essential level of security which
includes:
Every threat detected and action taken against it is logged in the Detections screen.
Exclusions
Some exclusions and exclusion paths work differently in ESET File Security for Linux
version 7.0 and 7.1+.
File extension exclusions
35
This type of exclusion can be set up for Real-time file system protection and On-
demand scans.
2.Click:
• Real-time file system protection > Threatsense parameters to modify
exclusions related to Real-time file system protection
• Malware scans > On-demand scan > Threatsense parameters to modify
exclusions related to On-demand scan (custom scan)
3.Next to File extensions excluded from scanning, click Edit.
4.Click Add and type the extension to exclude. To define several
extensions at once, click Enter multiple values, and type the applicable
extensions separated by a new line or other separator you selected.
5.Click OK, then click Save to close the dialog.
6.Click Save to save the changes.
By excluding paths (folders) from being scanned, the time needed to scan the file
system for the presence of malware can be significantly decreased.
1.In the Web interface, click Setup > Detection Engine > Basic.
3.Click Add, define the Path to be skipped by the scanner. Optionally add a
comment for your information.
Detection exclusions
Detection exclusions allow you to exclude objects from cleaning (deletion or moving
to quarantine) by filtering the detection name, object path or its hash.
36
How detection exclusions work
Detection exclusions do not exclude files and folders from scanning as
Performance exclusions do. Detection exclusions exclude objects from
being quarantined/deleted only when they are detected by the detection
engine and an appropriate rule is present in the exclusion list.
See the sample rules in the image below. The rule in the first row will
exclude an object that is detected as Eicar test file and is located at
/home/demo/Download/some.file. The rule in the second row will exclude
every detected object that has the corresponding SHA-1 hash, regardless
the detection name.
• Path – Detection exclusion for a specified path (or any if left empty).
• Detection name – A detected object will be excluded only if matches the defined
detection name. If the file becomes infected later with other malware, so its
detection name will not match the one in an exclusion rule anymore, it will be
detected as an infiltration and proper action will be taken against it. This type of
exclusion can only be used for certain types of detections. To add such detections to
the exclusion list, navigate to Quarantine, right-click a quarantined file and select
Restore and exclude. This option is displayed only for items the detection engine
37
evaluated as eligible for exclusion.
• Hash – Excludes a file based on a specified hash (SHA1), regardless of the file
type, location, name or its extension.
Exclusion paths
/root/* - The "root" directory and all of its sub-directories and their content.
/root/* - The "root" directory and all of its sub-directories and their content.
/root , /root/ - The "root" directory and all of its sub-directories and their content. .
This type of exclusions can help you to exclude desired files from being scanned for
presence of malicious software.
38
1.In the Web interface, click Setup > Detection Engine > Basic.
Real-time file system protection controls all antivirus-related events in the system. All
files are scanned for malicious code when they are opened, created, or run on your
computer. By default, Real-time file system protection launches at system start-up
and provides uninterrupted scanning. In special cases (for example, if there is a
conflict with another real-time scanner), real-time protection can be disabled by
disengaging Enable Real-time file system protection automatically in Setup >
Detection engine > Real-time file system protection > Basic.
Media to scan
We recommend that you use default settings and only modify them in specific cases,
such as when scanning certain media significantly slows data transfers.
Scan on
39
By default, all files are scanned upon opening, creation, or execution. We recommend
that you keep these default settings, as they provide the maximum level of real-time
protection for your computer:
*The feature is available from ESET File Security for Linux version 7.1.
Real-time file system protection checks all types of media and is triggered by various
system events such as accessing a file. Using ThreatSense technology detection
methods (as described in the ThreatSense parameters section), Real-time file system
protection can be configured to treat newly created files differently than existing files.
For example, you can configure Real-time file system protection to more closely
monitor newly created files.
To ensure a minimal system footprint when using real-time protection, files that have
already been scanned are not scanned repeatedly (unless they have been modified).
Files are scanned again immediately after each detection engine database update.
This behavior is controlled using Smart optimization. If Smart optimization is
disabled, all files are scanned each time they are accessed. To modify this setting,
navigate to Setup > Detection engine > Real-time file system protection, click
ThreatSense parameters > Other and select or deselect Enable Smart
optimization.
Cloud-based protection
When installing ESET File Security for Linux, select one of the following options:
• You can decide not to enable ESET LiveGrid®. Your software will not lose any
functionality, but in some cases ESET File Security for Linux may respond slower
to new threats than detection engine database update.
• You can configure ESET LiveGrid® to submit anonymous information about new
40
threats and where the new threatening code was detected. This file can be sent
to ESET for detailed analysis. Studying these threats will help ESET update its
threat detection capabilities.
ESET LiveGrid® will collect information about your computer related to newly-
detected threats. This information may include a sample or copy of the file in which
the threat appeared, the path to that file, the filename, the date and time, the process
by which the threat appeared on your computer and information about your
computer‘s operating system.
By default, ESET File Security for Linux is configured to submit suspicious files to the
ESET Virus Lab for analysis. Files with certain extensions such as .doc or .xls are
always excluded. You can also add other extensions if there are particular files that
you or your organization want to avoid sending.
41
Submit infected samples
This will submit all infected samples to ESET for analysis and to improve future
detection.
• All infected samples
• All samples except documents
• Do not submit
Submit suspicious samples
Suspicious samples resembling threats, and/or samples with unusual characteristics or
behavior are submitted to ESET for analysis.
• Executable -Includes executable files: .exe, .dll, .sys
• Archives - Includes archive file types: .zip, .rar, .7z, .arch, .arj, .bzip2, .gzip, .ace,
.arc, .cab
• Scripts - Includes script file types: .bat, .cmd, .hta, .js, .vbs, .js, .ps1
• Other - Includes file types: .jar, .reg, .msi, .swf, .lnk
• Documents - Includes documents created in Microsoft Office, Libre Office or other
office tool, or PDF's with active content.
Exclusions
Click Edit option next to Exclusions in ESET LiveGrid® allows you to configure how
threats are submitted to ESET Virus Labs for analysis.
Maximum size of samples (MB)
Define the maximum size of samples to be scanned.
Malware scans
This section provides options to select scan parameters for On-demand scan.
Selected profile
A particular set of parameters used by the On-demand scanner. You can use one of
the predefined scan profile or create a new profile. The scan profiles use different
ThreatSense engine parameters.
List of profiles
To create a new one, click Edit. Type name for profile and click Add. New profile
will be displayed in the Selected profile drop-down menu that lists existing scan
profiles.
ICAP scan
1.In the Web interface navigate to Setup > Detection Engine > Remote
Scanning.
42
2.Turn on the toggle key next to Enable remote scanning using ICAP service.
3.Click Edit next to Listen addresses and ports, click Add, define the address
and port of ICAP server. Cilck OK, then click Save.
5.Click Save.
Cleaning levels
No cleaning – Infected files will not be cleaned automatically. The number of found
threats will be highlighted red in the Detections occurred column, and the Cleaned
column will also be highlighted red, but displaying 0.
Strict cleaning – The program will clean or delete all infected files. The only
exceptions are the system files.
Rigorous cleaning – The program will clean or delete all infected files without any
exception.
Delete – The program will delete all infected files without any exception.
• Port - Number of the port used for communication (same as was set in Shared
43
local cache).
ThreatSense parameters
ThreatSense engine setup options allow you to specify several scan parameters:
To enter the setup window, click Setup > Detection engine, select one of the modules
mentioned below, click ThreatSense parameters. Different security scenarios may
require different configurations. With this in mind, ThreatSense is individually
configurable for the following protection modules:
ThreatSense parameters are highly optimized for each module, their modification can
significantly influence system operation. For example, changing parameters to always
scan runtime packers, or enabling advanced heuristics in the Real-time file system
protection module could result in system slow-down (normally, only newly-created
files are scanned using these methods).
Objects to scan
This section allows you to define which computer components and files will be
scanned for infiltrations.
Boot sectors/UEFI – Scans boot sectors/UEFI for the presence of viruses in the
master boot record.
Email files – The program supports the following extensions: DBX (Outlook Express)
and EML.
44
Archives – The program supports the following extensions: ARJ, BZ2, CAB, CHM,
DBX, GZIP, ISO/BIN/NRG, LHA, MIME, NSIS, RAR, SIS, TAR, TNEF, UUE, WISE, ZIP,
ACE, and many others.
Self-extracting archives – Self-extracting archives (SFX) are archives that can
extract themselves.
Runtime packers – After being executed, runtime packers (unlike standard archive
types) decompress in memory. In addition to standard static packers (UPX, yoda,
ASPack, FSG, etc.), the scanner is able to recognize several additional types of
packers through the use of code emulation.
Scan options
Select the methods used when scanning the system for infiltrations. The following
options are available:
Heuristics – A heuristic is an algorithm that analyzes the (malicious) activity of
programs. The main advantage of this technology is the ability to identify malicious
software which did not exist, or was not covered by the previous virus signatures
database. The disadvantage is a (very small) probability of false alarms.
Advanced heuristics/DNA signatures – Advanced heuristics are a unique
heuristic algorithm developed by ESET, optimized for detecting computer worms and
trojan horses and written in high-level programming languages. The use of advanced
heuristics greatly increases the threat detection capabilities of ESET products.
Signatures can reliably detect and identify viruses. Utilizing the automatic update
system, new signatures are available within a few hours of a threat discovery. The
disadvantage of signatures is that they only detect viruses they know (or slightly
modified versions of these viruses).
Potentially unwanted applications – see Potentially unwanted applications in our
glossary.
Potentially unsafe applications – see Potentially unsafe applications in our
glossary.
Exclusions
An extension is the part of a file name delimited by a period. An extension defines
the type and content of a file. This section of the ThreatSense parameter setup lets
you define the types of files to be excluded from scan.
Other
When configuring ThreatSense engine parameters setup for a On-demand computer
scan, the following options in Other section are also available:
Scan alternate data streams (ADS) – Alternate data streams used by the NTFS
file system are file and folder associations which are invisible to ordinary scanning
techniques. Many infiltrations try to avoid detection by disguising themselves as
alternate data streams.
45
Run background scans with low priority – Each scanning sequence consumes a
certain amount of system resources. If you work with programs that place a high
load on system resources, you can activate low priority background scanning and
save resources for your applications.
Log all objects – If this option is selected, the log file will show all the scanned files,
even those not infected. For example, if an infiltration is found within an archive, the
log will list also clean files contained within the archive.
Enable Smart optimization – With Smart Optimization enabled, the most optimal
settings are used to ensure the most efficient scanning level, while simultaneously
maintaining the highest scanning speeds. The various protection modules scan
intelligently, making use of different scanning methods and applying them to
specific file types. If the Smart Optimization is disabled, only the user-defined
settings in the ThreatSense core of the particular modules are applied when
performing a scan.
Preserve last access timestamp – Select this option to keep the original access
time of scanned files instead of updating them (for example, for use with data
backup systems).
Limits
The Limits section allows you to specify the maximum size of objects and levels of
nested archives to be scanned:
Object settings
Maximum object size – Defines the maximum size of objects to be scanned.
The given antivirus module will then scan only objects smaller than the size
specified. This option should only be changed by advanced users who may have
specific reasons for excluding larger objects from scanning. Default value:
unlimited.
Maximum scan time for object (sec.) – Defines the maximum time value for
scanning of an object. If a user-defined value has been entered here, the
antivirus module will stop scanning an object when that time has elapsed,
regardless of whether the scan has finished. Default value: unlimited.
Archive scan setup
Archive nesting level – Specifies the maximum depth of archive scanning.
Default value: 10.
Maximum size of file in archive – This option allows you to specify the
maximum file size for files contained in archives (when they are extracted) that
are to be scanned. Default value: unlimited.
46
Note
We do not recommend changing the default values; under normal
circumstances, there should be no reason to modify them.
Update
By default, the Update type is set to Regular update. This ensures the detection
signature database and product modules are updated automatically on a daily bases
directly from ESET update servers.
Pre-release updates include most recent bug fixes and/or detection methods that will
be available to the general public soon. However, they might not be stable at all
times, therefore it is not recommended to use them in a production environment.
Delayed updates allow updating from special update servers providing new versions
of virus databases with a delay of at least X hours (that is, databases tested in a real
environment and considered stable).
If an ESET File Security for Linux update was not stable, roll back the module updates
to a previous state. Click Dashboard > Modules update > Module rollback, select
the desired duration, click Rollback now.
You can define up to two alternative update sources, a primary and secondary server.
Tools
In Setup > Tools section of ESET File Security for Linux Web interface you can
modify the general configuration of ESET File Security for Linux.
47
• Change the password and/or certificate of Web interface
Proxy Server
Configure ESET File Security for Linux to use your proxy server to connect to the
internet or the defined update servers (mirror). To adjust parameters, click Setup >
Tools > Proxy server.
Web Interface
To change the IP address and port of ESET File Security for Linux Web interface, or
add additional addresses on which the Web interface is supposed to be available, click
Edit next to Listen addresses and ports. Click Add, type in the proper address and
port, click OK and then click Save. Click Save in the Setup screen.
To update the Web interface password, click Change password. Type in a new
password, click Save.
To import a new certificate and corresponding private key, use the Certificate and
Private key buttons. If the certificate is password protected, type the password to
the Certificate password field. Click Save in the Setup screen.
If you switch the toggle next to Enable web interface and click Save in the Setup
screen, you will be logged out immediately and the Web interface will not be available
anymore.
You can enable the Web interface again via a Terminal window.
48
If you complete the installation of ESET File Security for Linux remotely via ESET
Security Management Center, the Web interface is not enabled.
If you want to access the Web interface on the particular machine, run the following
command from a terminal window:
sudo /opt/eset/efs/sbin/setgui -gre
The final output will show the URL address of Web interface and the access
credentials.
To make the Web interface available at a custom IP address and port, for example
10.1.184.230:9999, run the following command from a terminal window:
sudo /opt/eset/efs/sbin/setgui -i 10.1.184.230:9999
To enable the Web interface via ESET Security Management Center, use the Run
Command task to execute the following command:
/opt/eset/efs/sbin/setgui -re --password=<password>
where <password> represents the desired password defined by you.
Available options for the setgui command.
Options -
Options - long form Description
short form
Generate a new password to access
-g --gen-password
the Web interface
Define a new password to access the
-p --password=PASSWORD
Web interface
Set a new password read from a file to
-f --passfile=FILE
access the Web interface
Generate a new private key and a
-r --gen-cert
certificate
-a --cert-password=PASSWORD Set certificate password
-l --cert-passfile=FILE Set certificate password read from file
-i --ip-address=IP:PORT Server address (IP and port number)
-c --cert=FILE Import certificate
-k --key=FILE Import private key
-d --disable Disable Web interface
-e --enable Enable Web interface
Log files
Logging verbosity defines the level of details the log files include regarding ESET File
Security for Linux.
49
• Critical warnings - Includes only critical errors (for example, failed to start
antivirus protection).
To hide log entries older than the specified number of days from the Events screen or
log list (lslog), turn on the Automatically delete records older than (days)
toggle. Adjust the day to specify age of files to be hidden. Click Save.
Hidden logs cannot be displayed again. Log entries of On-demand scan are deleted
right away. To prevent piling up of hidden logs, turn on the automatic optimization of
log files.
Syslog Facility
Syslog facility is a syslog logging parameter which is used to group similar log
messages. For example, logs from daemons (which collect logs via syslog facility
daemon) can go to /var/log/daemon.log if configured so. With recent switch to
systemd and its journal, syslog facility is less important but still can be used for
filtering logs.
50
Scheduler
ESET File Security for Linux v7.1+ allows periodic weekly custom scans on defined
days and times.
Schedule a scan
1.In the Web interface, click Setup > Tools > Scheduler.
3.Click Add.
4.Name the schedule, set a time and select the days on which the custom scan will
be automatically triggered. Click Next.
6.Select Scan targets, and/or defined custom targets separated by a new line.
To modify any scheduled task, in step 3 above, select the particular task and click
Edit. Continue with the remainder of steps.
To remove a scheduled task, in step 3 above, select the particular task and click
Remove. Continue with steps 8 and 9.
Schedule on-demand scan with ESET File Security for Linux v7.0.
51
ESET File Security for Linux allows you to configure a custom IP address and port for
both, the Web interface and ICAP server.
Remote Management
To manage ESET File Security for Linux remotely, connect the computer hosting your
ESET security product to ESET Security Management Center (ESMC).
From this time on you can execute applicable client tasks regarding ESET File Security
for Linux.
You can scan the files you store on an Isilon cluster for computer viruses, malware,
and other security threats by integrating with ESET File Security for Linux through the
Internet Content Adaptation Protocol (ICAP).
Prerequisite
1.ESET File Security for Linux is installed and its Web interface is enabled.
In this example ICAP server will listen on IP address 10.1.169.28 and on port 1344.
1.Click Setup > Detection Engine > Remote scanning, turn on both Enable
remote scanning using ICAP service and Dell EMC Isilon compatibility.
52
3.Click Add.
4.Type the applicable IP address and port. In our example, the IP address is
10.1.168.28, and port is 1344.
5.Click Save.
1.Log in to OneFS administration panel, click Data Protection > Antivirus >
ICAP Servers > Add an ICAP Server.
2.Select Enable ICAP Server, and enter the URL address of ICAP server to the ICAP
Server URL field using the following pattern:
icap://<IP_ADDRESS>:<PORT>/scan
5.Type into Path prefixes the path to scan. To scan all paths, type "/ifs" (without
quotation marks).
When a file is written to (or accessed on) the EMC Isilon cluster, OneFS queues the file
to be scanned, and sends the file to the ICAP server configured in both OneFs and
ESET File Security for Linux. ESET File Security for Linux scans the file and provides
feedback on the scanned file to EMC Isilon. OneFS decides how to deal with the
scanned files based on threat response settings.
53
Test your setup
To test your setup, you need to have access from your computer to OneFS cluster
through one of the supported protocols. In our example, we will use the NFS protocol.
1.Configure NFS:
b.Leave the default settings, verify the path is /ifs, click Save.
$ mkdir isilon
3.Test scan:
a.Get eicar antivirus test file from www.eicar.org, copy it to Isilon's NFS share
and try to read its content.
$ wget www.eicar.org/download/eicar.com
$ cp eicar.com isilon
$ cat isilon/eicar.com
b.Based on your OneFS antivirus settings, the result will be either permission
denied on that file (default), or the file will be truncated or deleted. For example:
c.To check the detected threat, log in to OneFS administration panel, click Data
Protection > Antivirus.
If for any reason you need to retrieve information about a particular module of ESET
File Security for Linux v7.0, execute the following command from a Terminal window:
54
Example
grep -asi -A3 "version" /var/opt/eset/efs/lib/em000_64.dat
Output:
version: 1073 (20190506)
build: 1122
date (dd.mm.yyyy): 06.05.2019
type: loader module
For ESET File Security for Linux v7.1+ use the upd utility with -l parameter in a
Terminal window to list all modules and their versions.
/opt/eset/efs/bin/upd -l
Schedule scan
ESET File Security for Linux v7.1+ has a built-in scheduler to execute periodic custom
scans on defined days and times. For ESET File Security for Linux v7.0 follow the
instructions below.
To set up a scheduled task, edit the cron table (crontab) via a Terminal window.
If you are editing the cron table for the first time, you will be presented with the
option to choose an editor by pressing the corresponding number. Select an editor
you have experience with, for example, we refer to the Nano editor below when
saving changes.
1.To edit the cron table, execute the following command from a Terminal window
as a privileged user who can access the folders to be scanned:
sudo crontab -e
2.Use the arrow keys to navigate below the text in crontab, and type the following
command:
55
Schedule smart scan of a particular folder every night 11pm
1.To edit the cron table, execute the following command from a Terminal window
as a privileged user who can access the folders to be scanned:
sudo crontab -e
2.Use the arrow keys to navigate below the text you see in crontab, and type the
following command:
Base directory
The directory where ESET File Security for Linux loadable modules containing the virus
signature database are stored.
/var/opt/eset/efs/lib
Cache directory
The directory where cache of ESET File Security for Linux and temporary files (such as
quarantine files or reports) are stored.
/var/opt/eset/efs/cache
The directory where the relevant ESET File Security for Linux binary files are stored.
/opt/eset/efs/bin
56
• lslog — use it to display logs gathered by ESET File Security for Linux
The directory where the relevant ESET File Security for Linux system binary files are
stored.
/opt/eset/efs/sbin
• setgui — use it to enable/disable ESET File Security for Linux Web interface and
manage related operations.
• startd — use it to start ESET File Security for Linux deamon manually in case it
was stopped.
To see if ESET File Security for Linux service is active, run the following command
from a Terminal window with root privileges:
or
/etc/init.d/efs status
Deamons
57
• sbin/startd – Main daemon, starts and manages other deamons
Command-line utilities
58
Troubleshooting
This section describes how to troubleshoot the various issues below.
• Forgotten password
• Update failed
• Collect logs
Collect logs
If ESET Technical Support requests logs from ESET File Security for Linux, use the
collect_logs.sh script available at /opt/eset/efs/sbin/ to generate the logs.
Launch the script from a terminal window with root privileges. For example, in Ubuntu
run the following command:
sudo /opt/eset/efs/sbin/collect_logs.sh
The script generates all essential logs as an archive file to the home folder of being
logged in user, and it will display the path to it. Send that file to ESET Technical
Support via e-mail.
Activation logs
To help you troubleshoot product activation issues, related logs might be requested
by ESET Technical Support.
59
4.Restart the efs service. Execute the following command from a Terminal window
as a privileged user:
sudo systemctl restart efs
5.Try the activation process again. If it fails, run the log collecting script as a
privileged user:
sudo /opt/eset/efs/sbin/collect_logs.sh
Forgot my password
To reset the Web interface password, open a Terminal window on the machine where
ESET File Security for Linux is installed.
• To generate a new password, run the following command with root privileges:
/opt/eset/efs/sbin/setgui -g
• To define a new password, run the following command with root privileges:
/opt/eset/efs/sbin/setgui --password=PASSWORD
while PASSWORD is supposed to be replaced with the desired password.
The final output will show the URL address of the Web interface and access
credentials.
Update failed
If for any reason product modules fail to update, information will be provided in the
dashboard.
Recent update attempts failed - ESET File Security for Linux has not been able to
connect to the update server recently to check for the latest virus signature updates.
Check your network connectivity and then try to update the modules again by clicking
Check and update.
Detection Engine out of date - The Detection Engine has not been updated for
some time. Check your network connectivity and then try to update the modules
again by clicking Check and update.
60
Using the noexec flag
If you have the /var and /tmp paths mounted with noexec flag, the installation of ESET
File Security for Linux fails with the following error message:
Workaround
1.Create a folder where exec is enabled with the following owner and permission
set:
/usr/lib/efs drwxrwxr-x. root eset-efs-daemons
# mkdir /usr/lib/efs
# chgrp eset-efs-daemons /usr/lib/efs
# chmod g+w /usr/lib/efs/
a.In case SELinux is enabled, set the context for this folder:
Environment=MODMAPDIR=/usr/lib/efs
# systemctl daemon-reload
61
Real-time protection is unable to start due to missing kernel files.
The Events screen in the Web interface of ESET File Security for Linux displays an
error message similar to the one in one of the screenshots below:
Jul 15 15:42:30 localhost efs: ESET File Security error: cannot find kernel sources
directory for kernel version 3.10.0-957.el7.x86_64
Jul 15 15:42:30 localhost efs: ESET File Security error: please check if kernel-devel (or
linux-headers) package version matches the current kernel version
Jul 15 15:42:30 localhost oaeventd[31471]: ESET File Security Error: Cannot open file
/lib/modules/3.10.0-957.el7.x86_64/eset/efs/eset_rtp.ko: No such file or directory
Solution
1.Upgrade the packages of your operating system to the latest version. On CentOS
7, execute the following command from a Terminal window as a privileged user:
yum upgrade
62
Method 2
1.Install the latest kernel-dev modules (on RPM-based Linux distributions) or the
latest kernel-headers (on DEB based Linux distributions). On Oracle Linux, execute
the following command from a Terminal window as a privileged user:
If a machine protected by ESET File Security for Linux is slow to respond and the CPU
is constantly overloaded, you can disable Realtime protection at boot for
troubleshooting purposes.
1.Start the computer and wait for the GRUB menu to appear.
3.Go down to the line starting with linux and add the eset_rtp=0 parameter to
the end of the line.
NOTE
Modifying the GRUB might slightly differ on some Linux distributions.
Known issues
ESET File Security for Linux v7.1
63
• ESET File Security for Linux is not available within Install package on
Repository in the ESET Security Management Center (ESMC) software install task.
However, it is possible to install ESET File Security for Linux using the Install by
direct package URL option and using the following package URL:
https://download.eset.com/com/eset/apps/business/efs/linux/v7/latest/efs.x86_64.bin
• Activation with Subscription license will activate ESET File Security for Linux,
however ESET File Security for Linux is reporting a "License expired" message in
both the Web interface and ESMC, and the expiration date is "-". Modules are
updated properly.
• Cannot change ESET File Security for Linux Web interface password through ESET
Security Management Center
Glossary
• Daemon: A type of program on Unix-like operating systems that runs
unobtrusively in the background, rather than under the direct control of a user,
waiting to be activated by the occurrence of a specific event or condition.
Under the terms of this End User License Agreement (hereinafter referred to as "the
Agreement") executed by and between ESET, spol. s r. o., having its registered office
at Einsteinova 24, 851 01 Bratislava, Slovak Republic, registered in the Commercial
64
Register administered by Bratislava I District Court, Section Sro, Entry No 3586/B,
Business Registration Number: 31333532 (hereinafter referred to as "ESET" or "the
Provider") and you, a physical person or legal entity (hereinafter referred to as "You"
or "the End User"), You are entitled to use the Software defined in Article 1 of this
Agreement. The Software defined in Article 1 of this Agreement can be stored on a
data carrier, sent via electronic mail, downloaded from the Internet, downloaded from
the Provider's servers or obtained from other sources, subject to the terms and
conditions specified below.
THIS IS AN AGREEMENT ON END USER RIGHTS AND NOT AN AGREEMENT FOR SALE.
The Provider continues to own the copy of the Software and the physical media
contained in the sales package and any other copies that the End User is authorized
to make pursuant to this Agreement.
By clicking on "I Accept" or "I Accept…" while installing, downloading, copying or using
the Software, You agree to the terms and conditions of this Agreement. If You do not
agree to all of the terms and conditions of this Agreement, immediately click on the
canceling option, cancel the installation or download, or destroy or return the
Software, installation media, accompanying documentation and sales receipt to the
Provider or the outlet from which You acquired the Software.
YOU AGREE THAT YOUR USE OF THE SOFTWARE ACKNOWLEDGES THAT YOU HAVE
READ THIS AGREEMENT, UNDERSTAND IT AND AGREE TO BE BOUND BY ITS TERMS
AND CONDITIONS.
1. Software. As used in this Agreement the term "Software" means: (i) computer
program accompanied by this Agreement and all components thereof; (ii) all the
contents of the disks, CD-ROMs, DVDs, e-mails and any attachments, or other media
with which this Agreement is provided, including the object code form of the Software
supplied on a data carrier, via electronic mail or downloaded via the Internet; (iii) any
related explanatory written materials and any other possible documentation related to
the Software, above all any description of the Software, its specifications, any
description of the Software properties or operation, any description of the operating
environment in which the Software is used, instructions for use or installation of the
Software or any description of how to use the Software (hereinafter referred to as "
Documentation "); (iv) copies of the Software, patches for possible errors in the
Software, additions to the Software, extensions to the Software, modified versions of
the Software and updates of Software components, if any, licensed to You by the
Provider pursuant to Article 3 of this Agreement. The Software shall be provided
exclusively in the form of executable object code.
3. License. Subject to the condition that You have agreed to the terms of this
Agreement and You comply with all the terms and conditions stipulated herein, the
Provider shall grant You the following rights (hereinafter referred to as "License"):
a) Installation and use. You shall have the non-exclusive, non-transferable right to
install the Software on the hard disk of a Computer or other permanent medium for
data storage, installation and storage of the Software in the memory of a computer
system and to implement, store and display the Software.
b) Stipulation of the number of licenses. The right to use the Software shall be
bound by the number of End Users. One End User shall be taken to refer to the
following: (i) installation of the Software on one computer system; or (ii) if the extent
of a license is bound to the number of mail boxes, then one End User shall be taken to
refer to a computer user who accepts electronic mail via a Mail User Agent
(hereinafter referred to as "MUA"). If MUA accepts electronic mail and subsequently
distributes it automatically to several users, then the number of End Users shall be
determined according to the actual number of users for whom the electronic mail is
distributed. If a mail server performs the function of a mail gate, the number of End
Users shall equal the number of mail server users for which the said gate provides
services. If an unspecified number of electronic mail addresses are directed to and
accepted by one user (e.g., through aliases) and messages are not automatically
distributed by the client to a larger number of users, a License for one computer shall
be required. You must not use the same License at the same time on more than one
Computer. The End User is entitled to enter the License key to the Software only to
the extent in which has the right to use the Software in accordance the limitation
arising from the number of Licenses granted by Provider. The License key is deemed
confidential, You must not share the License with third parties or allow third parties to
use the License key unless permitted by this Agreement or Provider. If your License
key is compromised, notify Provider immediately.
e) OEM Software. OEM Software shall be limited to the Computer You obtained it
with. It cannot be transferred to a different Computer.
g) Termination of the License. The License shall terminate automatically at the end
of the period for which granted. If You fail to comply with any of the provisions of this
Agreement, the Provider shall be entitled to withdraw from the Agreement, without
prejudice to any entitlement or legal remedy open to the Provider in such
eventualities. In the event of cancellation of the License, You must immediately
delete, destroy or return at your own cost, the Software and all backup copies to ESET
or to the outlet from which You obtained the Software. Upon termination of the
License, the Provider shall be also entitled to cancel the End User's entitlement to use
the functions of the Software, which require connection to the Provider's servers or
third-party servers.
a) Updates to the Software. The Provider shall be entitled from time to issue
updates to the Software ("Updates"), but shall not be obliged to provide Updates. This
function is enabled under the Software's standard settings and Updates are therefore
installed automatically, unless the End User has disabled automatic installation of
Updates. For the purpose of provisioning of Updates, License authenticity verification
is required including information about Computer and/or the platform on which the
Software is installed in compliance with Privacy Policy.
67
obtained personal data) about the End User or other users of the Computer on which
the Software is installed, and files affected by Infiltrations with associated metadata.
ii. LiveGrid Feedback System function includes collection and sending of Infiltrations
with associated metadata and Information to Provider. This function may be activated
by End User during the process of installation of the Software.
The Provider shall only use Information and Infiltrations received for the purpose of
analysis and research of Infiltrations, improvement of Software and License
authenticity verification and shall take appropriate measures to ensure that
Infiltrations and Information received remain secure. By activating this function of the
Software, Infiltrations and Information may be collected and processed by the Provider
as specified in Privacy Policy and in compliance with relevant legal regulations. You
can deactivate these functions at any time.
For the purpose of this Agreement, it is necessary to collect, process and store data
enabling the Provider to identify You in compliance with Privacy Policy. You hereby
acknowledge that the Provider checks using its own means whether You are using the
Software in accordance with the provisions of this Agreement. You hereby
acknowledge that for the purpose of this Agreement it is necessary for your data to be
transferred, during communication between the Software and the Provider's computer
systems or those of its business partners as part of Provider’s distribution and support
network to ensure functionality of Software and authorization to use the Software and
to protection of the Provider’s rights.
Following conclusion of this Agreement, the Provider or any of its business partners as
part of Provider’s distribution and support network shall be entitled to transfer,
process and store essential data identifying You for billing purposes, performance of
this Agreement and transmitting notifications on your Computer. You hereby agree to
receive notification and messages including but not limited to marketing information.
Details about privacy, personal data protection and Your rights as a data
subject can be found in Privacy Policy which is available on Provider’s
website and accessible directly from the installation process. You can also
visit it from Software’s help section.
5. Exercising End User rights. You must exercise End User rights in person or via
your employees. You are only entitled to use the Software to safeguard your
68
operations and protect those Computers or computers systems for which You have
obtained a License.
6. Restrictions to rights. You may not copy, distribute, extract components or make
derivative works of the Software. When using the Software, You are required to
comply with the following restrictions:
a) You may make one copy of the Software on a permanent storage medium as an
archival back-up copy, provided your archival back-up copy is not installed or used on
any Computer. Any other copies You make of the Software shall constitute breach of
this Agreement.
b) You may not use, modify, translate or reproduce the Software or transfer rights to
use the Software or copies of the Software in any manner other than as provided for
in this Agreement.
c) You may not sell, sub-license, lease or rent or borrow the Software or use the
Software for the provision of commercial services.
d) You may not reverse engineer, reverse compile or disassemble the Software or
otherwise attempt to discover the source code of the Software, except to the extent
that this restriction is expressly prohibited by law.
e) You agree that You will only use the Software in a manner that complies with all
applicable laws in the jurisdiction in which You use the Software, including, but not
limited to, applicable restrictions concerning copyright and other intellectual property
rights.
f) You agree that You will only use the Software and its functions in a way which does
not limit the possibilities of other End Users to access these services. The Provider
reserves the right to limit the scope of services provided to individual End Users, to
enable use of the services by the highest possible number of End Users. Limiting the
scope of services shall also mean complete termination of the possibility to use any of
the functions of the Software and deletion of Data and information on the Provider's
servers or third-party servers relating to a specific function of the Software.
g) You agree not exercise any activities involving use the License key, contrary to the
terms of this Agreement or leading to provide License key to any person who is not
entitled to use the Software, such as the transfer of used or unused License key in any
form, as well as the unauthorized reproduction, or distribution of duplicated or
generated License keys or using the Software as a result of the use of a License key
obtained from the source other than the Provider.
7. Copyright. The Software and all rights, without limitation including proprietary
69
rights and intellectual property rights thereto are owned by ESET and/or its licensors.
They are protected by international treaty provisions and by all other applicable
national laws of the country in which the Software is being used. The structure,
organization and code of the Software are the valuable trade secrets and confidential
information of ESET and/or its licensors. You must not copy the Software, except as
set forth in Article 6(a). Any copies which You are permitted to make pursuant to this
Agreement must contain the same copyright and other proprietary notices that
appear on the Software. If You reverse engineer, reverse compile, disassemble or
otherwise attempt to discover the source code of the Software, in breach of the
provisions of this Agreement, You hereby agree that any information thereby obtained
shall automatically and irrevocably be deemed to be transferred to and owned by the
Provider in full, from the moment such information comes into being, notwithstanding
the Provider's rights in relation to breach of this Agreement.
8. Reservation of rights. The Provider hereby reserves all rights to the Software,
with the exception of rights expressly granted under the terms of this Agreement to
You as the End User of the Software.
11. END USER DECLARATIONS. AS THE END USER YOU ACKNOWLEDGE THAT THE
SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
IMPLIED, AND TO THE MAXIMUM EXTENT PERMITTED BY APPLICABLE LAW. NEITHER
THE PROVIDER, ITS LICENSORS OR AFFILIATES, NOR THE COPYRIGHT HOLDERS MAKE
ANY REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, INCLUDING BUT NOT
LIMITED TO THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR
PURPOSE OR THAT THE SOFTWARE WILL NOT INFRINGE ANY THIRD-PARTY PATENTS,
COPYRIGHTS, TRADEMARKS OR OTHER RIGHTS. THERE IS NO WARRANTY BY THE
PROVIDER OR BY ANY OTHER PARTY THAT THE FUNCTIONS CONTAINED IN THE
SOFTWARE WILL MEET YOUR REQUIREMENTS OR THAT THE OPERATION OF THE
SOFTWARE WILL BE UNINTERRUPTED OR ERROR-FREE. YOU ASSUME ALL
70
RESPONSIBILITY AND RISK FOR THE SELECTION OF THE SOFTWARE TO ACHIEVE YOUR
INTENDED RESULTS AND FOR THE INSTALLATION, USE AND RESULTS OBTAINED FROM
IT.
12. No other obligations. This Agreement creates no obligations on the part of the
Provider and its licensors other than as specifically set forth herein.
14. Nothing contained in this Agreement shall prejudice the statutory rights of any
party dealing as a consumer if running contrary thereto.
15. Technical support. ESET or third parties commissioned by ESET shall provide
technical support at their own discretion, without any guarantees or declarations. The
End User shall be required to back up all existing data, software and program facilities
prior to the provision of technical support. ESET and/or third parties commissioned by
ESET cannot accept liability for damage or loss of data, property, software or
hardware or loss of profits due to the provision of technical support. ESET and/or third
parties commissioned by ESET reserve the right to decide that resolving the problem
is beyond the scope of technical support. ESET reserves the right to refuse, suspend
or terminate the provision of technical support at its own discretion. License
information, Information and other data in compliance with Privacy Policy may be
required for the purpose of technical support provision.
16. Transfer of the License. The Software can be transferred from one Computer to
another, unless contrary to the terms of the Agreement. If not contrary to the terms of
the Agreement, the End User shall only be entitled to permanently transfer the
License and all rights ensuing from this Agreement to another End User with the
Provider's consent, subject to the condition that (i) the original End User does not
retain any copies of the Software; (ii) the transfer of rights must be direct, i.e. from
the original End User to the new End User; (iii) the new End User must assume all the
71
rights and obligations incumbent on the original End User under the terms of this
Agreement; (iv) the original End User has to provide the new End User with
documentation enabling verification of the genuineness of the Software as specified
under Article 17.
17. Verification of the genuineness of the Software. The End User may
demonstrate entitlement to use the Software in one of the following ways: (i) through
a license certificate issued by the Provider or a third party appointed by the Provider;
(ii) through a written license agreement, if such an agreement was concluded; (iii)
through the submission of an e-mail sent by the Provider containing licensing details
(user name and password). License information and End User identification data in
compliance with Privacy Policy may be required for the purpose of Software
genuineness verification.
18. Licensing for public authorities and the US Government. The Software shall
be provided to public authorities, including the United States Government, with the
license rights and restrictions described in this Agreement.
a) You will not, directly or indirectly, export, re-export, transfer or otherwise make
available the Software to any person, or use it in any manner, or be involved in any
act, that could result in ESET or its holding companies, its subsidiaries, and the
subsidiaries of any of its holding companies, as well as entities controlled by its
holding companies (hereinafter referred to as "Affiliates") being in violation of, or
being subject to negative consequences under, Trade Control Laws which includes
i. any laws that control, restrict, or impose licensing requirements on export, re-export
or transfer of goods, software, technology, or services, issued or adopted by any
government, state or regulatory authority of the United States of America, Singapore,
the United Kingdom, the European Union or any of its Member States, or any country
in which obligations under the Agreement are to be performed, or in which ESET or
any of its Affiliates are incorporated or operate (hereinafter referred to as "Export
Control Laws") and
ii. any economic, financial, trade or other, sanction, restriction, embargo, import or
export ban, prohibition on transfer of funds or assets or on performing services, or
equivalent measure imposed by any government, state or regulatory authority of the
United States of America, Singapore, the United Kingdom, the European Union or any
of its Member States, or any country in which obligations under the Agreement are to
be performed, or in which ESET or any of its Affiliates are incorporated or operate
(hereinafter referred to as "Sanction Laws").
b) ESET shall have the right to suspend its obligations under, or terminate, these
72
Terms with immediate effect in the event that:
i. ESET determines that, in its reasonable opinion, the User has breached or is likely to
breach provision of Article 19.a of the Agreement; or
ii. the End User and/or the Software become subject to Trade Control Laws and, as a
result, ESET determines that, in its reasonable opinion, the continued performance of
its obligations under the Agreement could result in ESET or its Affiliates being in
violation of, or being subject to negative consequences under, Trade Control Laws.
20. Notices. All notices and return of the Software and Documentation must be
delivered to: ESET, spol. s r. o., Einsteinova 24, 851 01 Bratislava, Slovak Republic.
22. General provisions. Should any of the provisions of this Agreement be invalid or
unenforceable, this shall not affect the validity of the other provisions of the
Agreement, which shall remain valid and enforceable under the conditions stipulated
therein. In case of a discrepancy between language versions of this Agreement, the
English version shall prevail. This Agreement may only be modified in written form,
signed by an authorized representative of the Provider, or a person expressly
authorized to act in this capacity under the terms of a power of attorney.
This is the entire Agreement between the Provider and You relating to the Software
and it supersedes any prior representations, discussions, undertakings,
communications or advertising relating to the Software.
73
Privacy Policy
ESET, spol. s r. o., having its registered office at Einsteinova 24, 851 01 Bratislava,
Slovak Republic, registered in the Commercial Register administered by Bratislava I
District Court, Section Sro, Entry No 3586/B, Business Registration Number: 31333532
as a Data Controller ("ESET" or "We") would like to be transparent when it comes to
processing of personal data and privacy of our customers. To achieve this goal, We
are publishing this Privacy Policy with the sole purpose of informing our customer
("End User" or "You") about following topics:
• Data Confidentiality,
Services provided by ESET implemented in our product are provided under the terms
of End User License Agreement ("EULA"), but some of them might require specific
attention. We would like to provide You with more details on data collection connected
with the provision of our services. We render various services described in the EULA
and product documentation such as update/upgrade service, ESET LiveGrid®,
protection against misuse of data, support, etc. To make it all work, We need to
collect the following information:
74
oinformation about devices in local network such as type, vendor, model and/or
name of device;
oinformation concerning the use of internet such as IP address and geographic
information, IP packets, URLs and ethernet frames;
ocrash dump files and information contained.
We do not desire to collect your data outside of this scope but sometimes it is
impossible to prevent it. Accidentally collected data may be included in malware itself
(collected without your knowledge or approval) or as part of filenames or URLs and
We do not intend it to form part of our systems or process it for the purpose declared
in this Privacy Policy.
ESET is a company operating worldwide via affiliated entities or partners as part of our
distribution, service and support network. Information processed by ESET may be
transferred to and from affiliated entities or partners for performance of the EULA
such as provision of services or support or billing. Based on your location and service
You choose to use, We might be required to transfer your data to a country with
absence of adequacy decision by the European Commission. Even in this case, every
transfer of information is subject to regulation of data protection legislation and takes
place only if required. Standard Contractual Clauses, Binding Corporate Rules or
another appropriate safeguard must be established without any exception.
We are doing our best to prevent data from being stored longer than necessary while
providing services under the EULA. Our retention period might be longer than the
validity of your license just to give You time for easy and comfortable renewal.
Minimized and pseudonymized statistics and other data from ESET LiveGrid® may be
further processed for statistical purposes.
75
freedoms, We are ready to notify supervisory authority as well as data subjects. As a
data subject, You have a right to lodge a complaint with a supervisory authority.
ESET is subject to regulation of Slovak laws and We are bound by data protection
legislation as part of European Union. Subject to conditions laid down by applicable
data protection laws, You are entitled to following rights as a data subject:
• right to rectification of your personal data if inaccurate (You also have the right to
have the incomplete personal data completed),
• right to request erasure of your personal data,
If You would like to exercise your right as a data subject or You have a question or
concern, send us a message at:
76