Do you have a question about the ESET FILE SECURITY and is the answer not in the manual?
Real-time Protection | Yes |
---|---|
Advanced Machine Learning | Yes |
Multi-layered Defense | Yes |
Ransomware Shield | Yes |
Web Control | Yes |
Botnet Protection | Yes |
Exploit Blocker | Yes |
Device Control | Yes |
Antivirus | Yes |
Antispyware | Yes |
Anti-Phishing | Yes |
File Server Security | Yes |
Cloud-Powered Scanning | Yes |
Network Attack Protection | Yes |
Two-Way Firewall | No |
Anti-Spam | No |
Management | ESET PROTECT |
Category | Software |
Supported Operating Systems | Windows Server |
Deployment Options | Remote |
System Requirements | 1 GHz processor, 512 MB RAM |
License | Subscription-based |
Main ESETS system control and scanning daemon.
Directory storing ESET File Security configuration files.
Main ESET File Security configuration file.
The core of ESET File Security is the daemon esets_daemon.
Proper configuration is important for a smooth-running security system.
The most important configuration file controlling product functionality.
Scans file system objects on user or system demand.
Monitors file access using the Dazuko kernel module.
Alternative on-access scanner using LIBC library.
Filters scanned objects based on their status.
Allows defining scanner parameters based on user access.
Provides user-friendly configuration and management.
Supports file security management in large networks.
Utility for keeping the virus signature database up to date.