This chapter describes the On-demand and On-access scanner conguration which will
provide the most eective protection from virus and worm le system infections. ESET File
Security's scanning power is derived from the On-demand scanner command 'esets_scan' and
the On-access scanner command 'esets_dac'.TheLinuxversionofESETFileSecurityoersan
additional On-access scanner technique which uses the preloaded library module libesets_pac.
so. All of these commands are described in the following sections.
5.1. On-demand scanner
The On-demand scanner can be invoked by a privileged user (usually a system administrator)
through the command line interface or by the operating system's automatic scheduling tool
(e.g.,cron).Thus,theterm"On-demand"referstolesystemobjectswhicharescannedonuser
or system demand.
The On-demand scanner does not require special congurationin order to run. After the
ESETS package has been properly installed and a valid license has been moved to the license
keys directory (@ETCDIR@/license), the On-demand scanner can be run immediately using the
command line interface or scheduler tool. To run the On-demand scanner from the command
line, use the following syntax:
@SBINDIR@/esets_scan [option(s)] FILES
whereFILESisalistofdirectoriesand/orlestobescanned.
Multiple command line options are available using ESETS On-demand scanner. To see the full
listofoptions,seepageXesets_scan(8).
5.2. On-access scanner powered by Dazuko
The On-access scanner is invoked by user(s) access and/or operating system access to file
systemobjects.Thisalsoexplainstheterm"On-access";thescannerisinitializedonanyattempt
to access a selected file system object.
The technique used by ESETS On-access scanner is powered by the Dazuko (da-tzu-ko) kernel
module and is based on the interception of kernel calls. The Dazuko project is open source,
which means that its source code is freely distributed. This allows users to compile the kernel
module for their own custom kernels. Note that the Dazuko kernel module is not a part of any
ESETS product and must be compiled and installed into the kernel prior to using the On-access
command esets_dac. On the other hand the Dazuko technique makes On-access scanning
independent of the file system type used. It is also suitable for controlling file system objects via
Network File System (NFS), Nettalk and Samba.
IMPORTANT: Before we provide detailed information related to the On-access scanner's
configuration and operation, it should be noted that the scanner has been primarily developed
andtestedtoprotectfilesystemsmountedexternally.Iftherearemultiplelesystemswhichare
not externally mounted, they will need to be excluded from file access control in order to prevent
system hang-up. An example of a typical directory to be excluded is the ‘/dev’ directory and any
directories used by ESETS.
5.2.1. Operation principle
TheOn-accessscanneresets_dac(ESETSDazuko-poweredleAccessController)isaresident