Jump to content

acfr

Members
  • Posts

    10
  • Joined

  • Last visited

Everything posted by acfr

  1. Hi, is ESET Server Security for Linux available for arm64? Thanks.
  2. Well, my files are mostly PDF, DOCX, WLXS, PPTX, JPG and PNG. I would say that 90% of them are these extensions;
  3. Hi, using ESET File Security for Linux, latest version, I have a drive (ZFS filesystem) containing roughly 3 millions files. Each night, the Smart Scan scans that drive and scans basically all files. /opt/eset/efs/bin/odscan --scan --profile="@Smart scan" /drive/ Here the last 6 scans: Whats the point of Smart Scan here?
  4. Ok i thought you we're talking about Eset Server Security only, and another product could detect it. I'll do some test with inotify this week-end and provide feedback.
  5. Hi @kurco : What are the other options that actually protects an NFS server? Thanks.
  6. Ok thanks @Marcos and @kurco so currently, there is no way I can (real time) protect my NFS server? Only wait and hope it will be fixed, someday? Regards, Carlos
  7. @Marcos I've opened a support ticket (french support) that answered me this: which is obviously no true for a real time scanner...otherwise all infected could be stored. Can i open a support ticket on "International/English" support as French support seems not reliable?
  8. What i mean by "upload" is; - machine A, NFS client --> copy (upload) the infected file on the NFS mount. - machine B, NFS server, protected by EFS --> file is stored on disk, not scanned or cleaned. - machine B: try to open the file directly on the server, not the client --> file is cleaned (deleted).
  9. To be clear: - if NFS server is protected - but clients, where NFS is mounted, is not infected files uploaded on the clients will be stored and not cleaned on the server. Is this correct?
  10. Using ESET SERVER SECURITY LINUX 8, i've tested a small upload (trough NFSv4) of a EICAR file (named 'eicar.com'). File was stored without any problems. I've then tried to show it's contents (cat eicar.com) but an error message has been trown and file was deleted (bi the real time protection). Question is: how can a malicious file bypass the real time protection and be stored on the disk? Thanks.
×
×
  • Create New...