Web Interface

The web interface allows user-friendly configuration, administration and license management of ESET Security systems. This module is a standalone component and must be enabled before it can be accessed. To quickly configure the web interface, configure the following options in the ESETS configuration file as shown below and restart the ESETS daemon:

[wwwi]
agent_enabled = yes
listen_addr = address
listen_port = port
username = name
password = pass

Replace the text in italics with your own values and direct your browser to ‘https://address:port’ (note the https). Login with ‘username/password’. Basic usage instructions can be found in the Help section of the web interface and technical details about esets_wwwi can be found in the esets_wwwi(1) man page.

The web interface allows you to remotely access the ESETS daemon and deploy it easily. This powerful utility makes it easy to read and write configuration values.

Figure 6-1. ESET Security for Linux - Home screen.

esets_welcome

The web interface window of ESET Gateway Security is divided into two main sections. The primary window, which displays the contents of the selected menu option, and the main menu. A horizontal bar on the top lets you navigate between the following main options:

Home – provides basic system and ESET product information

Licenses – a license management utility, see the following chapter for mode details

Configuration – you can change the ESET Gateway Security system configuration here

Control – allows you to run simple tasks and view global statistics about objects processed by esets_daemon

Help – provides detailed usage instructions for the ESET Gateway Security web interface

Logout – use to end your current session

Important: Make sure you click Save changes after making any changes in the Configuration section of the web interface to save your new settings. To apply your settings, restart the ESETS daemon by clicking Apply changes on the left pane.

We recommend that you limit access to this interface for a specific range of IP addresses. This can be done two ways:

1.By adding only one interface under the listen_addr parameter (not using 0.0.0.0)

2.Using a firewall rule (such as iptables).