ESET File Security 6 for Microsoft Windows Server

ESET File Security 6 for Microsoft Windows Server
Important: Before the installation we recommend you uninstall all other security solutions, including older versions of ESET. Click here to learn more.
Attention: This product requires a License Key to activate and can only be remotely managed with ESET Remote Administrator 6.


Documentation


Other versions


Changelog

Version 6.3.12010.0

  • Fixed: In a particular combination of outdated module the server may crash after installation during first reboot with HIPS enabled.
  • Fixed: Occasional crashes of graphical UI when connecting to the server over RDP.
  • Added: Automatic exclusions for Cluster Shared Volumes (CSV) in connection with clustered Hyper-V environments.

Version 6.3.12006.0

  • Fixed: Browsing Threat logs in Log files section can render the product GUI completely unresponsive.
  • Fixed: On natively localized Windows Server versions (i.e. not modified by language pack add-ons) the Hyper-V scanner fails to enumerate instances of particular Hyper-V machines.
  • Improved: Configurable visibility of license expiration date in product GUI set to disabled by default for MSP license types.

Version 6.3.12004.0 (compared to 6.2.12007.0 released on September 03, 2015)

  • Improved: Hyper-V cleaning ability including registry inspection and remediation
  • Improved: Further security hardening of application based on recent vulnerability discoveries
  • Improved: Scanning engine upgrade to read and interpret Master Boot Record sector correctly on Hyper-V machines
  • Improved: Update of real-time scanning and protocol filtering drivers for improved compatibility
  • Fixed: The number of scanned objects is different for scans with the same number of objects
  • Fixed: Dialog for excluded file extensions in Hyper-V parameters accepts the “dot” extension mask
  • Fixed: Inability for the Hyper-V scan to open/scan any virtual disk in target Hyper-V on Microsoft Hyper-V Server 2008 R2 Core
  • Fixed: Component-based installation started as command-line operation ignores certain user-set installation parameters
  • Fixed: Certain WMI provider module commands result with a “Description” error on returned variables
  • Fixed: Exploit Blocker for JAVA-based test sample does not trigger expected alert
  • Fixed: Client (with Hyper-V role) “Scan server” task launched from ESET Remote Administrator does not report back after finishing
  • Fixed: Restoring infected files from quarantine to Hyper-V machine fails
  • Fixed: Other minor bug fixes
Show older