Dr.Web Web Management Interface

In this section:

Function.

Managing the Components.

Threat Management.

Managing the Settings.

Scanning Local Files.

Function

The web interface of Dr.Web for UNIX File Servers allows you to:

1.View the current state of the Dr.Web for UNIX File Servers components, start or stop some of the components.

2.View the status of updates and start an updating process manually, if required.

3.View the status of the product license and load a license key, if required.

4.View the list of detected threats and manage quarantined objects (threats detected in local file system via the Dr.Web File Checker component are displayed only).

5.Edit the settings of the components included in Dr.Web for UNIX File Servers.

6.Connect Dr.Web for UNIX File Servers to the centralized protection server or switch to the standalone mode.

7.Start an on-demand scanning of local files (including a capability to do it by dragging and dropping files onto the page opened in your browser).

System Requirements of the Web Interface

Correct operation of the web interface is guaranteed for the following web browsers:

Microsoft Internet Explorer—version 11 and later.

Mozilla Firefox—version 25 and later.

Google Chrome—version 30 and later.

Accessing the Web Interface

To access the web interface, type in the address bar of your browser the following address:

https://<host_with_drweb>:<port>/

where <host_with_drweb> is the IP address or the name of the host where Dr.Web for UNIX File Servers operates with the Dr.Web HTTPD web interface server, and <port> is the port (on this host) which Dr.Web HTTPD is listening on. To access Dr.Web for UNIX File Servers component which operates on the local host, use IP address 127.0.0.1 or the name localhost. By default, the <port> is 4443.

Thus, to access the web interface on the local host by default, enter the following URL in the browser address bar:

https://127.0.0.1:4443/

After the connection to the managing server is established, the startup page opens and displays the authentication form. To access management functions, fill in the authentication form by specifying the login and password of a user who has administrative privileges on the host where Dr.Web for UNIX File Servers operates.

If you need, you can provide the authorization on the web interface using a personal user certificate. To do so:

1.Create a personal certificate signed by a certificate authority certificate.

2.Import the signed certificate as a user authorization certificate in the browser that is used to connect to the web interface for management.

3.In the Dr.Web HTTPD settings (parameter AdminSslCA), specify a path to the certificate authority certificate that signs your personal certificate.

If you use a personal user certificate for the authorization on the web interface, the authorization form does not appear, the user is authorized as root.

If necessary, refer to the Appendix E. Generating SSL certificates section.

Main Menu

In the left pane of the web interface, which appears once you have successfully passed authentication, there is a main menu, the items in which allow you to do the following:

Main opens the main page which displays the full list of installed components of Dr.Web for UNIX File Servers and their status.

Threats opens a page which displays all the threats detected on the server. In this section, you can manage these detected threats (for example, move infected objects to quarantine, rescan, cure or delete detected malicious objects).

Settings opens a page with the component settings of Dr.Web for UNIX File Servers installed on the server.

Information opens a page that shows brief information about the version of this web interface and about the state of virus databases.

Help opens a new browser tab with help information on the Dr.Web for UNIX products.

Scan File displays a panel for quick file scanning, which will stay available on top of any opened page of the web interface until you close this panel.

Log Out ends the current web interface session (not available for authentication with user's personal certificate).