Knowledgebase business article search

Install and activate ESET File Security for Microsoft Windows Server (7.x)

Solution

Installing a different File security product?

Click for instructions to install other ESET server security products:

  1. Click the appropriate link below to download the installer file for ESET File Security for Microsoft Windows Server 7:

    32-bit Download   64-bit Download

  2. When the download is complete, double-click the installer file to launch the ESET File Security for Microsoft Windows Server Setup Wizard.
     
  3. Select your language and click Next.

Figure 1-1

  1. Select I accept the terms in the License Agreement and click Next.

Figure 1-2

  1. Select Complete and click Next.

    Windows Server 2008/2008R2 users, select Custom

    Click for instrucions to verify that the Web and email module is installed.

    Recommended settings for ESET File Security installed on a terminal or Citrix server (6.x)

Figure 1-3

  1. Verify and update the install location for the ESET File Security Product, Module or Data folders if necessary. Click Install.

Figure 1-4

  1. Click Finish. ESET File Security for Microsoft Windows Server will open automatically.

Figure 1-5

  1. Once the installation is finished, select an activation option. In this example, Enter a License Key is selected.

Figure 1-6

  1. Type your License Key in the License Key field and click Continue. If you currently use a Username and Password, click here for instructions to convert them into a License Key. If you do not have your License Key, click here to have your license information sent to you.

Figure 1-7

  1. After a successful activation, click Done.

Figure 1-8

  1. Select an option for the detection of potentially unwanted applications and click OK. For more information, see what is a potentially unwanted application?

Figure 1-9

  1. Select your participation in the ESET LiveGrid feedback system and click OK.

Figure 1-10

ESET File Security for Microsoft Windows Server is installed and your computer is fully protected.

Figure 1-11



Was this information helpful?