Skip to main content
All CollectionsEndpoint Protection
How to install Endpoint Security on your Linux Device
How to install Endpoint Security on your Linux Device

This guide will walk you through how to install Endpoint Protection on your Linux Desktop, Server or Embedded Device.

Matthew Elliott avatar
Written by Matthew Elliott
Updated over a week ago

Information

  • The Linux version of Endpoint Protection uses a command-line interface. There is no graphical user interface currently available.

  • Installation and management requires root access.

  • If you're using an old or obscure Linux Distro, see System Requirements and On Access Scanning Support.

Running the installation

  1. Download the installation package from the Defense.com Control Panel.

  2. Open your preferred terminal emulator and navigate to the directory you downloaded the installation package to. For example:

    cd ~/Downloads
  3. Extract the files from the installation package using the command:

    tar -xf ./installer.tar
  4. Make the installer file executable by running the command:

    chmod +x ./installer
  5. Run the installer file:

    ./installer

    If you get the error message "missing login password" when running this installer, try running it as sudo: sudo ./installer

Thats's it! Endpoint Security has been installed. The service starts automatically and you can start scanning your system.

System Requirements

CPU

RAM

Disk Space

Operating System/Distro

Supported Filesystems

For Workstations:

Intel® Pentium compatible processors, 2 GHz or faster

For Smart Devices:

Intel® Pentium compatible processors, 800 MHZ or faster

For Servers: Minimum - Intel® Pentium compatible processors, 2.4 GHz

Recommended - Intel® Xeon multi-core CPU, 1.86 GHz or faster

Depends on what features are enabled in our installer package.

600MB

  • Ubuntu 14.04 LTS or higher

  • Red Hat Enterprise Linux / CentOS 6.0 or higher

  • SUSE Linux Enterprise Server 11 SP4 or higher

  • OpenSUSE Leap 42.x

  • Fedora 25 or higher

  • Debian 8.0 or higher

  • Oracle Linux 6.3 or higher

  • Amazon Linux AMI 2016.09 or higher

  • Amazon Linux 2

  • AFS

  • BTRFS

  • ext2

  • ext3

  • ext4

  • FAT

  • FAT16

  • FAT32

  • VFAT

  • exFAT

  • NTFS

  • UFS

  • ISO 9660 / UDF

  • NFS

  • CIFS/SMB

  • VXFS

  • XFS

On-access scanning support

On-access scanning is available for all supported guest operating systems. On Linux systems, on-access scanning support is provided in the following situations:

Kernel Versions

Linux distributions

On-access requirements

2.6.38 or higher*

Red Hat Enterprise Linux /CentOS 6.0 or higher

Ubuntu 14.04 or higher

SUSE Linux Enterprise Server11 SP4 or higher

OpenSUSE Leap 42.x

Fedora 25 or higher

Debian 9.0 or higher

Oracle Linux 6.3 or higher

Amazon Linux AMI 2016.09 or higher

Fanotify (kernel option) must beenabled.

2.6.38 or higher

Debian 8

Fanotify must be enabled and set to enforcing mode and then the kernel package must be rebuilt.

2.6.32 - 2.6.37

CentOS 6.x

Red Hat Enterprise Linux 6.x

Bitdefender provides support via DazukoFS with prebuilt kernelmodules.

All other kernels

All other supported systems

The DazukoFS module must be manually compiled. For more details, refer to Manually compile the DazukoFS module

Did this answer your question?