Information
The Linux version of Endpoint Protection uses a command-line interface. There is no graphical user interface currently available.
Installation and management requires root access.
If you're using an old or obscure Linux Distro, see System Requirements and On Access Scanning Support.
Running the installation
Download the installation package from the Defense.com Control Panel.
Open your preferred terminal emulator and navigate to the directory you downloaded the installation package to. For example:
cd ~/Downloads
Extract the files from the installation package using the command:
tar -xf ./installer.tar
Make the installer file executable by running the command:
chmod +x ./installer
Run the installer file:
./installer
If you get the error message "missing login password" when running this installer, try running it as sudo:
sudo ./installer
Thats's it! Endpoint Security has been installed. The service starts automatically and you can start scanning your system.
System Requirements
CPU | RAM | Disk Space | Operating System/Distro | Supported Filesystems |
For Workstations: Intel® Pentium compatible processors, 2 GHz or faster
For Smart Devices: Intel® Pentium compatible processors, 800 MHZ or faster
For Servers: Minimum - Intel® Pentium compatible processors, 2.4 GHz Recommended - Intel® Xeon multi-core CPU, 1.86 GHz or faster | Depends on what features are enabled in our installer package. | 600MB |
|
|
On-access scanning support
On-access scanning is available for all supported guest operating systems. On Linux systems, on-access scanning support is provided in the following situations:
Kernel Versions | Linux distributions | On-access requirements |
2.6.38 or higher* | Red Hat Enterprise Linux /CentOS 6.0 or higher
Ubuntu 14.04 or higher
SUSE Linux Enterprise Server11 SP4 or higher
OpenSUSE Leap 42.x Fedora 25 or higher
Debian 9.0 or higher
Oracle Linux 6.3 or higher
Amazon Linux AMI 2016.09 or higher | Fanotify (kernel option) must beenabled. |
2.6.38 or higher | Debian 8 | Fanotify must be enabled and set to enforcing mode and then the kernel package must be rebuilt. |
2.6.32 - 2.6.37 | CentOS 6.x
Red Hat Enterprise Linux 6.x | Bitdefender provides support via DazukoFS with prebuilt kernelmodules. |
All other kernels | All other supported systems | The DazukoFS module must be manually compiled. For more details, refer to Manually compile the DazukoFS module |