ESET Endpoint Antivirus for Linux – Table of Contents

ESET Endpoint Antivirus for Linux installation steps

ESET Endpoint Antivirus for Linux is distributed as a binary file (.bin).


Important

ESET Endpoint Antivirus for Linux may not work properly if some other security product is installed and running on the system.

In case of any (unknown) problems, please try to install ESET Endpoint Antivirus for Linux on clean machine, without any other security or third-party products.


Note

Update your OS

If your OS is supported, ensure it has the most recent updates installed before installation of ESET Endpoint Antivirus for Linux.

Installation via ESET PROTECT

To deploy ESET Endpoint Antivirus for Linux remotely on your computers, refer to the ESET PROTECT Software Install Online Help section.

Installation via Terminal


Note

The commands below are valid if you are at the location of the mentioned files in the Terminal window.

To install or upgrade your product, run the ESET distribution script with root privileges for the appropriate OS distribution that you have:

./eeau_x86_64.bin

sh ./eeau_x86_64.bin

 

arrow_down_businessSee the available command line arguments


Note

Gain .deb installation package

To gain .deb installation package suitable for your OS, run ESET distribution script with "-n" command line argument:

sudo ./eeau_x86_64.bin -n

or

sudo sh ./eeau_x86_64.bin -n

To see the dependencies of the installation package, run one of the following commands:

dpkg -I <deb package>

rpm -qRp <rpm package>

 

Follow the on-screen instructions. Accept the product License Agreement to complete the installation.

The installer would inform you of any dependency problems.


Note

Add your computer to ESET PROTECT On-Prem or ESET PROTECT

After the installation, we highly recommend you add your computer to ESET PROTECT On-Prem or ESET PROTECT to be able to change ESET Endpoint Antivirus for Linux configuration. Follow the instructions described in Manage ESET Endpoint Antivirus for Linux remotely.

Installation on systems with Secure Boot

On systems with Secure Boot enabled, the installer detects this configuration and provides additional options for handling kernel module signing. When running the installer interactively, you will see the following options:

arrow_down_business        Option 0: Continue without signing

arrow_down_business        Option 1: Use existing certificate and key

arrow_down_business        Option 2: Generate new certificate and key

Key storage options

During installation, you can choose to copy the certificate and key to /var/opt/eset/eea/uefi. This allows automatic signing of kernel modules after future kernel upgrades, provided the key is not password protected. The installer will ask if you want to save the keys to this location, or you can use the --uefi-copy command line parameter.


Important

Access to the key storage directory is restricted to root only. Ensure that saving keys complies with your company policy. If the key is password protected, it will remain password protected after copying.

 

Activate ESET Endpoint Antivirus for Linux

To enable regular updates of detection modules, activate ESET Endpoint Antivirus for Linux.


Note

Third-party apps

A summary of third-party apps used by ESET Endpoint Antivirus for Linux can be found in the NOTICE_mode file stored at /opt/eset/eea/doc/modules_notice/.