ESET Server Security for Linux – Table of Contents

ESET Server Security for Linux installation steps

ESET Server Security for Linux (ESSL) is distributed as a binary file (.bin).


Important

Ensure that no other antivirus programs are installed on your computer. If two or more antivirus solutions are installed on a single computer, they may conflict with each other. We recommend that you uninstall any other antivirus programs on your system.


Note

Update your OS

If your OS is supported, ensure it has the most recent updates installed before installation of ESET Server Security for Linux.


Warning

Installer without unnecessary modules

Since version 10, the ESET Server Security for Linux installation package contains only essential modules, reducing its size to 15% of the original size. Due to this change, ESET Server Security for Linux is only partially functional after the installation.

To have a fully functional application, you need to either:

Use the installer with parameter -m MIRROR, which will copy modules from the MIRROR directory during installation, for example, created by MirrorTool

Activate ESET Server Security for Linux and download the missing modules

The application is fully functional after the upgrade if the previous version was activated and had all modules.

Installation via ESET PROTECT

To deploy ESET Server Security for Linux remotely on your computers, refer to the ESET PROTECT Software Install Online Help section.

If needed, enable the Web interface remotely.

Installation via Terminal

To install or upgrade your application, run the ESET distribution script with root privileges for the appropriate OS distribution that you have:

./efs.x86_64.bin

sh ./efs.x86_64.bin

arrow_down_businessSee the available command-line arguments


Note

Gain .deb or .rpm installation package

To gain .deb or .rpm installation package suitable for your OS, run ESET distribution script with "-n" command line argument:

sudo ./efs.x86_64.bin -n

or

sudo sh ./efs.x86_64.bin -n

To see the dependencies of the installation package, run one of the following commands:

dpkg -I <deb package>

rpm -qRp <rpm package>

Follow the on-screen instructions. After you accept the product License Agreement, the installation will complete and displays the Web interface login details.

The installer would inform you of any dependency problems.

Installation on systems with Secure Boot

On systems with Secure Boot enabled, the installer detects this configuration and provides additional options for handling kernel module signing. When running the installer interactively, you will see the following options:

arrow_down_business        Option 0: Continue without signing

arrow_down_business        Option 1: Use existing certificate and key

arrow_down_business        Option 2: Generate new certificate and key

Key storage options

During installation, you can choose to copy the certificate and key to /var/opt/eset/efs/uefi. This allows automatic signing of kernel modules after future kernel upgrades, provided the key is not password protected. The installer will ask if you want to save the keys to this location, or you can use the --uefi-copy command line parameter.


Important

Access to the key storage directory is restricted to root only. Ensure that saving keys complies with your company policy. If the key is password protected, it will remain password protected after copying.

Activate ESET Server Security for Linux

To enable regular updates of detection modules, activate ESET Server Security for Linux.


Note

Third-party apps

A summary of third-party apps used by ESET Server Security for Linux can be found in the NOTICE_mode file stored at /opt/eset/efs/doc/modules_notice/.