Thank you for choosing our product. We hope that this documentation will help you in your work and will provide answers
regarding this software product.
Attention! This document is the property of Kaspersky Lab ZAO (herein also referred to as Kaspersky Lab): all rights to
this document are reserved by the copyright laws of the Russian Federation, and by international treaties. Illegal
reproduction and distribution of this document or parts hereof result in civil, administrative or criminal liability by
applicable law.
All materials may only be duplicated, regardless of form, or distributed, including in translation, with the written
permission of Kaspersky Lab.
This document and graphic images related to it may be used exclusively for informational, non-commercial, and personal
purposes.
The document can be modified without prior notification. For the latest version of this document, refer to the Kaspersky
Lab website at http://www.kaspersky.com/docs.
Kaspersky Lab assumes no liability for the content, quality, relevance, or accuracy of any materials used in this
document for which the rights are held by third parties, or for any potential damages associated with the use of such
documents.
This document involves the registered trademarks and service marks which are the property of their respective owners.
Hardware and software system requirements .......................................................................................................... 5
Obtaining the information about Kaspersky Endpoint Security ................................................................................. 6
Sources of information for further research ......................................................................................................... 7
Contacting the Technical Support Service .......................................................................................................... 8
Discussion of Kaspersky Lab's applications in web forum .................................................................................. 9
What's new in version 8 ............................................................................................................................................ 9
DISTRIBUTION CONTENTS ....................................................................................................................................... 11
Creating a deployment task .................................................................................................................................... 14
Step 1. Defining the task name ......................................................................................................................... 15
Step 2. Selecting the task type .......................................................................................................................... 15
Step 3. Selecting the installation package ........................................................................................................ 15
Step 4. Selecting the remote installation method. ............................................................................................. 15
Step 5. Defining the task settings ...................................................................................................................... 15
Step 6. Selecting the installation package for joint deployment ........................................................................ 16
Step 7. Configuring the restart settings ............................................................................................................. 16
Step 8. Defining the method for selecting computers ........................................................................................ 16
Step 9. Selecting the client computers .............................................................................................................. 16
Step 10. Specifying the user account for running tasks .................................................................................... 16
Step 11. Scheduling the task launch ................................................................................................................. 17
Step 7. Compiling the kernel module ...................................................................................................................... 25
I N S T A L L A T I O N G U I D E
4
Step 8. Integrating with Samba server .................................................................................................................... 25
Test virus EICAR and its modifications ................................................................................................................... 34
KASPERSKY LAB ZAO ............................................................................................................................................... 37
Hardware and software system requirements ................................................................................................................... 5
Obtaining the information about Kaspersky Endpoint Security.......................................................................................... 6
What's new in version 8 .................................................................................................................................................... 9
This Guide contains a description of the installation procedure for Kaspersky Endpoint Security 8 for Linux (hereinafter
referred to as the Kaspersky Endpoint Security or application).
All command examples listed in this document are valid for Linux operating systems.
APPLICATION PURPOSE
Kaspersky Endpoint Security 8 for Linux is intended to provide anti-virus protection for workstations that run under Linux
operating systems.
Kaspersky Endpoint Security allows to:
provide real-time file system protection against malicious code, i.e. intercept file access requests, analyze them,
and disinfect or delete infected objects;
scan workstation objects on demand, i.e. search for infected and suspicious files in specified scan areas,
analyze them, and disinfect or delete infected objects;
quarantine infected and suspicious objects;
create copies of infected objects in backup storage before disinfection or deletion, so as to be able to recover
objects that contain valuable information;
update application databases using Kaspersky Lab update servers or Administration Server; also, Kaspersky
Endpoint Security can be configured to update the databases from a local directory;
manage the application and configure it using the management utility, Kaspersky Administration Kit.
HARDWARE AND SOFTWARE SYSTEM REQUIREMENTS
In order to ensure Kaspersky Endpoint Security runs correctly, the system must meet the following hardware and
software requirements:
Minimum hardware requirements:
processor Intel Pentium® II 400 MHz or higher;
512 MB RAM;
at least 1 GB available for swap;
I N S T A L L A T I O N G U I D E
6
2 GB available on the hard drive to install Kaspersky Endpoint Security and store temporary and log files.
Software requirements:
One of the following 32-bit operating systems:
Red Hat Enterprise Linux 5.5 Desktop;
Fedora 13;
CentOS-5.5;
SUSE Linux Enterprise Desktop 10 SP3;
SUSE Linux Enterprise Desktop 11 SP1;
openSUSE Linux 11.3;
Mandriva Linux 2010 Spring;
Ubuntu 10.04 LTS Desktop Edition;
Debian GNU/Linux 5.0.5.
One of the following 64-bit operating systems:
Red Hat Enterprise Linux 5.5 Desktop;
Fedora 13;
CentOS-5.5;
SUSE Linux Enterprise Desktop 10 SP3;
SUSE Linux Enterprise Desktop 11 SP1;
openSUSE Linux 11.3;
Ubuntu 10.04 LTS Desktop Edition;
Debian GNU/Linux 5.0.5.
Perl interpreter: version 5.0 or higher, see http://www.perl.org
Installed packages to compile programs (gcc, binutils, glibc (64-bit operating systems require the 32-bit
version of glibc), glibc-devel, make, ld), as well as the installed source code of the operating system
kernel to compile Kaspersky Endpoint Security modules.
OBTAINING THE INFORMATION ABOUT KASPERSKY
ENDPOINT SECURITY
Kaspersky Lab provides various sources of information about Kaspersky Endpoint Security. Select a source most
convenient for you depending on the importance and urgency of your question.
If you already purchased Kaspersky Endpoint Security, contact the Technical Support service. If your question does not
require an immediate answer, you can discuss it with the Kaspersky Lab experts and other users in our forum at
http://forum.kaspersky.com.
I N T R O D U C T I O N
7
SOURCES OF INFORMATION FOR FURTHER RESEARCH
The following sources of information about Kaspersky Endpoint Security are available:
Kaspersky Endpoint Security page at the Kaspersky Lab website;
documentation;
manual pages.
Page at the Kaspersky Lab website
http://www.kaspersky.com/endpoint-security-linux
This page contains general information about the application, its functionality and peculiarities. You can purchase
Kaspersky Endpoint Security or extend the period of its use in our online store.
Documentation
Installation Guide describes the purpose of Kaspersky Endpoint Security, requirements to the hardware and
software for the installation and operation of Kaspersky Endpoint Security, instructions for its installation, verification
of its operability and initial setup.
Administrator Guide includes information on how to manage Kaspersky Endpoint Security using command line
utility and Kaspersky Administration Kit.
These documents are supplied in PDF format in Kaspersky Endpoint Security distribution package. Alternatively,
you can download the documentation files from the Kaspersky Endpoint Security page at Kaspersky Lab website.
Manual pages
The following manual page files contain information about specific aspects of Kaspersky Endpoint Security:
manage Kaspersky Endpoint Security from the command line:
If you have already purchased Kaspersky Endpoint Security, you can obtain information about it from the Technical
Support service by phone or via Internet.
Before contacting the Technical Support service, please read the Support rules for Kaspersky Lab’s products
(http://support.kaspersky.com/support/rules).
Email request to the Technical Support Service
You can ask your question to the Technical Support Service specialists by filling out the web form of Request to
Kaspersky Lab Technical Support at http://support.kaspersky.com/helpdesk.html.
You can send your inquiry in Russian, English, German, French or Spanish.
In order to send an email message with your question, you must indicate the client number obtained from the
Technical Support website during registration along with your password.
If you are not yet a registered user of Kaspersky Lab applications, you can fill out a registration form
(https://support.kaspersky.com/ru/personalcabinet/Registration/Form/?LANG=en). During registration, specify the
key file name.
The Technical Support service will reply to your request in your Personal Cabinet
(https://support.kaspersky.com/en/PersonalCabinet) and to the email address you have specified in your request.
Describe the problem you have encountered in the request web form providing as much detail as possible. Specify
the following information in the mandatory fields:
Request type. Select the topic, which is the closest to the problem you have encountered, e.g.: "Product
installation / removal problem", or "Virus scan / removal problem".
Kaspersky Endpoint Security version name and number.
Request text. Describe in detail the problem encountered.
Customer ID and password. Enter the customer ID and password received during registration at the Technical
Support Service website.
Email address. The experts of the Technical Support Service will send their reply to your inquiry to that
address.
Technical support by phone
If an urgent problem has occurred, you can always call the Technical Support Service in your city. When you apply to
Russian-speaking (http://support.kaspersky.ru/support/support_local) or international
(http://support.kaspersky.com/support/international) Technical Support specialists, please remember to provide the
I N T R O D U C T I O N
9
Kaspersky Endpoint Security information (http://support.kaspersky.com/support/details), so that our specialists could help
you as soon as possible.
DISCUSSION OF KASPERSKY LAB'S APPLICATIONS IN WEB FORUM
If your question does not require an immediate answer, you can discuss it with the Kaspersky Lab experts and other
users in our forum at http://forum.kaspersky.com.
In this forum you can view existing topics, leave your comments, create new topics and use the search engine.
WHAT'S NEW IN VERSION 8
Let's take a closer look at the new features in Kaspersky Endpoint Security 8 for Linux.
New protection features:
Kaspersky Endpoint Security 8 for Linux combines the capabilities of previous application versions, i.e.
Kaspersky Anti-Virus 5.7 for Linux Workstations and Kaspersky Anti-Virus 5.5 for Samba Servers, by using two
types of file operation interception: a kernel level (kernel module) interceptor and a Samba interceptor;
Quarantine / backup storage administrative capabilities have been expanded, which allow:
add objects to quarantine manually;
search for quarantined objects (by object attributes);
delete found objects;
restore found objects;
rescan objects;
save part of the quarantine / backup storage in an archive (to reduce the amount of used disk space);
import objects from the archive into the quarantine / backup storage.
New features to manage the operation of Kaspersky Endpoint Security:
Centralized management of the Kaspersky Endpoint Security life cycle and performance of on-demand scan,
real-time protection, and Kaspersky Endpoint Security database update tasks.
Centralized storage of Kaspersky Endpoint Security operation settings.
Kaspersky Endpoint Security operation settings are no longer stored in text configuration files. Text files are
used only for importing and exporting settings from the central repository of settings.
Multiple scan areas may be specified in a single task, which enables the user to:
specify scan settings for each area individually;
the scan area description supports ECMA-262 regular expressions;
a list of users / groups, whose file operations the real-time protection task will scan, may be defined for the scan
area.
Multiple exclusion rules may be specified for a single scan area.
Remote management via Kaspersky Administration Kit is available.
You can manage the computer using the local management interface where you can perform the following
actions:
view computer protection status with installed Kaspersky Endpoint Security;
start and manage computer scan and database update tasks;
view statistics for on-demand scan and real-time protection tasks;
view events in the events log.
Actions to perform on objects may be specified based on the type of detected threat.
A schedule for starting / stopping tasks may be configured in detail.
New in Kaspersky Endpoint Security monitoring, reporting, and operation statistics:
The following Kaspersky Endpoint Security monitoring features have been expanded:
tools for obtaining the following categories of information:
general information about the application;
information about the Kaspersky Endpoint Security databases version;
information about the license state;
information about the status of Kaspersky Endpoint Security components;
information about tasks results;
information about the state of the quarantine / backup storage;
tools for retrospective analysis of Kaspersky Endpoint Security operation that enable you to:
collect, process, and store the statistics on Kaspersky Endpoint Security operation;
display the Kaspersky Endpoint Security operation statistics collected over a user-specified period of
time;
search the events based on criteria specified by the user;
audit the following aspects of application operation: creating / starting / stopping Kaspersky Endpoint
Security tasks, modifying Kaspersky Endpoint Security settings, user actions on objects in the
quarantine and backup storage, etc.;
tools for creating reports on Kaspersky Endpoint Security operation, based on collected statistics, and tools
monitoring Kaspersky Endpoint Security operation and virus activity. Information is located in a centralized
for exporting reports (HTML, CSV formats are supported);
repository of Kaspersky Endpoint Security events. Kaspersky Endpoint Security provides its own tools for
searching, displaying, and analyzing data on its operation, as well as the capability of using external
resources.
Contains the Network Agent (a utility that connects Kaspersky Endpoint
Security with Kaspersky Administration Kit).
kes4lwks-rpm.tar.gz
kes4lwks-deb.tar.gz
Contains the files kes4lwks.kpd and akinstall.sh used in the remote
installation procedure for Kaspersky Endpoint Security using Kaspersky
Administration Kit.
klnagent-rpm.tar.gz
klnagent-deb.tar.gz
Contains the files klnagent.kpd and akinstall.sh used in the remote
installation procedure for Administration Console using Kaspersky
Administration Kit.
The contents of the Kaspersky Endpoint Security distribution are shown in the table below.
Table 1. Kaspersky Endpoint Security packages
12
INSTALLING KASPERSKY ENDPOINT
IN THIS SECTION
Step 1. Installing the Kaspersky Endpoint Security package........................................................................................... 12
Kaspersky Endpoint Security is distributed in packages in .deb and .rpm formats.
The installation process includes several steps:
1. Installing the Kaspersky Endpoint Security package.
2. Installation of the Network Agent package (installation of this package is necessary to manage Kaspersky
STEP 1.INSTALLING THE KASPERSKY ENDPOINT
Endpoint Security using Kaspersky Administration Kit).
SECURITY PACKAGE
Before you install Kaspersky Endpoint Security 8 for Linux, remove Kaspersky Anti-Virus 5.5 for Samba Servers or
Kaspersky Anti-Virus 5.7 for Linux Workstations, installed on the computer.
You must have root privileges to initiate installation of the Kaspersky Endpoint Security package.
Before installing Kaspersky Endpoint Security, you need to install the glibc package (64-bit operating systems require the
32-bit version of glibc).
To install Kaspersky Endpoint Security from .rpm-package, execute the following command:
# rpm -i kes4lwks-<version_number>.i386.rpm
To install Kaspersky Endpoint Security from .deb-package, execute the following command:
# dpkg -i kes4lwks_<version_number>_i386.deb
To install Kaspersky Endpoint Security from .deb-package on a 64-bit operating system, execute the following
After entering the command, the installation will be performed automatically.
After the Kaspersky Endpoint Security installations from the .rpm-package is completed, run the post-installation script
(see section "Kaspersky Endpoint Security initial configuration" on page 22).
Loading...
+ 25 hidden pages
You need points to download manuals.
1 point = 1 manual.
You can buy points or you can get point for every manual you upload.