You're in: Panda Security > IT Security for Business > support > Support Products Panda Security

Rate us
What kind of help do you need?
(Example:“Panda AdminSecure”, “2093 error”)

How to install the product on Linux

Information applies to:

Endpoint Protection
Endpoint Protection Plus
Adaptive Defense 360

To install the product so that it integrates seamlessly with the Endpoint Protection server, you must download the installer from the administration console.

IMPORTANT! Before you proceed, please ensure the installation requirements of Endpoint Protection on Linux systems are met.

How to download the installer for Linux

  1. Go to the Endpoint Protection administration console.
  2. Click the Installation tab.
  3. In Download installer for, select Linux.
  4. Select the group to be used during installation and click Download.
  5. The name of the downloaded installer is, and it is a self-extracting file consisting of a Linux shell script with an attached archive containing the product files. The archive is a compressed tar.gz file.

    You can also send the installation link by email. To do so, click Send by email. Users will automatically receive an email with the download link. Alternatively, you can copy the installation link and launch it on the computers to install the protection on.
  6. After downloading the installer, you must assign execute permissions to it through the file manager or running the following command:

    # chmod +x
  7. Run the installer. Run it as the ?root? user for the installation to run correctly. To do so, double-click the installer from the file manager or run the following command from the command-line terminal:

    # ./
  8. The installer decompresses the files and runs a shell script,, which takes care of post-installation tasks, such as writing configuration files, launching processes, etc.
  9. After installation is complete, the following processes must be running:

    • PCOP_AgentService
    • PCOPSchedule

      You can check the process status by running the following command:

      # ps aux | grep PCOP

Communication via proxy server

If the computer uses a proxy server to connect to the Internet, you must configure the product to use the right proxy server. To do so, edit the proxy.conf file, entering the proxy server information using the following format:


There are two instances of this file:

  • /opt/PCOPAgent/proxy.conf
    Contains the settings used by the agent to send messages to the PCOP server.
  • /opt/PCOPAgent/Common/Binaries/PcopSigUpdater-bin/proxy.conf
    Contains the settings used by the process that takes care of updating the signature files.

You can also define the configuration in a more visual way, by running the script from the /opt/PCOPAgent or /opt/PCOPAgent/Common/Binaries/PcopSigUpdater-bin folders, depending on the proxy configuration file to edit.

Only basic authentication is supported in communications via a proxy server.

Help nº- 20151006 50070 EN

Help us improve our service by letting us know your opinion.

Your suggestions will help to resolve your questions more quickly and effectively.

Have you resolved your query with this article? YES NO Thanks for your answer

How would you improve this article?

Do you want to contact TechSupport?