Technical Support

Need help?


10/5 availability

Email us
Response time: 24 h

Remote PC access
Premium Support

How to install the product on Linux

Information applies to:

Endpoint Protection
Endpoint Protection Plus
Adaptive Defense 360

To install the product so that it integrates seamlessly with the Endpoint Protection server, you must download the installer from the administration console.

IMPORTANT! Before you proceed, please ensure the installation requirements of Endpoint Protection on Linux systems are met.

How to download the installer for Linux

  1. Go to the Endpoint Protection administration console.
  2. Click the Installation tab.
  3. In Download installer for, select Linux.
  4. Select the group to be used during installation and click Download.
  5. The name of the downloaded installer is, and it is a self-extracting file consisting of a Linux shell script with an attached archive containing the product files. The archive is a compressed tar.gz file.

    You can also send the installation link by email. To do so, click Send by email. Users will automatically receive an email with the download link. Alternatively, you can copy the installation link and launch it on the computers to install the protection on.
  6. After downloading the installer, you must assign execute permissions to it through the file manager or running the following command:

    # chmod +x
  7. Run the installer. Run it as the ?root? user for the installation to run correctly. To do so, double-click the installer from the file manager or run the following command from the command-line terminal:

    # ./
  8. The installer decompresses the files and runs a shell script,, which takes care of post-installation tasks, such as writing configuration files, launching processes, etc.
  9. After installation is complete, the following processes must be running:

    • PCOP_AgentService
    • PCOPSchedule

      You can check the process status by running the following command:

      # ps aux | grep PCOP

Communication via proxy server

If the computer uses a proxy server to connect to the Internet, you must configure the product to use the right proxy server. To do so, edit the proxy.conf file, entering the proxy server information using the following format:


There are two instances of this file:

  • /opt/PCOPAgent/proxy.conf
    Contains the settings used by the agent to send messages to the PCOP server.
  • /opt/PCOPAgent/Common/Binaries/PcopSigUpdater-bin/proxy.conf
    Contains the settings used by the process that takes care of updating the signature files.

You can also define the configuration in a more visual way, by running the script from the /opt/PCOPAgent or /opt/PCOPAgent/Common/Binaries/PcopSigUpdater-bin folders, depending on the proxy configuration file to edit.

Only basic authentication is supported in communications via a proxy server.

Help nº- 20151006 50070 EN

Have you resolved your query with this article?

yes no

Thanks for your answer

Why didn't you find it helpful?

The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.

Talk to a technician!


Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.

Do you need one of our technicians to connect to
your PC or device remotely to fix a problem?

Discover our Premium Services