x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
48-HOUR OFFER
50%
RENEWALS
Home users only
RENEW AT A DISCOUNT
x
48-HOUR OFFER
50%
RENEWALS Home users only
x
EXCLUSIVE OFFER
50%
RENEWALS Home users only
RENEW AT A DISCOUNT
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
-50%
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
-50%
Buy the best antivirus
at the best price
BUY NOW AND
GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
UP TO
-60%
BUY NOW
x
UP TO
-60%
BUY NOW

Hello!

You’re about to visit our web page in English
Would you like to continue?

Yes, I want to visit the web page in English No, I want to visit the web page in

If this is not what you’re looking for,

Visit our Welcome Page!

Technical Support

Need help?

 

How to install the product on Linux

Information applies to:

Products
Panda Adaptive Defense 360
Panda Endpoint Protection
Panda Endpoint Protection Plus

Attention!

The instructions indicated in this article apply to the traditional management platform. If your query refers to a product based on Aether Platform, please access the article on the How to install the agent of products based on Aether Platform in Windows, Linux, MacOS and Android?, or else, check the Knowledge Base, where you will find answers to frequently asked questions.

If you still haven't switched to Aether, please contact your sales representative or reseller and request the platform migration.

To install the product so that it integrates seamlessly with the Panda server, you must download the installer from the administration console.

IMPORTANT! Before you proceed, please ensure the installation requirements of Adaptive Defense and Endpoint Protection on Linux systems are met.

How to download the installer for Linux

  1. Go to the administration console.
  2. Click the Installation tab.
  3. In Download installer for, select Linux.
  4. Select the group to be used during installation and click Download.
  5. The name of the downloaded installer is LinuxWAAgent.run, and it is a self-extracting file consisting of a Linux shell script with an attached archive containing the product files. The archive is a compressed tar.gz file.

    You can also send the installation link by email. To do so, click Send by email. Users will automatically receive an email with the download link. Alternatively, you can copy the installation link and launch it on the computers to install the protection on.
  6. After downloading the installer, you must assign execute permissions to it through the file manager or running the following command:

    # chmod +x LinuxWAAgent.run
  7. Run the installer. Run it as the ‘root’ user for the installation to run correctly. To do so, double-click the installer from the file manager or run the following command from the command-line terminal:

    # ./LinuxWAAgent.run
  8. The installer decompresses the files and runs a shell script, post_install.sh, which takes care of post-installation tasks, such as writing configuration files, launching processes, etc.
  9. After installation is complete, the following processes must be running:

    • PCOP_AgentService
    • PCOPSchedule

      You can check the process status by running the following command:

      # ps aux | grep PCOP

Communication via proxy server

If the computer uses a proxy server to connect to the Internet, you must configure the product to use the right proxy server. To do so, edit the proxy.conf file, entering the proxy server information using the following format:

proxy:port:user:password

There are two instances of this file:

  • /opt/PCOPAgent/proxy.conf
    Contains the settings used by the agent to send messages to the PCOP server.
  • /opt/PCOPAgent/Common/Binaries/PcopSigUpdater-bin/proxy.conf
    Contains the settings used by the process that takes care of updating the signature files.

You can also define the configuration in a more visual way, by running the proxyConf.sh script from the /opt/PCOPAgent or /opt/PCOPAgent/Common/Binaries/PcopSigUpdater-bin folders, depending on the proxy configuration file to edit.

Only basic authentication is supported in communications via a proxy server.

Help nº- 20191113 50070 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT