Installation on Linux systems
Protection deployment overview
The installation process consists of a series of steps that depend on the status of the network at the time of deploying the software and the number of computers to protect:
-
Find unprotected computers on the network
-
Verify minimum requirements for target computers
-
Uninstall competitor products and restart computers
-
Determine computer default settings
-
Select an installation method
-
Verify the security software has been correctly installed.
Find unprotected computers on the network
Find computers on the network without protection installed or with a third-party security product that needs replacing or complementing with Advanced EDR. Verify that you have purchased enough licenses for the unprotected computers. See Licenses.
Advanced EDR enables you to install the software even when you do not have enough licenses for all the computers you want to protect. Computers without a license show in the management console with some information (such as installed software and hardware), but are not protected.
Verify minimum requirements for target computers
For more information about minimum requirements, see Installation requirements.
Uninstall competitor products
We recommend that you uninstall any third-party antivirus and security software prior to installing Advanced EDR.
Determine computer default settings
When the software is installed on the computer or device, Advanced EDR assigns the All group security settings to it. However, during installation, you can select a different target group for the computer with the required settings. See Managing settings.
Verify the security software has been correctly installed
-
Select Computers from the top menu. Find the corresponding computer. For more information about how to find computers, see Managing computers and devices.
-
Select the computer on which the security software has been installed. The computer details page opens.
-
Select the Details tab. All information collected from the computer is shown, along with the installation status.
-
In the Security section, verify the status of the various modules:
-
Installing...: The installation process is incomplete or there has been an error. Wait a few minutes.
-
Enabled/Disabled: After a few minutes, if the installation has been successful, the status of the protection modules is shown.
-
Detect and resolve installation errors
If, after a few minutes, the Security section disappears from the computer details page, it is because the security software did not install correctly. Verify this:
-
If the computer has a graphical user interface installed, verify whether there any error messages.
-
Verify whether the computer appears in lists. See Checking deployment.
-
Verify whether the user computer meets the requirements specified in Installation requirements. Update the product or operating system version if required. See Product updates and upgrades.