You’re offline. This is a read only version of the page.
Online Help Center
Search
Support
For Home
For Business
English (US)
Bahasa Indonesia (Indonesian)
Dansk (Danish)
Deutsch (German)
English (Australia)
English (US)
Español (Spanish)
Français (French)
Français Canadien
(Canadian French)
Italiano (Italian)
Nederlands (Dutch)
Norsk (Norwegian)
Polski (Polish)
Português - Brasil
(Portuguese - Brazil)
Português - Portugal
(Portuguese - Portugal)
Svenska (Swedish)
ภาษาไทย (Thai)
Tiếng Việt (Vietnamese)
Türkçe (Turkish)
Čeština (Czech)
Ελληνικά (Greek)
Български (Bulgarian)
Русский (Russian)
עברית (Hebrew)
اللغة العربية (Arabic)
日本語 (Japanese)
简体中文
(Simplified Chinese)
繁體中文
(Traditional Chinese)
繁體中文 HK
(Traditional Chinese)
한국어 (Korean)
Cancel
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More
Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
Preface
ServerProtect for Linux Documentation
Audience
Document Conventions
Pre-Installation
System Requirements
Hardware
Software
Information Needed to Install ServerProtect
Proxy For Internet Updates
Apex Central / Control Manager Server Information
Activation Code
Local or Remote Installation
Installation
ServerProtect Installer Options
Local Installation Procedure
Running the ServerProtect Installation Program
Accepting the Trend Micro End User Agreement
Registering ServerProtect to Control Manager
Proxy Server Information
Activating ServerProtect During Installation
Remote Installation
RemoteInstall Features
Extracting RemoteInstall From the ServerProtect Binary
Using a Configuration File in Your Remote Deployment
Converting CSV-Formatted Files to RemoteInstall.conf Format
Specifying Clients for Remote Deployment
Running the RemoteInstall Tool
RemoteInstall Tool Options
Kernel Hook Module
Installing a Kernel Hook Module Package
Remotely Deploying a Kernel Hook Module
Verifying the Installation
Uninstalling ServerProtect
Post Installation Configuration
Logging On to the ServerProtect Web Console
Setting Up an Administrator Password
Configuring Proxy Server Settings
General Proxy Settings
Component Update Proxy Settings
Registering ServerProtect
Registering Your Software Using the Registration Key
Activating ServerProtect
Upgrading to the Full Version
Updating Components
Initiating Automatic Update on Control Manager
Testing ServerProtect with the EICAR Test Virus
Obtaining the EICAR Test File
Configuring rsyslog for Linux
Building and Installing Kernel Hook Module
Introduction
Requirements
Installation
Determining your Linux Kernel Version and Architecture
Preparing the Kernel Source
Configuring the Kernel Source
Building the KHM
Testing the KHM
Installing the KHM
Restarting ServerProtect
Troubleshooting
Problem with Missing Dependent Libraries in Linux
Building and Installing KHM
Default Password
Web Console Rejects All Passwords
Debug Logging
Technical Support
Troubleshooting Resources
Using the Support Portal
Threat Encyclopedia
Contacting Trend Micro
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other Resources
Download Center
Documentation Feedback
System Requirements
Servers on which you install
ServerProtect
must meet the following requirements.
Related information
Hardware
Software
Table of Contents
Preface
ServerProtect for Linux Documentation
Audience
Document Conventions
Pre-Installation
System Requirements
Hardware
Software
Information Needed to Install ServerProtect
Proxy For Internet Updates
Apex Central / Control Manager Server Information
Activation Code
Local or Remote Installation
Installation
ServerProtect Installer Options
Local Installation Procedure
Running the ServerProtect Installation Program
Accepting the Trend Micro End User Agreement
Registering ServerProtect to Control Manager
Proxy Server Information
Activating ServerProtect During Installation
Remote Installation
RemoteInstall Features
Extracting RemoteInstall From the ServerProtect Binary
Using a Configuration File in Your Remote Deployment
Converting CSV-Formatted Files to RemoteInstall.conf Format
Specifying Clients for Remote Deployment
Running the RemoteInstall Tool
RemoteInstall Tool Options
Kernel Hook Module
Installing a Kernel Hook Module Package
Remotely Deploying a Kernel Hook Module
Verifying the Installation
Uninstalling ServerProtect
Post Installation Configuration
Logging On to the ServerProtect Web Console
Setting Up an Administrator Password
Configuring Proxy Server Settings
General Proxy Settings
Component Update Proxy Settings
Registering ServerProtect
Registering Your Software Using the Registration Key
Activating ServerProtect
Upgrading to the Full Version
Updating Components
Initiating Automatic Update on Control Manager
Testing ServerProtect with the EICAR Test Virus
Obtaining the EICAR Test File
Configuring rsyslog for Linux
Building and Installing Kernel Hook Module
Introduction
Requirements
Installation
Determining your Linux Kernel Version and Architecture
Preparing the Kernel Source
Configuring the Kernel Source
Building the KHM
Testing the KHM
Installing the KHM
Restarting ServerProtect
Troubleshooting
Problem with Missing Dependent Libraries in Linux
Building and Installing KHM
Default Password
Web Console Rejects All Passwords
Debug Logging
Technical Support
Troubleshooting Resources
Using the Support Portal
Threat Encyclopedia
Contacting Trend Micro
Speeding Up the Support Call
Sending Suspicious Content to Trend Micro
Email Reputation Services
File Reputation Services
Web Reputation Services
Other Resources
Download Center
Documentation Feedback