web
You’re offline. This is a read only version of the page.
close

Online Help Center

  • Search
  • Support
    • For Home
    • For Business
  • English (US)
    • Bahasa Indonesia (Indonesian)
    • Dansk (Danish)
    • Deutsch (German)
    • English (Australia)
    • English (US)
    • Español (Spanish)
    • Français (French)
    • Français Canadien
      (Canadian French)
    • Italiano (Italian)
    • Nederlands (Dutch)
    • Norsk (Norwegian)
    • Polski (Polish)
    • Português - Brasil
      (Portuguese - Brazil)
    • Português - Portugal
      (Portuguese - Portugal)
    • Svenska (Swedish)
    • ภาษาไทย (Thai)
    • Tiếng Việt (Vietnamese)
    • Türkçe (Turkish)
    • Čeština (Czech)
    • Ελληνικά (Greek)
    • Български (Bulgarian)
    • Русский (Russian)
    • עברית (Hebrew)
    • اللغة العربية (Arabic)
    • 日本語 (Japanese)
    • 简体中文
      (Simplified Chinese)
    • 繁體中文
      (Traditional Chinese)
    • 繁體中文 HK
      (Traditional Chinese)
    • 한국어 (Korean)
This website uses cookies for website functionality and traffic analytics. Our Cookie Notice provides more information and explains how to amend your cookie settings.
Learn More Yes, I agree
Table of Contents
The page you're looking for can't be found or is under maintenance
Try again later or go to the home page
Go to home page
  • Preface
    • ServerProtect for Linux Documentation
    • Audience
    • Document Conventions
  • Pre-Installation
    • System Requirements
      • Hardware
      • Software
    • Information Needed to Install ServerProtect
      • Proxy For Internet Updates
      • Apex Central / Control Manager Server Information
      • Activation Code
      • Local or Remote Installation
  • Installation
    • ServerProtect Installer Options
    • Local Installation Procedure
      • Running the ServerProtect Installation Program
      • Accepting the Trend Micro End User Agreement
      • Registering ServerProtect to Control Manager
        • Proxy Server Information
      • Activating ServerProtect During Installation
    • Remote Installation
      • RemoteInstall Features
      • Extracting RemoteInstall From the ServerProtect Binary
      • Using a Configuration File in Your Remote Deployment
        • Converting CSV-Formatted Files to RemoteInstall.conf Format
        • Specifying Clients for Remote Deployment
      • Running the RemoteInstall Tool
        • RemoteInstall Tool Options
    • Kernel Hook Module
      • Installing a Kernel Hook Module Package
      • Remotely Deploying a Kernel Hook Module
    • Verifying the Installation
    • Uninstalling ServerProtect
  • Post Installation Configuration
    • Logging On to the ServerProtect Web Console
    • Setting Up an Administrator Password
    • Configuring Proxy Server Settings
      • General Proxy Settings
      • Component Update Proxy Settings
    • Registering ServerProtect
      • Registering Your Software Using the Registration Key
    • Activating ServerProtect
    • Upgrading to the Full Version
    • Updating Components
      • Initiating Automatic Update on Control Manager
    • Testing ServerProtect with the EICAR Test Virus
      • Obtaining the EICAR Test File
    • Configuring rsyslog for Linux
  • Building and Installing Kernel Hook Module
    • Introduction
    • Requirements
    • Installation
      • Determining your Linux Kernel Version and Architecture
      • Preparing the Kernel Source
      • Configuring the Kernel Source
      • Building the KHM
      • Testing the KHM
      • Installing the KHM
      • Restarting ServerProtect
  • Troubleshooting
    • Problem with Missing Dependent Libraries in Linux
    • Building and Installing KHM
    • Default Password
    • Web Console Rejects All Passwords
    • Debug Logging
  • Technical Support
    • Troubleshooting Resources
      • Using the Support Portal
      • Threat Encyclopedia
    • Contacting Trend Micro
      • Speeding Up the Support Call
    • Sending Suspicious Content to Trend Micro
      • Email Reputation Services
      • File Reputation Services
      • Web Reputation Services
    • Other Resources
      • Download Center
      • Documentation Feedback
Installation
This chapter guides you through the installation of ServerProtect on your Linux server(s). This chapter discusses the following topics:
  • ServerProtect Installer Options
  • Local Installation Procedure
  • Remote Installation
  • Kernel Hook Module
  • Verifying the Installation
  • Uninstalling ServerProtect
Related information
  • ServerProtect Installer Options
  • Local Installation Procedure
  • Remote Installation
  • Kernel Hook Module
  • Verifying the Installation
  • Uninstalling ServerProtect
Online Help Center

Support
For Home For Business


Privacy Notice
© 2025 Trend Micro Incorporated. All rights reserved.
Table of Contents
  • Preface
    • ServerProtect for Linux Documentation
    • Audience
    • Document Conventions
  • Pre-Installation
    • System Requirements
      • Hardware
      • Software
    • Information Needed to Install ServerProtect
      • Proxy For Internet Updates
      • Apex Central / Control Manager Server Information
      • Activation Code
      • Local or Remote Installation
  • Installation
    • ServerProtect Installer Options
    • Local Installation Procedure
      • Running the ServerProtect Installation Program
      • Accepting the Trend Micro End User Agreement
      • Registering ServerProtect to Control Manager
        • Proxy Server Information
      • Activating ServerProtect During Installation
    • Remote Installation
      • RemoteInstall Features
      • Extracting RemoteInstall From the ServerProtect Binary
      • Using a Configuration File in Your Remote Deployment
        • Converting CSV-Formatted Files to RemoteInstall.conf Format
        • Specifying Clients for Remote Deployment
      • Running the RemoteInstall Tool
        • RemoteInstall Tool Options
    • Kernel Hook Module
      • Installing a Kernel Hook Module Package
      • Remotely Deploying a Kernel Hook Module
    • Verifying the Installation
    • Uninstalling ServerProtect
  • Post Installation Configuration
    • Logging On to the ServerProtect Web Console
    • Setting Up an Administrator Password
    • Configuring Proxy Server Settings
      • General Proxy Settings
      • Component Update Proxy Settings
    • Registering ServerProtect
      • Registering Your Software Using the Registration Key
    • Activating ServerProtect
    • Upgrading to the Full Version
    • Updating Components
      • Initiating Automatic Update on Control Manager
    • Testing ServerProtect with the EICAR Test Virus
      • Obtaining the EICAR Test File
    • Configuring rsyslog for Linux
  • Building and Installing Kernel Hook Module
    • Introduction
    • Requirements
    • Installation
      • Determining your Linux Kernel Version and Architecture
      • Preparing the Kernel Source
      • Configuring the Kernel Source
      • Building the KHM
      • Testing the KHM
      • Installing the KHM
      • Restarting ServerProtect
  • Troubleshooting
    • Problem with Missing Dependent Libraries in Linux
    • Building and Installing KHM
    • Default Password
    • Web Console Rejects All Passwords
    • Debug Logging
  • Technical Support
    • Troubleshooting Resources
      • Using the Support Portal
      • Threat Encyclopedia
    • Contacting Trend Micro
      • Speeding Up the Support Call
    • Sending Suspicious Content to Trend Micro
      • Email Reputation Services
      • File Reputation Services
      • Web Reputation Services
    • Other Resources
      • Download Center
      • Documentation Feedback
Close