Kaspersky Endpoint Security 11 for Linux
Kaspersky Endpoint Security 11 for Linux (hereinafter also referred to as Kaspersky Endpoint Security) protects computers running Linux® operating systems against malware. Threats can infiltrate the system via network data transfer channels or from removable drives.
The application lets you:
- Scan file system objects located on the computer's local drives, as well as mounted and shared resources accessed via the SMB and NFS protocols.
- Scan file system objects both in real time using File Threat Protection tasks and on demand using virus scan tasks.
- Scan boot sectors.
- Scan process and kernel memory.
- Detect infected objects. If an object is found to contain code from a known virus, Kaspersky Endpoint Security considers the object as infected.
- Neutralize threats detected in files.
- Automatically choose what action to perform to neutralize the threat.
- Save backup copies of files before disinfection or deletion and restore files from backup copies.
- Manage tasks and configure their settings.
- Add keys and activate the application by using activation codes.
- Notify the administrator about events occurring during the operation of Kaspersky Endpoint Security.
- Update Kaspersky Endpoint Security databases from Kaspersky update servers, via the Administration Server, or from a user-specified source by schedule or on demand.
- Use anti-virus databases to detect and disinfect infected files. Kaspersky Endpoint Security analyzes each file for threats during the scan process: file code is matched against code that resembles a particular threat.
- Monitor the integrity of the system or specified files, and report changes. System Integrity Monitoring can be performed in a constant monitoring mode, and in on-demand scan mode.
- Manage an operating system firewall and, if necessary, restore a set of the firewall rules that was changed.
- Protect your files in the local directories with network access by SMB/NFS protocols from remote malicious encrypting.
- Scan traffic that arrives to the user computer via the HTTP/HTTPS and FTP protocols, and check whether web addresses are malicious or phishing.
- Configure flexible access restrictions to mass storage devices (such as hard drives, removable drives, CDs, DVDs), data transmission equipment (such as modems), equipment that converts information (such as printers), or interfaces for connecting devices to computers (such as USB, FireWire).
- Scan removable drives when they are connected to a computer.
- Inspect inbound network traffic for activity that is typical of network attacks.
- Scan Docker containers and images, name spaces.
- Receive information about the actions of applications on a computer.
- Specify encrypted connections scan settings.
- Participate in Kaspersky Security Network.
- Allow non-root users manage basic application functions using the graphical user interface.
- Update the application by using update packages.
- Check the integrity of application components by using the integrity check tool.
You can manage Kaspersky Endpoint Security by using the following methods: