Kaspersky Endpoint Security 12.0 for Linux

This intended audience of this Help are technical professionals responsible for installing and administering the Kaspersky Endpoint Security application, as well as supporting organizations that use Kaspersky Endpoint Security. This Help is intended for professionals who are familiar with operating systems and Linux®, have mastered the basic techniques of managing them, and have experience using the Kaspersky Security Center remote centralized management system for Kaspersky applications.

Kaspersky Endpoint Security 12.0 for Linux ("Kaspersky Endpoint Security", "application") protects devices running Linux® operating systems against various types of threats, including network and scam attacks. You can use Kaspersky Endpoint Security as part of Kaspersky Security for Virtualization Light Agent to protect virtual machines running Linux guest operating systems.

The application is not intended for use in industrial processes involving automated control systems. To protect devices in such systems, we recommend using Kaspersky Industrial CyberSecurity for Linux Nodes.

The application is used to:

Additional features are provided to keep the application up to date and extend the functionality of the application. The application is used to:

To familiarize yourself with the functionality of Kaspersky Endpoint Security 12.0 for Linux, you can install the application in standalone mode on an individual device in your infrastructure. Instructions on the installation and initial configuration of the application in standalone mode on the command line, as well as recommendations on how to optimize the application are provided in the Quick Start Guide (open the Quick Start Guide).

You can manage Kaspersky Endpoint Security using the following methods:

The update functionality (including anti-virus signature updates and code base updates), as well as the KSN functionality may not be available in the application in the territory of the USA.

In this Help section

About Kaspersky Endpoint Security usage modes

Distribution kit

Hardware and software requirements

Page top