This article covers frequently asked questions for Symantec Endpoint Protection (SEP) for Linux.
For SEP client version 14.3 RU1 and later:
See Supported kernels of Symantec Linux Agent
For SEP client version 14.3 MP1 and earlier:
For a List of Linux Distributions and Kernels with Precompiled Auto-Protect Drivers/Modules for Symantec Endpoint Protection for Linux 14.x
For specific SEP version requirements, see Release notes, new fixes, and system requirements for all versions of Endpoint Protection.
SEPM install is only supported on Windows Servers.
See System requirements for Symantec Endpoint Protection (SEP) for information on installing SEP for Linux.
NOTE: SEP for Linux / Symantec Agent for Linux MUST be allowed to install into the Host instance with root access to the underlying system. Installing SEP in a "container" is NOT supported because its denied access to run the required KMOD modules.
SEP for Linux supports AutoProtect (real-time scanning) and scheduled scans. Network protection components, such as IPS and firewall, are not available.
Installing Symantec Endpoint Protection clients with Remote Push (using the Client Deployment Wizard) is NOT supported.
For SEP client version 14.3 RU1 and later:
See Updating the kernel modules for the Symantec Linux Agent
For SEP client version 14.3 MP1 and earlier:
For minor updates to the Linux OS, such as (RHEL) 5U6 to (RHEL) 5U7, the SEP client can remain in place. However, if the new kernel version is not supported by the pre-built Auto-Protect kernel modules provided with the SEP client, the modules must be recompiled after the Linux OS upgrade completes; this process is not automatic and must be initiated by the end-user.
For a major update to Linux OS on a client system (e.g. from RHEL 5 to RHEL 6), we require temporarily removing the SEP client and cleanly reinstalling the compatible version after an upgrade to avoid possible corruption to logs and Symantec Endpoint Protection components.
For SEP client version 14.3 RU1 and later:
As of version 14.3 RU1, the Linux client installer detects and uninstalls the legacy Linux client (earlier than 14.3 RU1) and then performs a fresh install. Old configurations will not be retained.
See Upgrading the Symantec Linux Agent
For SEP client version 14.3 MP1 and earlier:
See Supported upgrade and migration paths to Symantec Endpoint Protection.
No. AutoUpgrade does not work for Linux machines.
See Uninstalling the Symantec Linux Agent or the Symantec Endpoint Protection client for Linux for information.
You can update the SEP client that is installed on Linux in the following ways:
No, the SEP for Linux client cannot act as GUP, nor can it receive updates from a GUP.
Daily, once usually in the morning Pacific Time (west coast, USA).
For SEP client version 14.3 RU1 and later:
Check last server the client connected to and when using command in a terminal window:
cat /var/symantec/sep/state.xml
For SEP client version 14.3 MP1 and earlier:
To check management status using commands in a terminal window:
/opt/Symantec/symantec_antivirus
#./sav manage -s
To check in the client user interface, look under Management. Server shows the IP address or hostname of the management server.
For SEP client version 14.3 RU1 and later:
Symantec Agent or Symantec Endpoint Protection for Linux 14.3 RU1 and later cannot run as an unmanaged client.
For SEP client version 14.3 MP1 and earlier:
Yes. See Importing client-server communication settings into the Linux client​.
Linux computers that are AD/LDAP members may not appear correctly in SEPM-imported OUs. This is by design. As of SEP 12.1 RU6, Mac and Linux SEP clients may only be managed using SEPM-defined groups.
For SEP client version 14.3 RU1 and later:
As of 14.3 RU1, enabling the Linux client as an unmanaged detector is deprecated. See Configuring a client to detect unmanaged devices for more information.
For SEP client version 14.3 MP1 and earlier:
Even though the command can be sent, these features are not supported for SEP for Linux clients.
For SEP client version 14.3 RU1 and later:
# /usr/lib/symantec/stop.sh
To start the SEP services:
# /usr/lib/symantec/start.sh
For SEP client version 14.3 MP1 and earlier:
Virus and Spyware Protection can be disabled (or enabled) with the following commands:
# /etc/init.d/rtvscand stop
# /etc/init.d/symcfgd stop
# /etc/init.d/smcd stop
More options: {start|stop|status|report|restart|condrestart}
No.
By default, the SEP client for Linux does not scan symbolic links, commonly referred to as symlinks or soft links. This is a change in the scanning behavior from Symantec Antivirus (SAV) for Linux, which scanned symbolic links by default. See Enabling the scanning of symbolic links in Symantec Endpoint Protection for Linux for more information.
SEP for Linux will register only in computer mode and cannot be switched to user mode.
For SEP client version 14.3 RU1 and later:
Symantec Agent for Linux versions 14.3 RU1 and later do not have a graphical user interface.
For SEP client version 14.3 MP1 and earlier:
There are not many changes that the end-user can make. As of 12.1 RU6, the client user interface for SEP for Linux has only one button, LiveUpdate.
SEP for Linux does not support the Client User Interface Control Settings.
No. SEP for Linux is only a file system antivirus and anti-spyware solution.
Use the following command to perform a test, where <SEPM_IP_OR_HOSTNAME> is the IP address or hostname of the management server, and <PORT> is the appropriate port number.
# wget http://<SEPM_IP_OR_HOSTNAME>:<PORT>/secars/secars.dll?hello,secars
For SEP client version 14.3 RU1 and later:
You find the Symantec Linux Agent logs at the following locations:
/var/log/sdcsslog/amd.log
/var/log/sdcss-caflog/cafagent.log
/var/log/sdcsslog/SISIDSEvents*.csv
/var/log/sdcss-caflog/cve.log
For SEP client version 14.3 MP1 and earlier:
LiveUpdate: LiveUpdate logging is saved by default to /opt/Symantec/LiveUpdate/liveupdt.log
.
LiveUpdate logging is always on. You can change the default LiveUpdate log file path by editing /etc/liveupdate.conf. See The default contents of liveupdate.conf in Symantec Endpoint Protection for Linux for more information.
defutil: By default, defutil logging is saved to /opt/Symantec/virusdefs/defutil.log
.
You check defutil logs if the LiveUpdate log indicates a successful session, but the definitions do not update. For example, you might see the error "Failure in post processing" error at LiveUpdate command line.
To debug these errors, enable defutil logging:
/etc/symc-defutils.conf
.[defutillog]
, if it does not exist.defutillog_name=defutil.log
.Example of an entry in symc-defutils.conf:
[defutillog]
defutillog_name=defutil.log
For SEP client version 14.3 RU1 and later:
/var/log/sdcss-caflog/cve.log - provides information related to communication between Symantec Endpoint Protection Manager and the agent. By default, the CVE logging level is info.
To enable debug logging:
systemctl restart cafagent
NOTE: CVE logging does not exist in the cloud-managed SEP agent (SES)
For SEP client version 14.3 MP1 and earlier:
Communication Module/Sylink logging is saved to /var/symantec/Logs/debug.log
.
To enable debug logging:
/etc/symantec/log4j.properties
, with the following contents:log4j.appender.A1=org.apache.log4j.FileAppender
log4j.appender.A1.fileName=/var/symantec/Logs/debug.log
log4j.appender.A1.layout=org.apache.log4j.PatternLayout
log4j.appender.A1.layout.ConversionPattern=%d{%Y-%m-%dT%H:%M:%S.%l%Z} %t %p %c{2.EN_US} %m%n
log4j.rootCategory=DEBUG, A1
sudo service smcd restart
Auto-Protect only supports five file system types: SMBFS, CIFS, AFS, NFS, and VMHGFS
For SEP client version 14.3 RU1 and later:
/usr/lib/symantec/stop.sh
/opt/Symantec/sdcssagent/AMD/system/AntiMalware.ini.1
/opt/Symantec/sdcssagent/AMD/system/AntiMalware.ini
amdmanagement.antimalware.trace.level=trace
/usr/lib/symantec/start.sh
For SEP client version 14.3 MP1 and earlier:
Use the following command to enable vpdebug logging:
# ./symcfg add --key '\Symantec Endpoint Protection\AV\ProductControl\' --value 'Debug' --data 'ALL' --type REG_SZ
Repeat the same command with no value for data to turn it OFF:
# ./symcfg add --key '\Symantec Endpoint Protection\AV\ProductControl\' --value 'Debug' --data '' --type REG_SZ
For SEP client version 14.3 RU1 and later:
You can use GetAgentInfo script to collect all log files into a ZIP file that you can send to customer support.
For SEP client version 14.3 MP1 and earlier:
There are two methods for gathering diagnostic information on Linux clients:
For information on viewing individual log files and configuring additional logging options on a Linux client, see Overview of log and configuration files in Symantec Endpoint Protection for Linux.
For SEP client version 14.3 RU1 and later:
For SEP client version 14.3 MP1 and earlier:
See the online Symantec Endpoint Protection Installation and Administration Guide and "System Requirements" section. As of SEP 14.3 MP1, Symantec Endpoint Protection 14.3 MP1 Release Notes are 1 GB of RAM and 7 GB of available hard disk space.
XFS file systems that contain inode64 attributes are only supported if SEP 14.2 MP1 (14.2.1015.0100) or newer is installed.