Symantec Endpoint Protection (SEP) for Linux definitions can be installed using Intelligent Updater through the following one-liner, which produces no output:
yum -y -q install sharutils ncompress curl > /dev/null 2>&1 && curl -Os `curl -s https://www.symantec.com/security_response/definitions/download/detail.jsp?gid=sep#secTab3 | grep -Eo 'http://.*/defs/[0-9]+-...-core15unix.sh'` && chmod +x *core15unix.sh && ./*core15unix.sh > /dev/null 2>&1 && rm -f *core15unix.sh
apt-get -y -qq install sharutils ncompress curl > /dev/null 2>&1 && curl -Os `curl -s https://www.symantec.com/security_response/definitions/download/detail.jsp?gid=sep#secTab3 | grep -Eo 'http://.*/defs/[0-9]+-...-core15unix.sh'` && chmod +x *core15unix.sh && ./*core15unix.sh > /dev/null 2>&1 && rm -f *core15unix.sh
zypper -q install sharutils curl > /dev/null 2>&1 && curl -Os `curl -s https://www.symantec.com/security_response/definitions/download/detail.jsp?gid=sep#secTab3 | grep -Eo 'http://.*/defs/[0-9]+-...-core15unix.sh'` && chmod +x *core15unix.sh && ./*core15unix.sh > /dev/null 2>&1 && rm -f *core15unix.sh
This will:
As part of running the Intelligent Updater file, log output will be added to /var/log/iu-install.log:
BEGIN Log of Intelligent Updater installation on rhel72.granite.test Fri Jun 28 06:39:26 PDT 2019 Validating available tools... Decoding Intelligent Updater package... Checking distribution integrity... Extracting distribution files... Installing virus defintions to /opt/Symantec/virusdefs/incoming/ Copying definition files... Removing temporary files... Virus definitions installed successfully. Fri Jun 28 06:39:45 PDT 2019 END Log of Intelligent Updater installation on rhel72.granite.test
If definitions were not successfully installed before, then restart the services using /etc/init.d/smcd restart && /etc/init.d/autoprotect restart. The successful update of the virus definitions can be verified using /opt/Symantec/symantec_antivirus/sav info -d.
Notes: