Home
        Linux Security Review 2015  - AV
         Contents
1.     localhost   Trend Micro ServerProtect for Linux   Mozilla Firefox      E3 localhost   Trend Mic    x   dp          A https   localhost 14943 SProtectLinux showpage cgi pi  v G 3N Google    E TREND MICRO    ServerProtect           Summary       Scan Options System Information  2015 04 29 13 07 14     Real time Scan Product version  Trend Micro ServerProtect for Linux 3 0  Platform  Inte R  Xeon R  CPU E5 2650 v2   2 60GHz  x86_64   OS  CentOS release 6 6  Final        Kemel version  2 6 32 504 e16 x86_64    Backup Directory Scan Results for   Virus d 0 viruses spywares detected today                  gt  Update Summary Last 7 days   gt  Logs Virus uncleanable   gt  Notification Virus quarantined   gt  Administration Virus deleted  Virus passed  Virus cleaned  Virus renamed     Scan Status  Realtime Scan  Enabled  Incoming files           Scheduled Scan  Disabled    Manual Scan    Scan now            Update Status   Update now    W  Component Current Version Last Updated  Virus Pattem 11 637 00 2015 04 29 11 58 21          Spyware Grayware Pattem 1 617 00 2015 04 29 11 58 21  Scan Engine 9 800 1009 2015 04 29 11 58 21       Features  Trend Micro ServerProtect for Linux features on access as well as on demand scanning  It also  supports central management by connecting to the Trend Micro Control Manager     System requirements  32 64 bit versions of  Red Hat Enterprise Linux 4 5 6  CentOS 5 6  SUSE Linux Enterprise 10    Test platform  64 bit CentOS 6 6    Version tested  3 
2.    Windows  Linux  Android  105  to be managed from a central server  Remote installation of the  Linux client requires some additional configuration  The provided installer then resolves all required  dependencies automatically  providing a straightforward installation process  Configuring single or  multiple clients from the G Data Administrator is simple      46     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Kaspersky Anti Virus for Linux File Server    Kaspersky Web Management Console   Mozilla Firefox       WK Kaspersky Web Management                localhost 9080  summary  C  B  il Q A       Kaspersky Anti Virus English Y Help About   Log Off  for Linux File Server       Protected      S Summary     Real time protection    da On demand scan             Running Status OK  y Quarantine Objects detected 0 s Last update 07 05 2015 10 23 48    Backup Update published 07 05 2015 00 14 00  Reports  Log  License    General settings    Notifications   Status License is valid There are no quarantined objects     Expiration date 03 01 2016  Days left 241 days       Features   Kaspersky Anti Virus for Linux File Server is an antivirus program with real time protection and on   demand scanning  It is designed to be centrally managed by the Kaspersky Security Center  but can  also be installed as a stand alone program on each server workstation     System requirements   Kaspersky Lab lists the following compatible distributions on their website   
3.  2015 www av comparatives org    Help   Clicking Help on the More tab opens the program   s online help page    Furthermore  all sub windows that can be opened from the application s main window contain a   What do these settings do   link at the bottom of the window  This link leads to a website that  provides detailed information on all available options of that window     Scan Profiles    My Computer          Critical Areas Edit     Remove    Y What do these settings do    Apply     Cancel         The    More    tab of the main window also contains a link to COMODO s support forum     Verdict   Although the initial installation of Comodo Antivirus for Linux is entirely GUI based  post setup  configuration and enabling real time protection require use of the terminal  On Ubuntu 14 04 1  we  found that enabling real time protection required manual replacement of a driver  not recommended  for Linux novices   Once the program is up and running  it can be used in very similar fashion to a  typical Windows antivirus program  The main window makes important status information and  important functions such as update and scan easily accessible  The help feature is good  Suggestions  for improvement  in addition to full compatibility with Ubuntu 14 04 1  would be to increase the  sensitivity of the real time protection to detect malware on a flash drive     395     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Dr Web Anti virus for Linux    Dr Web 
4.  HTML documentation that provides a detailed description of the  program s functionality  Links to the Dr Web online forum and tech support are also included in the  help menu     Verdict   Dr Web Anti virus for Linux requires the use of the Linux terminal to install necessary packages and  start the installer   s GUI  The program itself can be operated entirely using the graphical user  interface  which makes status information and everyday tasks easily accessible  Help facilities are  very good      27  AV       comparatives    Linux Security Reviews 2015 www av comparatives org    eScan Anti Virus for Linux    Submit Sample   Feedback   Help   License information a HD       eScan for Linux  7 0 11         Date of virus signature 03 03 2015 17 18  Last computer scan 03 03 2015 18 30      POT ra Update  9 Scheduler       Scan my computer    Scan home directories    Custom scan_    Scan memo    Options   Logs   Quarantined    Features  eScan for Linux provides on demand scanning using a command line scanner or the included  graphical user interface     System requirements   Supported operating systems are listed on the manufacturer s website    CentOS 5 4  Fedora 11  64 bit   RedHat Enterprise 4  5 and 6  openSUSE 11 3  32 bit   Ubuntu 9 04   9 10 and 10 04    Test platform  64 bit Ubuntu 14 04 1 LTS    Version tested  7 0 5  There are separate installers for 32 and 64 bit systems     Home business version  There is only one version of the program  which is listed in both the
5.  Home and Business sections of    the manufacturer s website     Licence  eScan Anti Virus for Linux is a paid for program  which can be tried out free of charge for 30 days      28     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Installation  eScan provides a  deb package on their website     that can be installed using Ubuntu s Software  Center  No other packages are required to install the software     Deinstallation  The program can be removed via the Ubuntu Software Center     Accessing the program  The application neither displays a tray icon  nor does it add menu entries to Ubuntu s file manager  nautilus     Non administrator access   The main program window can be started as a regular user or as root  after the user has provided  administrator credentials   The interfaces shown for root  displayed above  adds the Scheduler  section to the interface  allowing admins to create scheduled scans     Main program window   The program opens on the Scans page  There is no status display  as the program does not include  real time protection  Scans can be started from the home page of the application  with options to  scan the whole computer  memory  home directory or specific drives folders files  There is an  Update tab at the top of the window  Logs and Quarantine are both available from the Scans page   If opened with Root privileges  the program displays a Scheduler tab at the top of the window   There are links to Licence information 
6.  Lab applications  L rin re p ter s   2  Discovered unassigned  b CH Remote installation  t Mobile Device Management    dd x    Install Kaspersky Anti Virus    View managed computers structure     3 s    Manage keys    Configure automatic moving of computers into administration   gt   P Repositories groups     View protection deployment report     View unassigned devices    Administration Server USER PC  User PC User     AMS A Getting started          Computer protection and virus scan  e Protection is running O e Updates repository last updated  1 hour ago e   Y Edit protection policy for workstations    Go to Updates folder    Edit virus scan task for workstations   View report on anti virus databases in use      Manage applications on dient computers    Administration Server  e Kaspersky Security Center is running properly QO e   Q View protection status    Administration Server properties     View reports    View information about Administration Server    View user requests key    Edit notification settings    Configure functionality displayed in user interface        gt  View introduction to Kaspersky Security Center  gt    Getting started  gt     Interface How To K Help    Status Reactivation From Kaspersky Security Center  real time protection can be disabled enabled  for specific machines or for all computers in an administration group  For single machines  real time  protection can be disabled enabled by opening the machine s Properties window from the context   menu
7.  Mozilla Firefox        a  F Secure Linux Secur    x      localhost v     JQA Si QB y A Oo    In Engli sh  a  De ier h    08  iaza  9 LINUX SECURITY  Product status  MALFUNCTION  F Secure On Access Scanner Daemon is not running  KI  Summary E    Tasks    pose  Manual Scan Wizard  2  Scanning files  About A boot or file virus was found   Details  EVALUATION VERSION   FULLY FUNCTIONAL   FREE TO USE FOR 30 DAYS   To purchase license  please check http   www F Secure com purchase     F Secure Anti Virus CLI version 1 0 build 0051    Scan started at Mon Mar 16 15 31 29 2015  Database version  2015 03 16 01     home user Downloads eicar com virus  Infected  EICAR Test File  FSE    home user Downloads eicar com virus  Infected  EICAR Test File  not a virus   Protecting the irreplaceable  Aquarius     Advanced mode    Update The virus definition database is updated automatically by the program  Manual database  updates can only be performed using the dbupdate command line script included in the installation   Logs In advanced mode  alerts can be viewed by selecting the respective menu item  Alerts can also  be forwarded by e mail    Quarantine The program does not use a quarantine  However  the user can specify a custom action  for infected files  Using this functionality  it is possible to create scripts that will be run as root to  process the infected files    Scheduler In advanced mode  scan schedules can be defined in the    Scheduled Scanning    section     Licence When using t
8.  The large number of different software configuration certainly makes  it harder for adversaries to produce malware that is compatible with a  bigger fraction of these configurations                                      The large number of software configurations does not only affect  malware authors  however  ili E  During the review  we found that there are essentially two ways that 17 SS  vendors implement on access scanning  either use or implement a  Linux kernel module to intercept file accesses  or build the protection ji  component around the fanotify file system monitoring interface built      into newer Linux kernel versions                                   Pia             A problem with the kernel module approach is that updates to the  Linux kernel can cause these low level kernel modules to become  incompatible  resulting in a malfunctioning real time protection  module  Since the Linux kernel may be updated quite frequently    especially on non server machines   these modules can be hard to  maintain for vendors of security software                               Graph source  GNU Linux Distribution Timeline 2012  http   futurist se gldt       Be    comparatives       Linux Security Reviews 2015 www av comparatives org    While the fanotify approach seems a bit easier to maintain  it has its own downsides   some  distributions disable this kernel extension by default  for instance     The relatively low market share of Linux based operating systems on home user 
9.  a  licence  ESET s Unilicense model allows licence keys to be used for Windows  Mac or Linux programs  interchangeably  and also lets users protect up to 3 operating systems on the same physical machine   for dual boot or virtualised systems         AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Installation   Before starting the installer  which can be downloaded from the ESET website         some preparations   have to be made by the user    e The file needs to be marked as executable first  chmod  x eset_nod32av_64bit_en linux    Alternatively  the user can right click it  click Properties  Permissions  and then enable Allow  executing file as a program  This is described in the program   s manual    e Even if the 64 bit version of the software is used on 64 bit Ubuntu  the installer will not start  without having the 32 bit version of libc installed  sudo apt get install libc6 i386     After performing these steps  the installer can be run from the console    sudo   eset_nod32av_64bit_en linux   During installation  the Custom installation option should be   selected  so that the current user can be added to the list of Privileged users in subsequent pages of   the install wizard  without this step a non root user cannot activate the product later   The rest of  the installation process is straightforward   the only choice the user has to make is whether he or   She wants to enable the detection of  Potentially unwanted applications     A
10.  access   Changing the application s settings or disabling the protection components requires the user to  specify administrator credentials  entering their user password is sufficient if the user is allowed to  use sudo   Enabling the components does not require administrator privileges     Main program window   The main window consists of two sections   a small menu bar on the left hand side of the window   and a main pane with status and licence information  as well as scan and update buttons  When an  option on the home screen is selected  a corresponding icon is added to the end of the tool bar   allowing quicker access to the respective status information in the future  similar to tabs in a web   browser   The home screen also allows individual files to be scanned easily by dropping them onto  the marked area     12 https   download drweb com demorea home  demo for 3     25     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Status Reactivation The real time protection  SpIDer Guard  and the web protection  SpIDer Gate   components can be enabled disabled from the tray icon menu or in their respective tabs from the  main window  after the user entered his password to gain administrator privileges   When these  components are disabled  exclamation marks are shown as a warning on the main screen and the  tray icon     KAI SpiDer Guard  Disabled    4 SplDer Gate  Disabled   Scan Scans can be started from the Scanner tab  the magnifier icon i
11.  administrator privileges deactivate the  protection     Main program window  We describe the program   s main window  and note how to access the  following functions  Status Reactivation  Scan  Update  Logs  Quarantine  Scheduler  Licence  information  Help  Settings     Malware alerts  Description of the malware alert shown when a threat is detected   Help  Help features such as manuals and knowledgebase articles     Verdict  We summarise the functionality and ease of use overall     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Avast File Server Security    user ubuntu review       user ubuntu review    scan Downloads    home user Downloads eicar com EICAR Test NOT virus       user ubuntu review          Features  Avast File Server Security is part of Avast   s Linux Security Suite  It features an on demand command   line scanner  as well as a fanotify based real time protection component     System requirements  Avast lists the following distributions as compatible   CentOS 7  Debian 7  Red Hat Enterprise Linux 7  Ubuntu 12 4 LTS    Test platform  64 bit Ubuntu 14 04 1 LTS    Version tested  1 2 0  64 bit  a 32 bit version is available as well     Licence  Commercial  The user can apply for a 30 day trial licence     Installation   As documented on Avast s website     prior to installation  the licence file and Avast   s PGP public key  file need to be copied onto the target machine    To install Avast File Server Security and be able to 
12.  for scanning and updating can be accessed from the Scan Options and the Update sections  of the web user interface    Logs can be accessed from the Logs section of the web interface           comparatives    Linux Security Reviews 2015 www av comparatives org    Quarantine is located by default in the quarantine in the   opt TrendMicro SProtectLinux SPLX Quarantine folder  can be changed from the    Quarantine  Directory    option in the Scan option menu   Files are quarantined by being moved into the  quarantine directory  Administrators can therefore view the content or empty the quarantine  directory using the file explorer or the terminal     Update By default  the program is configured to update the virus definition database once every day     Manual updates can be performed from the    Manual Update    option in the Update menu or by  clicking the    Update now    button in the Summary section    Licence Licence information can be accessed from the    Product Registration    option in the  Administration menu    Help The help menu is located at the top right hand corner of the web interface  Every menu option  also includes a help link at the top  providing helpful information about the currently selected  option     Malware alerts   On our testing system  no notifications were displayed on malware detection  However  the  application can be configured to send notification emails in such cases  The file is silently treated  according to the actions defined in the real 
13.  infected files without prompt    Update By default  the virus definitions are updated once every hour  To manually update the  database  the fpupdate executable can be used  sudo  opt f prot fpupdate    Logs The scanner does not write log files of scanning events    Quarantine The application does not specify a default quarantine directory and it is not possible to  define a quarantine directory for single scans    Scheduler Scheduled scans can be configured by creating a cron job to run fpscan    Licence We could not find any licence information    Help Help documents are available online     Besides the online help  there are man pages available  for fpscan and fpupdate  man fpscan and man fpupdate     Settings The scanning daemon can be configured using the configuration file located at  opt f   prot f prot conf  The configuration options are documented within the configuration file     18 http    www f prot com download trial    12 http   www f prot com support helpfiles unix workstation index html     36     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Malware alerts  Not applicable  as there is no real time protection or GUI     Help  The documents are quite outdated  as they still refer to old versions of the programs  However  the  general procedures should also be applicable to the newer program version     Verdict   F PROT Antivirus for Linux is an easy to install command line scanner  Uninstalling the product  might become tediou
14.  linux security latest     39     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Main program window   F Secure Linux Security provides a web user interface  which  by default  can be accessed at  http   localhost 28080 fsecure webui  The interface mainly consists of two sections  The section on  the left hand side contains a menu with available options  The section on the right hand side  contains status information or further actions for the option selected in the menu    If the    Advanced mode    checkbox is unchecked  the number of available options is reduced  In the  standard mode  the program s core functionality can be accessed after selecting the    I want to        option  scanning for malware  adding firewall rules  integrity checking    Status Reactivation The program s protection components can be disabled enabled from the  summary tab of the web interface  The interface will display a    Malfunction    warning as well as error       Virus Protection Disabled   Details        Firewall Protection Disabled   Details          Integrity Protection Disabled   Details       Scan Scans can be started from the    I want to       tab by clicking the    Scan the computer for  malware and riskware    option  In the wizard that is displayed after selecting the scan option  the    user needs to specify the full path of all files and or directories he wants to scan manually   no file  selection dialog is available     F Secure Linux Security  
15.  log in to the  Endpoint Protection Manager  Selecting    Install protection client to computers    from the    Common  tasks    menu opens a wizard create an installation package  Selecting Linux as the target operating  system and choosing the save location of the package finishes the process     To install the Linux client on Ubuntu 14 04  the created archive needs to be copied onto the Linux  machine and extracted into the root file system    sudo unzip SymantecEndpointProtection zip  d     This problem did not occur on Ubuntu 12 04  There  unzipping the archive into the current directory  also works  unzip SymantecEndpointProtection zip    Before starting the install script  some additional packages are required  sudo apt get install libc6   1386 libx11 6 1386   Furthermore  Java 8    and the Java Cryptography Extension  JCE  unlimited strength policy files   are  needed  To install these components  the following steps are necessary  if no JRE is installed yet    1  Download the respective archives from the websites linked above  2  Extract the archive and copy it to the install location  sudo tar xzf jre 8uxx linux x64 tar gz    C  opt  3  Setup alternatives system    sudo update alternatives   install   usr bin java   java    opt jre1 8 0_xx bin java  1  sudo update alternatives   install   usr bin javaws   javaws    opt jre1 8 0_xx bin javaws  1  sudo update alternatives   set  java    opt jre1 8 0_xx bin java   sudo update alternatives   set  javaws    opt jre1 8 0_
16.  needs to be entered  whenever the application s settings are accessed and thereby also restricts the disabling of the anti   virus component        10 As Sarp in the System Requirements  only Ubuntu 12 04 is Snn by the manufacturer   11 http   ubuntuforums org showthread php t 2205814 po0st12930865     21  AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Main program window   The program window is laid out with a narrow left hand column  and a row of four horizontal tabs   Summary  Antivirus  Mail Gateway and More  above a larger right hand pane    Status Reactivation A status display is shown in a column on the left hand side of the window  If  the anti virus component is disabled  the status display on the left hand side of the main window  will display a warning and provide a button to quickly re enable the component     The antivirus protection is  disabled     Enable now       Scan Scans can be started from the main window by clicking the  Scan now  link in the summary tab  or the  Run a Scan  item in the    Antivirus    tab    Both actions open a window in which the user can select a full scan or a scan of  critical areas     The  user can also create a custom scan profile  including only specified directories    Update The virus database can be updated by clicking on the date of the last database update in  the  Summary  tab  or by clicking the relevant item in the  Antivirus  tab    Quarantine and Logs Quarantined files and anti virus l
17.  of the Managed computers list and stopping or starting the Real time protection task in the  Tasks section  To disable or enable real time protection for an administration group  a policy for the  File Server Anti Virus can be created  Policies for groups can be created from the Policies tab of the  respective group  The    New Policy Wizard    allows administrators to specify scan areas  exclusions  and whether Real time protection should be enabled     If real time protection is disabled for a computer  both the Security Center and the management  console on the client side will display a warning           Computer protection and virus scan Le   Summary      e Protection is disabled  1 computer s  OQ       Real time protection       Edit protection policy for workstations Hs Status     Edit virus scan task for workstations     Manage applications on dient computers    Stopped    A Objects detected 0  Y   je ecte       Management Center Client web console    a AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Scan From the client   s web console  on demand scans can be started by starting one or more scan  tasks from the On demand scan section  creating new tasks is also possible   From the Security  Center scan tasks can be created and started   either for specific computers  or for the whole  administration group    Update Manual updates can be performed from the client   s web console  Similar to scanning  update  tasks can be assigned to sp
18.  other malware   On access scanning  using the fanotify API  is also included  By default  ClamAV does not include a  graphical user interface  However  third party GUIs are available  e g  ClamTk      System requirements   According to ClamAV   s website  there are precompiled packages available for the following Linux  distributions  Debian  Red Hat Enterprise Linux  CentOS  Fedora  Mandriva  Gentoo  openSUSE and  Slackware  No information about specific supported versions is provided  For compiling the program  manually  the only mandatory requirements are a C compiler and the gzip library to extract the  archive containing the source code     Test platform  64 bit Ubuntu 14 04 1 LTS  64 bit Ubuntu 12 04 2 LTS    Version tested  0 98 6  64 bit  32 bit systems are supported as well     Home business version  Clam does not distinguish between home and business versions     Licence  ClamAV for Linux is free to all users     Installation    ClamAV can either be compiled from source or installed for various Linux distributions using the  packages on the ClamAV website or the package repositories of the respective distribution      17     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    To install ClamAV on an Ubuntu system  the user has to enter the following command in a command  shell  sudo apt get install clamav clamav daemon clamav freshclam libclamunrar6  clamav contains  the core anti virus engine  clamav daemon is a daemon that loads the li
19.  the  dev  directory  moving  infected files into the quarantine  the  u flag   by default infected files will only be reported    Update The avgsched scheduler component is by default configured to automatically check for  program   every 12h  and virus database updates  every 4h   The user can run the update manually  using the avgupdate command  sudo avgupdate     Logs The event log can be accessed using the avgevtlog command    Quarantine By default  the quarantine folder   or    vault     as the application calls it   is located in  the user s home folder in  avg vault  The vault can be managed using the avgvvctl tool    Scheduler Scheduled scans can be implemented by creating cron jobs that start avgscan    Licence Licence information can be displayed using the avgctl   licinfo command    Help Documentation is available in the man pages of the respective components    Settings The program s configuration files are not stored in plain text  so the avgcfgctl command   line tool is necessary to access the configuration files  The settings that affect each component are  documented in the respective man pages     Malware alerts  Unknown  since on access scanning could not be enabled     Help  The program installation includes readme files for available plug ins  Other than those files  only the  man pages of the respective components  e g   man avgscan  are available     Verdict   AVG Free for Linux is highly configurable and performing on demand scans is straightforward   
20.  was started    Update Virus definitions are downloaded automatically  The documentation does not reveal a way to  start updates manually    Logs From the web console  detection and status logs can be compiled into reports from the Reports  tab  On the client side  the scan logs  which are sent to the server  are located in the   opt PCOPAgent Common DATA ScansLogs folder    Quarantine Quarantined files can be managed from the respective tab in the web management  console   Scheduler Every scan task can be assigned a schedule at creation    Licence information is clearly displayed in the Licences section of the Status tab of the web  console    Help The web console includes a help menu to access help documents or contact the technical  support  On the client side  no help facilities are available    Settings can be configured from the Settings tab of the web console  Those settings can be applied  to a group of computers  but not individually  On the client side  the frequency of policy checks and  transmissions of status messages can be changed in the  etc PCOPLinux PCOPLinux conf file  The  time after which the client should label old policies as expired can be changed in the   opt PCOPAgent Common DATA AgentChkP ini file     Malware alerts  On the client side  no malware alerts are displayed  In the web management console  malware  detections are displayed in the Detected Threats graph of the Status tab     Help  The help menu of the web management console contains a link 
21. 0    Home business version  The product is designed for business users  No home user version is available     Licence  The program is commercial  with a 30 day free trial available       AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Installation   Firstly  the archive containing the installer needs to be downloaded from Trend Micro s website      Since the Linux kernel included with CentOS 6 6 is not supported out of the box  the matching  kernel module update also needs to be downloaded from the mentioned website  the module for  kernel 2 6 32 504 el6 x86 64 x86 64 in our case     Next  some additional packages are required before starting the installer  Those packages can be  installed using the command sudo yum install compat libstdc   296 i686 libuuid i686 zlib i686    After installing the required packages  the downloaded archive can be extracted and the installer  can be started  sudo   SProtectLinux 3 0 bin     During the installation process  the user only needs to accept the licence agreement and input the  licence key    To enable real time protection  the kernel module contained in the downloaded kernel update  archive needs to be copied or moved into the program s kernel module directory and marked as  executable  sudo mv splxmod  lt kernel_name gt  o  opt TrendMicro SProtectLinux SPLX module and  sudo chmod 744  opt TrendMicro SProtectLinux SPLX module splxmod  lt kernel_name gt  o     Deinstallation  The software can be uninstal
22. 1 SP2 or later  CentOS 6 x or later     Test platforms   64 bit Ubuntu 14 04 1 LTS  64 bit Ubuntu 12 04 2 LTS  32 bit Ubuntu 14 04 2 LTS  32 bit Ubuntu 12 04 5 LTS    Version tested  2 10  There is one installer for both 32  and 64 bit systems     Home business version  The product is targeted as business users  No home user version is available     Licence  Commercial  A 30 day free trial licence is available     Installation   To install Panda Endpoint Protection on a Linux machine  the matching package needs to be  downloaded from the control panel of the online management console    Furthermore  the following  command needs to be executed to install necessary additional packages  sudo apt get install  libglib2 0 0 i386 libsoup2 4 1 i386 libmcrypt4 i386 libgssapi krb5 2 i386 at  After installing these  packages  the installer can be started  sudo   LinuxWAAgent run    After the installer has finished  the two processes    PCOPScheduler    and    PCOP_AgentService    should  be running on the system  This can be checked by inspecting the output of the command ps aux    grep PCOP     26 Accessible from  https   managedprotection pandasecurity com     56     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Note  when we first tried to install Panda Endpoint Protection on our test system  the required  processes could not be started  The reason for this was that we were missing some required packages  that were not clearly documented on the websi
23. Canaima 3  32 64 bit    Asianux Server 3 SP4  4 SP1  32 64 bit    Red Hat Enterprise Linux Server 5 x  6 x  32 64 bit   7  64 bit    Fedora 14  32 64 bit    CentOS 5 x  6 x  32 64 bit   7 0  64 bit    SUSE Linux Enterprise Server 11 SP1 and SP3  32 64 bit   12  64 bit   Novell Open Enterprise Server 2 SP3  32 64 bit   11 SP1 and SP2  64 bit   Ubuntu Server 14 04 LTS  14 10  32 64 bit    Ubuntu 10 04 LTS  12 04 LTS  32 64 bit    Oracle Linux 6 5  32 64 bit   7 0  64 bit    Debian GNU Linux 6 0 5  7 1  7 5  7 6  7 7  32 64 bit    openSUSE Linux 11 3  32 64 bit   13 1  64 bit     Test platforms    64 bit Ubuntu 12 04 2 LTS  AV Client   64 bit Windows 7 Professional  Management Server     K AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Version tested  8 0 2 256  32 bit  no dedicated 64 bit version available  the 32 bit version also works on 64 bit  systems      Home business version  Kaspersky Anti Virus for Linux File Server is a business program  there is no home version     Licence  The program can be tried out as a fully functional trial version  after which a licence needs to be  purchased     Installation   If Kaspersky Anti Virus for Linux File Server should be centrally managed using the Kaspersky  Security Center  the Kaspersky Security Center Administration Server needs to be installed on a  Windows machine  For that  firstly the respective installation package needs to be downloaded from  Kaspersky Lab s website  onto the machine that 
24. Linux Security Review 2015 www av comparatives org    AV Comparatives          Ey gral Tanta 3    REVIEW eC sD iO dU S A O eae att sm RR 4  MEA A E aca 5  ITIS SO CUTILV TE 6  Items coveredr in there vi EW O 7  Avastehile  Seivet S C CUN A A OS 8  AVG FrecsEditio nitor lin UX A a a E cr E E A ts eee E E A E E A Grenier soe Ti  Bitdefender Antivirus Scanner tor lT 13  E O A E E E car ete E E te E E RR T 17  Comodo Antivirus T RT 20  Dr  We DEAN a TAT 516 BT 1 cme E E oa 24  ESCM ANO VIUS TOn U E A A A A A A A A A A 28  ESET NOD Z Antivirus torn Linux Deskto me a E A A sense sr sae UU ada nema Bl  SA ea ETI ee ccc een sot es eect awe  E cme E A T E 35  aT OOOO arn ene noe 38  GData rento ec De enter cetera ONO OA 42  Kaspersk Anti virus ror STE ST L o ai CRU iO rests OU URSS OS 47  McAfee VirusScan Ne a Ea 53  Panda ENGpoOIn te PrOLeCtIONeRlUS terete reer estar ee teeta T cseeeec T T T 56  Scart Anvi FOE BT 59  sophos Anti VINUSOMLIMUXccer oa PU ie ea Com cu ee Coreen T  60  Symante Endpoint Protection T Or LINUX a E A ONO OE OO 63  Trend Micro ServerProtect Orin E a A A A A A cies cheat E A se ent ene  68  Appendix GT STR L 71    Copyiigiit amd DISClaINIGh s   0 E ese  cence te neers treater ac ee 72       Linux Security Reviews 2015 www av comparatives org    Introduction    Linux operating systems are often considered to be immune to malware attacks  which would mean  that antivirus software for Linux would be redundant  In reality  the situation is not so simple  Linux  mal
25. Linux file server installations        If the program should not be used in a centrally managed environment  the first installation file  suffices     To install the anti virus client on the target Linux machine  the 32 Bit compatibility C library needs  to be installed first  sudo apt get install libc6 i386  Next  the client can be installed using the  command sudo dpkg  i   force architecture kav4fs_ lt version gt _i386 deb  Similarly  the Administration  Agent can be installed using the command sudo dpkg  i_   force architecture  kInagent_ lt version gt _  386 deb  During the installation of the Administration Agent  the user is  prompted to enter the network address of the management server     2 http    www kaspersky com product updates security center  3 http    www kaspersky com de downloads productupdates downloads linux file     48     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    To finish the installation  the setup script of the antivirus client needs to be run  sudo   opt kaspersky kav4fs bin kav4fs setup pl  After accepting the licence agreement  the user needs to  specify the path where the licence file is located  Next  the newest virus definition updates are  downloaded by the script  The user is then prompted whether scheduled updates  on access  scanning or samba support should be enabled  When connected to a management server  all  configuration of the client can be done remotely  Nevertheless  the user can choose to activ
26. Search for client    p          G Data Security Status a Client connections   a BA ManagementServers     a GQUSER PC      YY  G Data Security Client 1 1    9  Ubuntu     Virus signatures 1 1      Monitor 0 0       Email checking 0 0        OutbreakShield 0 0  v   Web protection 0 0      0 BankGuard 0 0     0 USB Keyboard Guard oro   y Y  lt   24 hours         Top 10 clients   Neutralized infections   Report status  5 9 2015 5 12 2015 S   4 28 2015 5 12 2015  sti      Infections  e ae    Es T T T T T T T 1  y           S a 1       Connected Status as per  5 7 2015 12 00 00 AM    Status Reactivation not applicable  since there is no real time protection component for the  client   s local file system    Scan in the Tasks tab of the G Data Administrator  on demand scan tasks can be created and started  for single computers or for a group of computers  depending on the selection in the tree menu     On the client side  scans can be started using the gdavclientc command line tool or from the  graphical interface  if allowed by the management server   command line scans can be performed  even if scanning is restricted by the management server   The command gdavclientc scan    for  example  starts a scan of the whole file system  Reports of detections during on demand scans are  sent to the management server and can be reviewed in the Reports or the Statistics tab  Note that  the Linux antivirus client only supports scanning using one  Engine A  of the two possible scan  engines  Bi
27. Unfortunately  we were unable to make the real time protection run without the computer being  rendered inoperative  which we feel is a major drawback of the program      12     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Bitdefender Antivirus Scanner for Unices       BitDefender Antivirus Scanner for Unices       O    Scan Now Update Now Settings    Antivirus Engines Status Registration Information  Version AVCORE v2 1   11 0 1 12  Jan 21  2015  Key 3A40EEB213FF728D8A3D  Signatures 6707268 Type trial  Scan plugins 17 Remaining 30 day s   Archive plugins 51 Get a new FREE license key for personal use    Unpack plugins 13    Set new key  Last updated Tue 03 Mar 2015 01 20 50 PM CET             _      Log viewer Help About    The BitDefender Antivirus Scanner for Unices features an on demand command line scanner and an  optional graphical user interface for the scanner  included in the downloaded package      Linux kernel 2 6 or newer   glibc version 2 3 2 or newer  gcc 4 x  Supported Distributions    Debian GNU Linux 6 or newer   Ubuntu 10 04 or newer   RedHat Enterprise Linux 5 6 or newer  CentOS 6 1 or newer   SuSE Linux Enterprise Server 11 or newer  OpenSUSE 11 or newer   Fedora 15 or newer    64 bit Ubuntu 14 04 1 LTS  64 bit Ubuntu 12 04 2 LTS    7 14    13  AV       comparatives    Linux Security Reviews 2015 www av comparatives org    Home business version  Bitdefender Antivirus Scanner for Unices is intended for business use  there 
28. ains the other  installation files  Additionally  the web interface displays a quick help section for the currently  selected menu entry  providing short but helpful descriptions of the available options and including  links to corresponding topics in the HTML version of the product guide  available offline      Verdict   McAfee VirusScan Enterprise for Linux provides an intuitive web user interface that provides access  to use almost all program features without having to use the Linux terminal  The help facilities  provided are very useful      55     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Panda Endpoint Protection Plus    rootQubuntu reviews5       Exported environment variable  LD LIBRARY _PATH     Starting  opt PCOPAgent PCoPScheduler pavsl bin Pavsl  cmp  heu  rpt  tmp logfile   home user Downloads  amp     root ubuntu reviewS    cat  tmp logfile  19 05 15 20 28 16 1 0 55172 1779 100 101 0  home user Downloads eicar com  root ubuntu reviewS           Features   Panda Endpoint Protection Plus is designed to provide centrally managed protection for different  platforms  Mac OS X  Windows  Linux  and Android   Its Linux client mainly consists of an on   demand scanner     System requirements   Panda Security s website lists the following supported Linux distributions  Ubuntu version 12 or  later  Red Hat Enterprise  64 bit  version 6 0 or later  Debian Squeeze  OpenSUSE version 12 or later   SUSE Enterprise Server  64 bit  version 1
29. and Help in the top right hand corner of the window   Settings can be found by clicking Options on the home page     3 Scan  Action Disinfect Quarantine  Time elapsed 00 00 13  Total folders scanned 1    Total objects scanned 1043  Total objects infected 1       Mm HH       Scan progress for selected objects    Total objects disinfected 0  Total objects quarantined 1  Total objects deleted 0    File Virus Status   home use    ElCAR Test Ale  not a virus  DB  INFECTED   home use    ElCAR Test Ale  not a virus  DB  DISINFECTION FAILED   home use    ElCAR Test Ale  not a virus  DB  QUARANTINED    Virus scan complete       Malware alerts  These are not applicable  as real time protection is not included     13 http    www escanav com english content products escan linux escan linux desktops as     29  AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Help   The program s help facilities can be accessed by clicking the respective link at the top of the main  window  All facilities listed in this menu are only available online  live chat with the eScan support   an online help containing a somewhat outdated user guide and a link to the MicroWorld forum   Additionally  a man page is available for the command line scanner  man escan      Verdict   eScan Anti Virus for Linux provides an on demand scanner only  with no real time protection  For  users who do not require RIP  the program is easy to install  and provides a straightforward  graphical interfac
30. ate a  web management console on the protected server workstation by specifying a login password in the  post setup dialogue  After the client was installed successfully  the computer should be moved into  a group of managed computers from the Kaspersky Security Center  This can be done by selecting  the computer from the list located in the    Administration Server  gt  Reports and notifications  gt   Computer selections     Unassigned computers with Network Agent    section and adding it to the  desired group  Lastly  the Linux file server anti virus plug in for the Security Center needs to be  installed     At the time of this review  the product version available on the Kaspersky Lab website did not  Support on access scanning on Ubuntu 12 04 5  or 14 10   However  Kaspersky Lab have informed us  that the next version of the program  to be released soon  will support newer Linux kernel versions   By contacting the vendors support service     customers can obtain a copy of the new version prior  to its official release     Deinstallation  The program can be uninstalled using the command sudo dpkg    r kav4fs     Accessing the program   The application does not display a tray icon or add context menu entries to Ubuntu s default file  explorer  as it is primarily designed for usage on server systems that are often not used with a  graphical interface     Non administrator access  Security relevant settings should be configured centrally by administrators by creating and assi
31. ates that 32 and 64 bit versions of the following operating systems are  supported  CentOS 5 8  6 2  Mint 13 CentOS 5 9  6 2  Debian 6 0  OpenSUSE Linux  SUSE Linux  Enterprise Server 1112 1  Fedora 17  Linux Server 5 9  6 3  Red Hat Enterprise  Ubuntu 12 04     Test platforms  64 bit Ubuntu 14 04 1 LTS  64 bit Ubuntu 12 04 2 LTS    Version tested  1 1 268025 x64    Home business version  Comodo Antivirus for Linux is found in the Home  amp  Home Office section of the vendors website     Licence  The program is free to use and no trial licence needs to be activated to use the program features     R AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Installation   A Debian package    deb  for Ubuntu can be downloaded from the COMODO website     The package  can be installed simply by double clicking the downloaded package  and then clicking Install in the  Ubuntu Software Centre  No additional packages are required  To configure the software  the  included configuration script needs to be run after installation  sudo  opt COMODO post_setup sh      COMODO Antivirus    The kernel module  redirts ko  appropriate tor your current   kernel version does not exist  please run    opt COMODO post_ setup sh to install it  Then run   Jetc init d cmdavd restart  command to restart your cmdavd   service        During the post setup routine  the user needs to accept the licence agreement and select a preferred  language  After selecting a language  the script tr
32. braries necessary for a scan  at boot time  thereby decreasing the overhead for single scans  freshclam is required to  automatically keep the virus definition database up to date  To enable scanning of   rar archives   the optional packet libclamunrar6 is used  The installation also includes the ClamAV library  which  can be used by developers to include virus scanning into their programs  No other dependencies  need to be installed on an Ubuntu system  According to the program   s documentation  to enable on   access scanning  some lines in ClamAV   s configuration file need to be changed added    ScanOnAccess yes   OnAccessIncludePath     OnAccessExcludePath  proc    These lines should enable on access scanning in all directories except the  proc directory  On our  testing system however  this did not work  According to ClamAV   s log file      var log clamav clamav log   clamd needs to be started by root for the on access scanning to work     Setting the user the daemon should be started by to root within the configuration file only resulted  in the daemon not starting at all  however     Deinstallation  To uninstall ClamAV  the command sudo apt get remove clamav  can be used     Accessing the program  ClamAV is accessed using the Linux Terminal     Non administrator access  Since ClamAV   s configuration file is located in the  etc folder  administrative privileges are required  to edit it  Unprivileged users are only allowed to perform on demand scans     Main program w
33. commend changing the value back    to its original once the client is installed  since this authentication method can pose a security risk      For the changes to take effect  the SSH server needs to be restarted with sudo service ssh restart   Once these steps are performed on the target machine  the Linux client can be deployed by selecting  the name of the target machine in the Clients tab of the G Data Administrator and selecting Install G  Data Security Client for Linux from the context menu  After specifying the root password  the  installation then proceeds without further user interaction     If no ssh server is to be installed on the target machine  the client can be installed by copying the  installation files contained in the Setup LinuxClient folder of the extracted archive onto the  machine manually  The installation script requires the type of client to be installed  the IP of the  management server  and the desired client name as parameters  sudo   installer bin  t WS  s  lt server  IP gt   c  lt client name gt   The install script installs all required dependencies automatically without  further user interaction     Note  when we first tried to install the Linux anti virus client of G Data Client Security Business   most features of the software could not be used  The vendor informed us that these problems  occurred due to  not clearly documented  incompatibilities with the Ubuntu version we used  They  subsequently provided us with the new version of G Data C
34. d moved to the desired install location  tar xzf  fp linux x86 64 ws tar gz and sudo mv f prot  opt   Then the install script in the new directory needs  to be run as root  sudo  opt f prot install f prot pl     The install script will prompt for the locations of the installed executables and man pages   using  default locations should be fine  No other packages are required to install the application     Deinstallation  The downloaded archive does not contain a script for uninstalling the application   to uninstall  the  user has to manually remove all installed files   e Remove the update job from the  etc crontab file  sudo nano  etc crontab and remove  the line containing fpupdate  e Delete the installed files  sudo rm    rf  opt f prot  e Remove symbolic links pointing to the install directory  sudo find  usr local  Iname     opt f   prot         delete    Accessing the program  The program can be accessed using the terminal  No tray icons or context menu entries are available  by default     Non administrator access  Changing the program s configuration  as well as removing the program files requires the use of sudo  to invoke administrator privileges     Main program window   Status Reactivation As there is no real time protection  a status display is not applicable    Scan Scans can be performed using the fpscan command  For example  the command fpscan    e  Idev    disinfect will scan the whole file system except the  dev  folder  automatically  disinfecting deleting
35. e      30     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    ESET NOD32 Antivirus for Linux Desktop          Protection status Protection status      ln Statistics    Q Computer scan Maximum protection    J Update Y Antivirus  o v Antispyware  7 sour  X Tools Number of blocked attacks  6  Version of virus signature database  11409  20150401   wp Help License valid until  04 18 2015 01 00 00 PM  Activate standard mode est  Features    The NOD32 Antivirus features real time protection as well as on demand scanning  It detects not  only Linux malware  but also malware and    potentially unwanted programs    for Windows     System requirements  ESET list the following Linux distributions as compatible  Debian  RedHat  Ubuntu  SUSE  Fedora   Mandriva and the majority of RPM and DEB distributions  However  no further information is given  as to specific version numbers  Further requirements are kernel 2 6 or newer  GNU C Library 2 3 or  newer  GTK  2 6 or newer  LSB 3 1 compatibility recommended  Both 32 and 64 bit versions of the  software are available     Test platform  64 bit Ubuntu 14 04 1 LTS    Version tested  4 0 81 0  64 bit    Home business version  We used the home version of NOD32 for Linux in our test  A business version is available  this has a  different pricing model and can be managed by ESET s Remote Administrator console        Licence   NOD32 for Linux can be tested for 30 days free of charge  after which the user has to purchase
36. e Linux 7 0  64 bit  command line  edition only   SUSE Linux Enterprise Server 11 SP1  SUSE Linux Enterprise Server 11 SP3  Ubuntu  10 04  Lucid Lynx   Ubuntu 12 04 and 12 04 2  Precise Pangolin     Ubuntu 12 04 is supported with the following conditions  On access scanning in the full version  installation is supported up to minor release 12 04 2 using kernel 3 5 0 23  Command line only    installation is supported up to Ubuntu 12 04 5 and it does not depend on the kernel version support     On 64 bit systems  additional compatibility packages are required      38     AV       comparatives    Linux Security Reviews 2015 www av comparatives org    Test platforms  64 bit Ubuntu 14 04 1 LTS  64 bit Ubuntu 12 04 2 LTS    Version tested  10 20 358  There is one installer for both 32 and 64 bit systems     Home business version  F Secure Linux Security is a business product  there is no home version     Licence  The program is commercial  with a 30 day free trial available     Installation   Before installing the program  some additional packages need to be installed  sudo apt get install  rom libstdc  6 i386 libgcc1 i386 libpam modules i386 libc6 i386  To install the application  the  archive downloaded from F Secure s website    needs to be extracted first  tar xzf fsis 10 20    tar gz    After extracting  the installer file within the extracted folder needs to be run with administrative  privileges  sudo   f secure linux security 10 20 358   After reading and accepting the lice
37. ecific computers or groups from the Security Center    Logs Logs can be accessed from the Log section of the client web console  Detailed statistics about  various activities can be accessed from the Reports and notifications tree menu of the Security  Center    Quarantine The quarantine of individual machines can be accessed from the client   s web console   From the Security Center  files quarantined or backed up by clients can be accessed from the  Repositories menu    Scheduler An execution schedule can be applied to every task  e g   update or scan tasks  created  either from the client   s web interface  or from the Kaspersky Security Center    Licence Licence information is clearly displayed in the summary section of the client   s web console   In the Security Center  detailed reports on the usage of different licence keys on managed  computers can be generated from the Reports and notifications menu    Help In the client   s web console window  there is a link to the help document in the top right hand  corner of the window  Kaspersky Security Center provides access to help facilities from the top most  menu entry of the main window  Every sub window that can be opened from the Security Center also  provides a help link in the bottom left hand corner    Settings Settings can be specified and changed via an application policy applied to Anti Virus for  Linux File Server  On the client side  settings can be changed using the web interface     Malware alerts   On the cl
38. ed  0   Tracking cookies  0    Malware URLs blocked  0     Detection details     5         PROTECTION STATUS LICENSES    INSTALLED NOT CONNECTED TO THE SERVER nprotected Used    O r  f o 10  OUTDATED PROTECTION  Engine Signature Pending restart Licenses next to expire  O O O 10 on 5 28 2015    Last 7 days Y  DETECTED THREATS DETECTION ORIGIN    m Viruses and spyware m File systems  m Hacking tools and PUPs m Mail  m Phishing m Web  m Suspicious items m Firewall  m Other m Device control  a    Exchange Server    Detection details    AV       comparatives    Linux Security Reviews 2015 www av comparatives org    Status Reactivation Not applicable  since there is no real time protection component    Scan On the client side  manual scans can be started using the pavsl sh script located in the   opt PCOPAgent PCOPScheduler pavsl bin folder  Executed with root privileges  the command   opt PCOPAgent PCOPScheduler pavsl bin pavsl sh  heu  rpt  tmp log txt   starts a scan of the file  system with heuristic scanning enabled  The log file is stored in the  tmp log txt file    From the web management console  scheduled or one time scans can be created from the Settings  tab by selecting the profile assigned to the group of computers to be scanned  and creating a new  task in the Windows and Linux     Scheduled scans section    On our testing system  scanning only worked on 32 bit Ubuntu 12 04 5  On the other systems  the  policy files were downloaded from the server  but no scan process
39. ed by sending an update command from the manager  right click the client in  the    Clients    tab and select    Run Command on Computers     gt     Update Content        On the client side  the graphical interface can be used to perform a manual update by clicking the     LiveUpdate    button    Logs On the server side  different types of log files can be accessed from the    Monitor     gt     Logs    tab   On the client side  logs can be exported to a file using the command sudo   opt Symantec symantec_antivirus sav log  e  lt filename gt       66  AV       comparatives    Linux Security Reviews 2015 www av comparatives org    Quarantine On the server side  quarantined files can be viewed in the    Monitor           Logs    tab by  selecting the risk logs  On the client side  an administrator can manage the quarantine using the sav  quarantine command  e g   sudo  opt Symantec symantec_antivirus sav quarantine  I lists all  quarantined files     Scheduler Scheduled scans can be configured in the anti virus policies  By default  a scheduled scan  is performed daily    Licence Licence information is clearly displayed in the top right hand corner of the    Home    tab   Help The help menu can be accessed using the    Help    link located in the top right hand corner of  the Manager s main window    Settings Settings that affect the application s protection components are represented as options of  the policy that is currently applied to clients  These settings can be changed 
40. efox        S  Sophos Anti Virus              9 http   localhost 808  v      Q Search A  t 9        P sophos anti Virus_    Home   Control   Scanning   Exclusions   Alerts   Log Viewer         Sophos Anti Virus for Linux    T Welcome   TEE    Y  On access scanning  Active  8 gt  Control Ga  Scanning B Update aiai Gupone  Last updated  Thu 19 Mar 2015  08 59 57 AM CET  Q  Exclusions A  Alerts B iani  Log Viewer Additional information Y    To configure update details  you   must use the command line     utilities savsetup or savconfig  For         more information  refer to the man  Az pages or the user manual              Primary update source type  Sophos  Primary update source address  sophos   Secondary update source type  None  Secondary update source address  None  Update period  60 minutes                   Features  Sophos Anti Virus for Linux includes an on demand scanner  as well as on access scanning     System requirements  Sophos support a very wide range of Linux distributions  details can be found on their website        Test platform  64 bit Ubuntu 14 04 1 LTS    Version tested  9 7 2  There is one installer for both 32 and 64 bit systems     Home business version    Sophos Anti Virus for Linux is available as a basic standalone program  there is also a commercial  version that includes management integration and support     28 http    downloads sophos com readmes supported kernels 9 txt     60  AV       comparatives    Linux Security Reviews 2015 www av compara
41. ently purchased  There are also two options  for buying the program  namely with and without support  Both of these include a free licence for a  handheld device as well     Installation   Firstly  the installer for Dr Web for Linux needs to be downloaded from Dr Web   s websitet  The  installer is a  RUN file  This cannot be started by simply double clicking the file   the user needs to  type chmod  x  filename  run followed by    filename  run in a Linux terminal to start the installer s  GUI  For the protection components of the program to work  the 32 bit version of libc is required   installed via the terminal using this command  sudo apt get install libc6 i386      To enable the application to display a tray icon  the additional libappindicator1 packet is required   sudo apt get install libappindicator1   The only steps in the setup wizard are to accept the licence  agreement  and either enter a licence key or select the trial version     Deinstallation  The application can be removed using the uninstaller provided     Accessing the program  When running  the application displays an icon in the system tray  From the icon menu  a user can  open the program s main window  disable enable protection components  update the virus database  and open the    My Dr Web    website    gue En E D  ce O     Open Anti virus      Disable SpiDer Guard       Disable SpiDer Gate     Update       My Dr Web  The application does not add a context menu entry to nautilus     Non administrator
42. ettings set com canonical Unity Panel systray whitelist      all           The application also includes a program that is supposed to integrate the scanner into Ubuntu s  default file manager nautilus  On our test system  however  the program did not add any menu  entries to nautilus     Non administrator access  All program features can be used by unprivileged users  only installation and deinstallation requires  administrative privileges     7 http    enterprise bitdefender com de Downloads businessSolutions    Az    AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Main program window   The main window contains three buttons at the top  which enable the user to start a scan of a  single directory  update the signature database and open the program s settings  Below these  buttons  the program displays information about the antivirus engines  version numbers  date of  last update  etc   and the currently active licence  The user can activate the    file drop zone    from  the settings dialog  This creates a small window that can be used to scan files or folders by drag   and dropping them into it     Documents        fe Home Documents  Places E  gt   O Recent  fi Home     4    fm Desktop    D Documents               Y Downloads  dd Music    Status There is no status display in the normal sense  as there is no real time protection   Scan Scans can be started by clicking the    Scan Now    button in the main window or by dragging and  dropping f
43. for Linux       fj    Dr Web for Linux     S  SpiDer Guard  Enabled    _    SpiDer Gate  Enabled         Scanner  Scan your files and directories for threats    Drag files here or  click to select        Update  J Last update  14 23 24 02 2015     amp  License  License is valid until 26 03 2015    Features   Dr Web Anti virus for Linux features real time protection as well as on demand scanning  The  program also includes a web protection component that works with all browsers  Similar to the  business version of the program  also the home user version can be setup to be centrally managed  using the Dr Web Control Center     System requirements   The manufacturer states that the program requires GNU Linux distributions supporting Intel  x86 amd64 with kernel 2 6 37  and later  and glibc 2 13  and later   32 bit and 64 bit versions of  the software are available     Test platform  64 bit Ubuntu 14 04 1 LTS     Version tested  10 0 0 0 64 bit  a separate 32 bit version is available as well     Home business version   We tested the home version of Dr Web Anti virus for Linux  A business version is available  this can  be purchased as part of a business package  and the software can be managed by the Dr Web Control  Center     I4     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Licence   Dr Web provides two test options  a one month trial  or a three month trial that requires the user to  register  but provides a discount if a licence is subsequ
44. fox    McAfee VirusScan Ente    x           2     https   localhost 55443 0409 nails y      Q Search   B L R 9       McAfee VirusScan Enterprise for Linux on 127 0 0 1         Monitored Hosts  Fila    ei Wion DATDAte B E    a     5501 1 7744 0000 18 Mar 2015 No 5700 7163 2 0 1 29052 Evaluation       on access  enabled    127 0 0 1 65443    Using the interface    Copynght    2014 McAfee  Inc  Al nghts reserved    Features   McAfee VirusScan Enterprise for Linux features on access and on demand malware scans  It is also  fully manageable from the McAfee ePolicy Orchestrator Server  allowing multiple deployments to be  administered and reported on through the enterprise level console     System requirements   64 bit versions of    Red Hat Enterprise 5  6  and 7   SuSE Linux Enterprise Server Desktop 10  11  and 12   Novell Open Enterprise Server 2 and 11   Ubuntu 12 04  12 10  13 04  13 10  14 04  and 14 10   CentOS 5  6  and 7   Oracle Linux 5  6  and 7  Both Red Hat compatible and Unbreakable Enterprise Kernel   Amazon Linux 3 2 Kernels and above   Support for public cloud such as Amazon EC2    Test platform  64 bit Ubuntu 14 04 1 LTS    Version tested  2 0 1 29052    Home business version  As the name suggests  the product is designed for business users  There is no consumer counterpart      53     AV       comparatives    Linux Security Reviews 2015 www av comparatives org    Licence  The program is commercial  with a 30 day free trial available     Installation   Firstly  t
45. fter a reboot  the software needs to be activated by starting the trial licence or providing username   and password for an existing full licence  To enable the application to display a tray icon  which is   necessary to open the main window after it was closed once   the additional packet libappindicator1  is required  sudo apt get install libappindicator1      Deinstallation  The program can be uninstalled by running the uninstall wizard  which can be found in the  Applications menu  System Tools folder     Accessing the program   The application displays a tray icon that allows quick access to program features such as the  computer scan or signature updates  Enabling the    advanced mode    in the main window will also  add more options to the menu of the tray icon      o n Da 0833 O   o TN En D  lT   Open ESET NOD32 Antivirus Open ESET NOD32 Antivirus    Computer Scan    Computer Scan     Update Update  About Preferences       Disable Real time File System Protection    Log files  Quarantine  Scheduler       About    There is an option to enable context menu entries within the application preferences  User   Context  Menu   According to ESET s user manual for the Linux version of Nod32  the nautilus actions package  is required for the context menu entry to work correctly  However  on our test system  no entry was  displayed even after we installed the packet  and rebooted the system     Note  if the main window is closed  it can only be re opened using the system tray ic
46. g    Malware for Linux systems    Most Linux malware targets the server space  not desktops  Therefore   Anti Virus software is mostly needed on Linux file and mail servers   Nevertheless  Linux desktops are not completely safe either  as there  exists also cross platform malware and phishing is a threat for any  operating system  Furthermore  as mentioned previously  Linux users  might receive and save  malicious  file attachments on their Linux  machine and act as a vector for Windows malware                             One reason why the number of Linux malware programs is relatively  small might be the large number of existing Linux kernel versions  Not  only are there various different standard versions that are currently in  use  some distributions also use a customized version of the Linux  kernel    A survey  which gathered data concerning the different Linux kernel  versions used on Linux servers  showed that there were almost 1 300  different Linux kernel version distributed among the roughly 20 000  Linux servers included in the survey                                                              Not only the kernel itself  but also the software stack on top of it  comes in the form of hundreds of different Linux distributions    The graph on the right shows an overview of these Linux    distributions     480 in total by October 2012  not considering that even  within the same distribution  different versions are used in practice                                     
47. gning  policies at the management server     On the client side  settings can also be changed using the command line and the web interface   Both methods require administrator credentials  admin password for the web interface and root  credentials for the command line tools      Main program window   On the client side  the Web Management Console can be accessed at http    lt name ip gt  9080  The  web interface features the full configuration capabilities of the included command line tools   including configuration of the real time protection component and creation of scan or update tasks   In particular  all tasks  which use the web interface and are described in this section  can also be  performed using the included command line tools     On the management server side  the main window of the Kaspersky Security Center consists of a  tree structure menu on the left hand side and a section displaying information according to the  currently selected option on the right        4 http    support kaspersky com 12006     49     AV    comparatives       Linux Security Reviews 2015 www av comparatives org             Dal Kaspersky Security Center  File Action View Help  es    alH    We Kaspersky Security Center  a 79 Administration Server USER PC  Di Managed computers  B Administration Server tasks  P Tasks for specific computer   L   User accounts Deployment Computer management  b E Reports and notifications E F TEA     gt   E  Application management e Latest versions of Kaspersky
48. h allows administrators to define security policies for  all managed clients     System requirements  Symantec provides a comprehensive list of kernels with Auto Protect support on their  knowledgebase website        Test platform  64 bit Ubuntu 14 04 1 LTS  64 bit Ubuntu 12 04 2 LTS    Version tested  12 1 5  one installer for both 32  and 64 bit systems     Home business version  Symantec Endpoint Protection is very much a business oriented program     Licence  The program is commercial  with a 60 day free trial available     3 https    support symantec com en_US article TECH223240 html     63     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Installation   The first step in installing Symantec Endpoint Protection is setting up the management server on a  Windows machine  To install the management server  download the installation files from Symantec s  website and run the Setup executable  After accepting the licence agreement  the rest of the  installation process is quite straight forward  Once the server is installed  the server configuration  program automatically starts  For less than 100 clients  the default configuration option on the first  page of the wizard is sufficient  On subsequent pages  the user needs to create an administrative  account to log in to the management server and optionally specify mail server options to send  notifications     To create the installation package for the Linux client  the user needs to start and
49. he archive containing the necessary installation files needs to be downloaded from the  download section of McAfee s website     Next  the archive and further archives contained in the main  one need to be extracted  tar xzf McAfeeVSEForLinux     full x86_64 tar gz  followed by tar xzf  McAfeeVSEForLinux     tar gz and tar xzf McAfeeVSEForLinux     others tar gz  or using Ubuntu s  archive manager   After extracting the archives  the McAfee runtime and agent need to be installed   sudo dpkg  i MFErt i686 deb  sudo dpkg  i MFEcma i686 deb  Finally  the main installer can be  started using the command sudo   McAfeeVSEForLinux     installer    After accepting the licence agreement  the user needs to set a password for the new user that is  created for logging into the web user interface  nails   Installation directories and settings for  email notifications can be changed after the password for the new user is set  we used default  settings for all remaining options     No additional packages are required to install the software     Deinstallation  The software can be uninstalled from the command line using the following commands  dpkg   purge  mcafeevseforlinux  dpkg   purge mfecma  dpkg   purge mfert     Accessing the program   McAfee VirusScan does not display a tray icon or add context menu entries to nautilus  The  application provides a web user interface that can be accessed from https   localhost 55443 by  default     Non administrator access  Access to the program is re
50. he evaluation version  the remaining evaluation period is displayed in the  summary section     a AV       comparatives    Linux Security Reviews 2015 www av comparatives org    Help This can be accessed by clicking the   symbol in the top right hand corner of the web page   Settings In advanced mode  the user can change the settings of the protection components by  selecting the respective menu entries     Additional Features   Firewall Firewall rules can be created using the firewall wizard in the    I want to       tab  The user  can choose to allow deny traffic from or to specific network services and or specific hosts    In advanced mode  the order of the recorded firewall rules can be changed and rules can be  activated deactivated  The user can also choose between different pre configured firewall profiles   Integrity checking From the    I want to       menu  the user can create and verify a    baseline    of  system files  the baseline contains hashes and attribute information such as file size   If the real   time protection components are activated  the integrity checker can deny changes to the recorded  system files or automatically report changes to the administrator    To perform a system update  the user first needs to activate the software installation mode from the     T want to       tab  as the integrity checker will otherwise react to all updated files     Malware alerts   On Ubuntu 12 04  the real time scanner detects an attempted download of the EICAR te
51. ication is Copyright    2015 by AV Comparatives    Any use of the results  etc  in whole or in  part  is ONLY permitted after the explicit written agreement of the management board of AV   Comparatives  prior to any publication  AV Comparatives and its testers cannot be held liable for any  damage or loss  which might occur as result of  or in connection with  the use of the information  provided in this paper  We take every possible care to ensure the correctness of the basic data  but a  liability for the correctness of the test results cannot be taken by any representative of AV   Comparatives  We do not give any guarantee of the correctness  completeness  or suitability for a  specific purpose of any of the information content provided at any given time  No one else involved  in creating  producing or delivering test results shall be liable for any indirect  special or  consequential damage  or loss of profits  arising out of  or related to  the use or inability to use  the  services provided by the website  test documents or any related data     For more information about AV Comparatives and the testing methodologies please visit our website     AV Comparatives  May 2015      72     AV    comparatives       
52. icence agreement  default settings can be used for the  rest of the installation configurations  In the last step of the installation process  a setup script can  be run to configure on access scanning or other plug ins        6 http   free avg com de de download free all product          AV    comparatives       Linux Security Reviews 2015 www av comparatives org    On our testing system  we tried to activate on access scanning using the fanotify module  since the  other options   dazuko and redirFS   are no longer supported for newer kernel versions  However   activating the on access scanning rendered the system unusable   every time a file was opened  the  whole system froze  not even allowing a login using the tty terminals     Deinstallation  The program can be uninstalled using the provided    uninstaller located at     opt avg av bin uninstall sh by default     Accessing the program  Users interact with the program by using the Linux terminal     Non administrator access    The avgscan command can only access files that the user invoking the command is allowed to access     Therefore  it may be necessary to run the scanner with administrative privileges to be able to scan  all files  The program s configuration can be changed by an unprivileged user     Main program functions   Status Reactivation Not applicable   Scan On demand scans can be performed using the avgscan command  For example  the command  sudo avgscan    u  x  dev  will scan the whole file system except
53. ient side  malware detections are displayed in the web console  Email notifications can be  configured from the Notification section of the web interface  In the Kaspersky Security Center   malware detections on managed computers can be compiled into a virus report     1    Number of detections    Disinfect i   _  Not disinfected  0   1   Disinfected  0  0 0 0 0   Blocked  0  eo     lt    _ ip  O     Deleted  0  EICAR Test File NA  1    Detected object   Object type   Number of detections Different files Computers infected Groups infe  EICAR Test  File virus 1 1 1 1    Different objects  1 Different files  1 Computers infected  1    51    AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Help   Apart from the help documents that are available from the client s web console and the Kaspersky  Security Center  detailed documentation is available from the download pages of the Anti Virus  Client   and the Kaspersky Security Center        Verdict   Kaspersky Anti Virus for Linux File Server provides an easy to use web management console  By  connecting multiple anti virus clients to an administration server  all instances can be configured  separately or in administration groups  Creating policies and tasks from the Kaspersky Security  Center is straightforward      52     AV       comparatives    Linux Security Reviews 2015 www av comparatives org    McAfee VirusScan Enterprise for Linux    McAfee VirusScan Enterprise for Linux Monitor   Mozilla Fire
54. ies to compile a kernel module that is required for  real time protection     When we tried to configure the software on Ubuntu 14 04 1 LTS10  the real time protection  component was not available  A post on ubuntuforums org   provides a fix for this problem  After  downloading the driver mentioned in the post and moving it into the program s install directory   sudo mv driver tar  opt COMODO  the setup could be completed successfully   Note  we used a  virtual machine to test the setup process  We do not recommend installing system drivers from  untrusted websites on your physical machine      On Ubuntu 12 04 2 with Linux kernel 3 5 0 23  this additional step was not necessary  as the  included kernel driver compiled without any additional action being required     Deinstallation  The program can be uninstalled from the Ubuntu Software Centre by clicking on the program   s entry  and then clicking Remove     Accessing the program   COMODO AV did not add an icon to Ubuntu s system tray while the application was running    It also did not add any options to the context menu of Ubuntu s default file explorer  Nautilus    Specific files need to be scanned from the application s main window     Non administrator access   Unprivileged users may disable enable the anti virus component without having to provide  administrator credentials  However  the user can activate the Parental Control feature in the  application s settings  This feature allows the user to define a password that
55. iles onto the file drop zone  if activated         BitDefender Antivirus Scanner for Unices  Resolve Issues    Results Summary    1 threat s  in 1 item s  still present on your system    Status     File path Infected with    ss   ps    Finish Fix issues          Update The signature database is not updated automatically by default  The database can be  updated manually using the update button in the main window or using the command sudo bdscan      update  Automatic updates can be scheduled by creating a cron job that invokes the update  command  Even though the process of creating such a cron job is documented quite well in the user  manual  we still think the graphical interface should contain options for performing this task for the  user    Logs The location of log files can be changed in the settings dialog as well  defaults to     local share BitDefender scanner logs   For faster access to the log files  the program also     15     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    includes a log file viewer that can be started by clicking the respective link in the main window   Quarantine The location of quarantined files can be changed in the settings dialog  by default  quarantined files are copied into    local share BitDefender scanner quarantine     Scheduler Scheduled scans cannot be configured from the user interface   similar to automatic  updates  the user could create a cron job that starts the command line scanner for this purpo
56. in  administrative privileges by clicking on the lock icon at the bottom of the settings tab and entering  their password     Malware alerts  When Dr Web detects an attempted download of the EICAR test file  it displays a notification  message in Unity s notification area     Dr Web for Linux  Threat moved to quarantine  EICAR Test    File  NOT a Virus    Object   tmp TfeOPktg bin part       The notification is displayed for 10 seconds  the duration cannot be changed in the application s  settings  apparently Unity s notification component NotifyOSD does not support setting a display  duration  the duration is determined automatically considering the amount of text displayed       26     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    The application s    SpIDer Gate    component is able to detect attempted access to websites it deems  malicious  When we tried to access the AMTSO phishing test page  we could not navigate to the test  page  as the entire domain was blocked by the program  When Dr Web blocks a site  it displays an  alert message inside the browser    O URL is blocked by SplDer Gate    amtso org 80       Reason  Known infection source  Date  2015 Feb 24 14 40 07    SpiDer Gate is set to block unreliable Web sites   To change blocking parameters  modify SpiDer Gate settings  How to disable URL blocking   If you consider this URL reliable  please report an error     Return to previous page    Help   The help features include offline
57. in the    Policies    tab of  the Endpoint Protection Manager     Malware alerts  Using Ubuntu 12 04  the Symantec Endpoint Protection client blocks an attempted download of the  EICAR test file and displays the following alert     Symantec AntiVirus   Alert tor 1       Scan type  Auto Protect Scan   Event  Threat Found    Security risk detected  Threat  EICAR Test String  File   tmp 4kiq7cyx  bin  part    Location  Quarantine   Computer  ubuntu review2   User  user   Action taken  Quarantine succeeded   Access allowed  Date found  Mon 30 Mar 2015 03 33 23 PM CEST    The text displayed in the alert message can be configured in the Anti virus policy on the  management server     Help   The installation of the Endpoint Protection Manager includes a detailed HTML help document that  can be accessed offline by clicking    Help     gt     Help Topics        The help menu also contains links to  the customer support  and support forum websites    On the client side  man pages for the installed command line tools are available  man sav for  instance     Verdict  Symantec Endpoint Security offers centralized management security client programs running on  different platforms  The clients can be installed on Mac  Windows  as well as Linux systems  The  policies defined in the Endpoint Protection Manager allow quick configuration for a large number of  clients      67     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Trend Micro ServerProtect for Linux
58. indow  Status Reactivation Not applicable  as on access scanning could not be configured  Scan Files and directories can then be scanned using the clamscan or the clamdscan command     user ubuntu review       user ubuntu review    clamdscan Downloads    home user Downloads eicar com txt  Eicar Test Signature FOUND    SCAN SUMMARY  Infected files  1  Time  0 000 sec  O m O s   user ubuntu review       To detect potentially unwanted applications  the   detect pua yes argument needs to be provided to  clamscan or DetectPUA needs to be set to true within the configuration file for clamdscan   respectively    Update Virus database updates can be obtained by using the freshclam command  By default   freshclam will look for updates once every hour  To manually update the databases  invoke sudo  freshclam from the command line    Logs By default  the log file is located at  var log clamav clamav log         18     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Quarantine The scanner does not define a default quarantine location  The user can specify a  quarantine directory for each scan  however    Scheduler Scheduled scans can be performed by creating cron jobs that invoke the clam d scan  command    Licence Not applicable   Help Documentation can be accessed through the installed manpages for each component  e g    man clamdscan for the on demand scanner or man clamd conf for available configuration options   Settings If the ClamAV daemon is instal
59. is no home version     Licence  Commercial  with a 30 day free trial available  There is no option to pay for the program on the  website     Installation   Firstly the installer file needs to be downloaded from Bitdefender s website     marked as executable   chmod  x BitDefender Antivirus Scanner 7 7 1 linux amd64 deb run  and started  The installer will  ask the user to accept the licence agreement and choose whether he she wants to install the  graphical user interface     No additional packages are required to install either the scanner or its user interface  If the  graphical interface has been installed  it can be opened from the application menu and will start  with an activated 30 day trial period     Deinstallation  To remove the program  the original installer file needs to run again with the additional  uninstall  argument  sudo   BitDefender Antivirus Scanner  lt version gt  deb run   uninstall      Accessing the program   The application should display an icon in the system tray while running  On Ubuntu 14 04 however   no tray icon is shown not even after installing the libappindicator1 package  because of that  the  start hidden setting and the hide button cannot be used  since a hidden main window can only be  restored using the tray icon      On Ubuntu 12 04  the tray icon can be displayed  but the user needs to manually add a system tray  whitelist entry for the program  the quickest way of doing this is to simply whitelist all programs  using the command gs
60. lable in the man pages of the respective components  man avast   man  avast fss     Settings The application   s settings can be changed by editing the configuration files of the  respective program component   etc avast avast conf and  etc avast fss conf      AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Malware alerts  If the real time protection component detects an infected file  the file is moved into the quarantine  folder  No alerts are displayed     Help   A pdf document containing program documentation is available on Avast s website     On the machine  where the program is installed  man pages for each installed component are available  man avast    man avast fss     The man pages are also included in the program documentation     Verdict   Avast File Server Security is easy to install for an experienced Linux user  Although the scanner is a  command line only tool  performing scans is straightforward  We feel that the program s  configuration options are rather limited  however      gt  http   deb avast com lin doc techdoc  pdf    10     AV       comparatives    Linux Security Reviews 2015 www av comparatives org    AVG Free Edition for Linux    user ubuntu review       user ubuntu review    avgscan Downloads   AVG command line Anti Virus scanner  Copyright  c  2013 AVG Technologies CZ    Virus database version  4257 9321  Virus database release date  Tue  17 Mar 2015 07 18 00  0100    Downloads eicar com Virus identified EICAR Tes
61. le disable the on access component from the graphical interface  The only action an  unprivileged user may perform is an on demand scan using the savscan command from the  command line     Main program window   Sophos Anti Virus for Linux provides a web user interface that can be accessed at  http   localhost 8081  The interface consist of different tabs containing the available configuration  options or status information    The interface is mainly used to configure the protection components  Manual updates and on   demand scans need to be started from the command line    Status Reactivation On access scanning can be disabled from the web interface on the    Control     tab  If disabled  the new status will be displayed in the    Status    section       On access scanning  Inactive  4 Update status  Success    Last updated  Thu 19 Mar 2015  08 59 57 AM CET    T Product version  9 7 2  Scan Manual scans can only be started from the command line  For example  the command savscan  Downloads    quarantine will scan the    Downloads    folder within the current working directory   changing the access permissions of discovered malware to deny execution of the malicious file        AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Update The virus definition database is updated automatically every 60 minutes  by default   To  update the database manually  the savupdate command needs to be invoked as root from the  command line  sudo  opt sophos av bin 
62. led  it can be configured using the options in the   etc clamav clamd conf config file     Malware alerts  Not applicable   as mentioned in the installation section  real time protection could not be enabled  using the method described in the program   s documentation     Help  A user manual in  pdf format is available on ClamAV s website    More detailed information about the  usage of the included commands can be found in the respective man pages  e g   man clamscan      Verdict    ClamAV is included in Ubuntu s package repository  allowing easy installation  Using the program to  perform on demand scans is straightforward  One drawback of the application is the inability to run  real time protection on the tested operating systems     8 http    www clamav net     19     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Comodo Antivirus for Linux    COMODO Antivirus    COMODO     9 Antivirus g Mail Gateway Q    Antivirus    r Antivirus 8 Stateful  Y The virus database has been updated on Mi  Feb 18 14 38 43 2015    3 O threat s  detected so far    All systems are active and  running   O Scan Now    d E Mail Gateway     Running Email Filter Type  None    bt       Features   Besides a real time and on demand anti virus scanning component  COMODO AV also provides a mail  gateway that can filter spam and emails with malicious attachments  The mail gateway is designed  to filter traffic on mail servers     System requirements   The Comodo website st
63. led using CentOS    package manager  yum remove SProtectLinux x86_ 64     Accessing the program  Trend Micro ServerProtect does not display a tray icon or add context menu entries to nautilus     Non administrator access   Access to the program is restricted by the need to enter login credentials for the administration  console  By default the password to access the interface is empty  which should be changed by  specifying a password from the    Password    option of the Administration menu of the web interface     Main program window   Trend Micro ServerProtect provides a web user interface that can be accessed at  https   localhost 14943    The interface is mainly divided into three parts  a menu on the left  the content of the currently  selected menu entry on the right and a banner containing a logout link and a drop down box  containing the Help menu at the top of the page    Real time protection status is shown in the summary section  The on access scanner can be  disabled enabled from the    Real time Scan    option in the Scan Options menu     Scan Status    Realtime Scan  Disabled    On demand scans can be started from the    Manual Scan    option in the Scan Option menu  The user  can specify which directories should be included in the scan  or scan all directories   The user can  also choose which file types to scan and which action to take for infected files  The selected  configuration can be saved  enabling it to be re used for other on demand scans    Settings
64. lient Security Business  version 13 2    which is scheduled for release at end of May 2015 and supports newer Ubuntu versions      T https   www gdata at kundenservice downloads     43     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Deinstallation  The program can be uninstalled using the uninstaller provided     Accessing the program  The program does not display a tray icon or add entries to the context menu of nautilus     Non administrator access  By default  unprivileged users are only allowed to update the virus signatures  This can be changed  in the G Data Administrator  in the Client settings tab      Main program window  On the client side  the graphical user interface of G Data AntiVirus can by default only be used to  perform and configure updates  The administrator can allow scans to be run from the GUI as well   On the server side  the G Data Administrator s main window mainly consists of two sections  On the  left hand side  a tree structure menu displays managed computers and groups  The tabbed section  on the right hand side can be used to display status information and reports statistics  to configure  settings and to display and create scan tasks for the currently selected tree menu item    E olaa            ree pi ia il  Jata Administrator    Admin Organization Options License management         O gt  B  wy A   ini al     Dashboard Clients Client settings Android settings Tasks Firewall Reports ReportManager Statistics  
65. ly installed one  instance of the Management Server  we chose the main server option and the Microsoft SQL Express  server as a backing database  Lastly  the user needs to enter his her licensing information     At the first start of the G Data Administrator a setup wizard is displayed  On the second page of the  wizard  computers on which the G Data Client should be installed can be specified by entering the  respective computer names  if the client is to be deployed remotely  the computer name should be  the computer s IP address   Subsequent pages can be used to configure other settings such as  updates and mail notifications  If the automatic installation option is selected during the setup  a  remote deployment window is displayed after the wizard exits  This window only supports  deployment for Windows clients  however     To install the Linux client remotely  an activated root account on the target machine and an  installed and running SSH server are required  On Ubuntu  the root account is deactivated by default  and needs to be activated by setting a password using the command sudo passwd root  The  OpenSSH server can be installed using the command sudo apt get install openssh server  Since the G  Data Administrator requires remote root login  this feature has to be enabled first  open the sshd  config file with sudo nano  etc ssh sshd_config  change the value of the    PermitRootLogin    option  from    without password    to    yes    and save the file  we would re
66. m protection is not ensured    Real time file system protection was disabled by the user  The computer is not  currently protected against threats   Start real time file system protection       Antivirus      Antispyware    Protection can be reactivated by clicking Start real time file system protection    Scans can be started from the    Computer scan    tab of the main window  The user can run a    Smart  scan     scanning all local disks  or create a custom scan in which he can create scanning profiles to  specify which directories to scan  Scheduled scans can be run from the Tools menu  requires  Advanced Mode     Application settings can be found in the    Setup    tab  most of the configuration options are only  available if the    advanced mode    is activated      Malware alerts  When ESET NOD32 detects an attempted download of the EICAR test file  it displays a notification  message in the centre of the screen     d Object    tmp XyhrikSk bin part  Threat     Eicar test file  information   cleaned by deleting   quarantined       By default  the notification disappears after 5 seconds  if the mouse cursor is positioned outside the  notification area  the display time can be changed in the application preferences     The program   s real time protection also detects malicious files on removable media as soon as the  drive is accessed by the user      33     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Help   ESET provide two manuals i
67. n PDF format  a Quick Start Guide and a comprehensive User Guide  both  produced to a very high standard     There is also a local help feature  which provides simple  instructions for using key features  with some screenshots  There is also a link on the program s Help  page to the ESET Knowledgebase  which includes an FAQ section for the program  and detailed   illustrated instructions for installation and activation        Verdict   ESET NOD32 for Linux is a fully featured antivirus program  including real time protection as well as  on demand scanning  The program requires some terminal commands to install  e g  setting the root  password   but the setup wizard and the program itself have a very user friendly GUI that will be  familiar to users of its Windows counterpart  There is a clear status display  and all the important  functions are easily accessible from the program s main menu panel  Malware alerts are good  and  the help facilities are excellent     16 http    www eset com int download home detail family 71  17 http    kb eset com esetkb index page contentg8id S0LN2653     34     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    F PROT Antivirus for Linux Workstations    user ubuntu review       user ubuntu review    fpscan Downloads     F PROT Antivirus CLS version 6 7 10 6267  64bit  built  2012 03 27T11 39 07     FRISK Software International  C  Copyright 1989 2011   Engine version  4 6 5 141   Arguments  Downloads     Virus sig
68. n be re run using the same settings  as the previous run    Settings All available settings can be accessed from the Configure section of the web interface    Logs Logs can be accessed and queried from the web interface  View     Scanning Summary  System  Events or Detected Items     Quarantine By default  the quarantine is located in the  quarantine directory  Unprivileged users do  not have permissions to read the contents of this directory  Privileged users can use the following  command to list all files currently contained in the quarantine  sudo  opt NAl LinuxShield bin nails  quarantine   list and use sudo  opt NAl LinuxShield bin nails quarantine   recover  lt filename gt  to  recover files from the quarantine     Update By default  the program is configured to update the virus definition database once every day     To update the database manually  the user needs to click the Run Now button of the update task in  the Scheduled Tasks view    Licence We could not find licence information in the console    Help The help column can be shown or hidden using the link at the bottom of the menu panel     Malware alerts   No desktop notification is shown when malware is discovered  However  the application can be  configured to send notification emails in such cases  The file is silently treated according to the  scanner s configuration  which by default means it is moved to quarantine     Help   A detailed product guide in  pdf format is included in the archive that also cont
69. n the tool bar    The express scan only scans    critical areas     system library and binary folders   boot    home     while the full scan scans all accessible files on the system   As with the home screen  files can also be dragged and dropped onto the Scanner screen to start a  scan of single files or directories  By clicking on the respective caption  a custom scan can be  started for which the user can specify multiple files or directories to scan and or choose some  existing scan options  e g   scan boot records  scan system binaries and libraries    Update By default  the virus database is automatically updated every 30 minutes  can be changed    A manual update can be performed by opening the update status from the home screen and then  clicking the Update button   Quarantine The quarantine can be accessed by clicking on the Quarantine icon in the tool bar  jar  icon    Logs The application does not create log files when it detects malware using the real time scan  component  The on demand scan allows the user to view and export the scan journal during and  after the scan   Scheduler Scheduled scans can be configured in the Settings tab   Licence information is clearly displayed in the Home tab   Help features can be accessed by clicking the question mark icon at the bottom of the menu  column   Settings The settings menu can be accessed by clicking the cog wheel icon in the tool bar   Configuring the real time  and web protection components requires the user to obta
70. n the upcoming  release of the new version of Symantec Endpoint Protection     Deinstallation  The program can be uninstalled using the included install sh script by providing the     u    flag     Accessing the program   The Endpoint Protection client only displays a tray icon on Ubuntu 12 04  There the icon can be  used to open the status window or exit the program  if the client is closed  no notifications of  malware detections of the auto protect component will be shown      nif       Open Symantec Endpoint Protection h  Exit    On Ubuntu 14 04 no tray icon is displayed  The application does not add context menu entries for  nautilus     Non administrator access   The policies that dictate the client s behaviour can only be changed by an administrator within the  Endpoint Protection Manager  Users without administrative access to their Linux machine may only  perform manual updates     Main program window   The main window on the client side only contains information regarding the current program version  and the status of the connection to the management server    The main window of the Endpoint Protection Manager consists of a tab like menu on the left hand  side and a section displaying information according to the currently selected option on the right   hand side     ee  Preferences License Status E    View Details EJ roai license expires in 54 days Licensing Details  Security Status   Good                                     Symantec Security Response  Notification
71. natures  201503230418    opt f prot antivir def      Found virus   lt EICAR_Test_File  exact  gt  Downloads eicar com  Disinfect   Y es   N o   A ll yes   I gnore all   Q uit scan  Yes     Warning   lt Error closing file  Success gt  Downloads eicar com   Deleted  Downloads eicar com    Results     Files  3   Skipped files  0   MBR boot sectors checked  0  Objects scanned  62  Infected objects  1  Infected files  1   Files with errors  0  Disinfected  1    Running time  00 11  user ubuntu review    ii       Features   F PROT Antivirus for Linux includes a command line scanner and an update tool    Note  while the program   s virus database can still be updated normally  it seems that since the  company Frisk Software has been acquired by Cyren     F Prot Antivirus for Linux    itself is no longer  developed nor maintained     System requirements  GNU C Library  glibc  2 2 5 or compatible  Perl 5 8 interpreter    Test platform  14 04 1 LTS    Version tested  6 7 10 6267 64 bit business edition    Home business version  There are both business and home versions  the home version is only available as 32 bit     Licence  The business version of the product requires a paid licence  but the home version is free for private  use      35     AV       comparatives    Linux Security Reviews 2015 www av comparatives org    Installation   To install F PROT Antivirus on a Linux machine  the archive downloaded from F PROT s website       needs to be extracted and the extracted folder copie
72. nce  agreement  the installation completes without further user interaction  To further configure the  installation  restrict access to the web interface by requiring the user to input his username and  password  for instance   the config script can be run  sudo  opt f secure fsav fsav config     Note that the kernel drivers included in the packet do not compile on the Linux kernel versions used  in Ubuntu 14 04  To test the on access scanning component  we also installed the program on  Ubuntu 12 04 2 with Linux kernel 3 5 0 23  According to a statement of the vendor  version 11 of F   Secure Linux Security will include on access scanning using fanotify and therefore support newer  Linux kernels  The new version of F Secure Linux Security is scheduled to be released in September  2015     Deinstallation  The program can be uninstalled by running the uninstall script at  opt f secure fsav bin uninstall   fsav as root     Accessing the program  The application does not display a tray icon or add context menu entries to Ubuntu s default file  explorer     Non administrator access   During setup  the program can be configured to allow access to the configuration user interface only  for a specific user  or to entirely disable local access  This way the program s protection components  can only be configured by a specific user or only remotely by an administrator using the web  interface or F Secure s policy manager     20 https   www f secure com en web business global downloads
73. nteract with the program by using the Linux terminal     Non administrator access   In our default setup  unprivileged users can perform on demand scans on every directory in the file  system  regardless of their access rights  However  this can be changed by using different  configuration options  Changing the application   s configuration files requires administrative  privileges     Main program functions   Status Reactivation The real time protection component can be de  reactivated using the command  sudo service avast fss stop and sudo service avast fss start  respectively    Scan On demand scans can be performed using the scan command  For example  the command scan    will scan the whole file system  For infected files  a report is displayed  There is no option to move  infected files to the quarantine    Update During installation  a cron job  which updates the virus definitions hourly  is created  To  perform a manual update  the included update script can be _ used  sudo   var lib avast Setup avast vpsupdate   Logs The file system monitor logs the original path of infected files in the log file located at   var lib avast fss log   Quarantine By default  the quarantine directory for the real time protection component is located  at  var lib avast chest   Scheduler Scheduled scans can be implemented by creating cron jobs that start scan    Licence Licence information is contained in the installed licence file at  etc avast licence avastlic   Help Documentation is avai
74. ocking e   Quarantine o o o    o 6 o   Scheduled Tasks o o manual cron 6 o o e e e   Statistics 6    i   Online Help  User Forum  amp  User Manual o o o o e e o e e    G Data Client L s    F Secure Linux i a ani McAfee VirusScan Panda Endpoint Seqrite Antivirus for Sophos Anti Virus Symantec Endpoint MENA NICO  Product name  Security Business Virus for Linux File   l     i   ServerProtect for  Security S Enterprise for Linux Protection for Linux Linux for Linux Protection for Linux    for Linux Server Linux   LR EEE RO RN  Officially Supported Ubuntu Versions  10 04   12 04 2 10 04 4   14 10 10 04   14 10 12 04   14 04 12 04 or newer 12 04 2 13 10 10 04   14 04  LTS  11 10   13 04 N A  Main User Target Business Users Business Users Business Users Business Users Business Users Business Users Business Users Business Users Business Users  Licence type COMMERCIAL COMMERCIAL COMMERCIAL COMMERCIAL COMMERCIAL COMMERCIAL FREE COMMERCIAL COMMERCIAL  AAA SSS SSS Se ee Se SSS SSS SS SS SS SSS See  Graphical User Interface  GUI  e o o o e 6 o o  On demand scanner e o o o only 32 bit 12 04 o e o o  Real Time protection only up to 12 04 2 o o 6 o only up to 12 04 2    Block access to malicious phishing sites  Firewall   IDS e  Removable media blocking    Quarantine 6 e 6 6    o  Scheduled Tasks e e o o o 6 e o e  Statistics e 6 o e e o  Online Help  User Forum  amp  User Manual o o o o e o o e e    Linux Security Reviews 2015 www av comparatives org    Copyright and Disclaimer    This publ
75. ogs can also be found in the Antivirus tab   Scheduler The  Scheduled scans    item in the    Antivirus    tab enables the user to create schedules  for automatic scanning  using the same profiles as the manual scan     Licence The program is free  so no licence expiry date is displayed    Help There is a link to the program s online help page on the More tab    Settings Settings for the anti virus and Mail Gateway components can be found in their respective  tabs  General settings like the current language or interface theme are located in the    More    tab     Malware alerts  When an attempt is made to download the EICAR test file  the program blocks the action and  displays the following alert in response     Antivirus Alert    r    r A malicious item has been      detected        Name  Malware  2975xfk8s2pql  Location   tmp 1U1y_Hhg bin part  More information  Unavailable    Y How should   answer     Ignore y    By default  the window is shown for 120 seconds  can be changed in the program s preferences    Ignoring the window for two minutes is equivalent to selecting  Ignore once    another pop up  window will be shown once the file or the folder containing the file is accessed  Clicking  Clean  will  not delete the file  but add it to the program s  Quarantined Items     The real time protection  component did not detect access to the EICAR test file located on a USB flash drive  the on demand  scan did                22  AV    comparatives       Linux Security Reviews
76. oint     comparatives       Linux Security Reviews 2015 www av comparatives org    Reviewed products    We have reviewed the following products for this report  using the newest version available in spring  2015       Avast File Server Security 1 2 0     AVG Free Edition for Linux 13 0 3118  free  but no longer maintained     Bitdefender Antivirus Scanner for Unices 7 14     Clam Antivirus 0 98  free      Comodo Antivirus for Linux 1 1 268025  free      Dr Web Anti Virus for Linux 10 0 0 0     eScan Anti Virus for Linux 7 0 5     ESET NOD32 Antivirus for Linux Desktop 4 0 81 0      F Prot Antivirus for Linux Workstations 6 7 10 6267  free  but no longer maintained     F Secure Linux Security 10 20 358     G Data Client Security Business 13 1 0     Kaspersky Anti Virus for Linux File Server 8 0 2 256     McAfee VirusScan Enterprise for Linux 2 0 1 29052     Panda Endpoint Protection Plus for Linux 2 10      Segrite Antivirus for Linux 1 0     Sophos Anti Virus for Linux 9 7 2  free      Symantec Endpoint Protection for Linux 12 1 5 5337     Trend Micro ServerProtect for Linux 3 0    At the time this review was written  several Linux security products did not support the latest  Ubuntu LTS version  released in April 2014   Some vendors informed us that the next release version  of their products   which will be released in the near future   would also include support for newer  Linux distributions       AV    comparatives       Linux Security Reviews 2015 www av comparatives or
77. on   clicking  the program s system menu entry has no effect     15 http    www eset com int download home detail family 71     32     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Non administrator access   Users can be labelled as Privileged or Unprivileged within the application  Privileged users are  allowed to change application preferences or disable the real time protection component  By default   only Ubuntu Administrators are registered as Privileged users  However  this can be changed within  the application settings     Main program window   The application s main window consists of two panes  a narrower left hand pane with the menu  ttems Protection Status  Computer Scan  Update  and a larger right hand pane with details    At the bottom of the window  the user can enable the application s    advanced mode    which adds  some sub options and a Tools section from which log files  quarantine and the scheduler can be  accessed    Licence information is displayed at the bottom of the main window  There is a Help menu in the  main menu panel on the left hand side of the window    The signature database is updated automatically  It can be updated manually by clicking the update  link in the Update tab    The real time file system protection can be disabled in the    Setup    tab  If it is disabled  a warning  will be displayed in the Protection Status tab as well as the tab icon and the colour of the tray icon  changing      al a Maximu
78. receive product updates  Avast   s debian repository  should be added to Ubuntu   s list of package repositories     sudo su   echo  deb http   deb avast com lin repo debian release   gt  gt   etc apt sources list  apt key add  path to avast gpg   apt get update   exit    After that  the scanner and the real time protection component can be installed using the command  sudo apt get install avast avast fss  No additional packages are required     To be able to actually start the downloaded programs  the licence file needs to be copied into the   etc avast folder  sudo cp  path to licence avastlic  etc avast     4 httos   www avast com linux server antivirus    AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Next  to enable file system monitoring  the configuration file at  etc avast fss conf needs to be  edited  In the    Monitor    section of the file  the directories that should be monitored need to be  added     The following Monitor section adds the home directory of the user    user    to the monitored  directories      MONITORS   SCAN       home user        Once started  the file system monitor will monitor all write access to files located in the specified  directory or any of its subdirectories    Finally  the required services need to be started  sudo service avast start and sudo service avast fss  Start     Deinstallation  The program can be removed using the command sudo apt get remove avast avast fss    Accessing the program  Users i
79. rver     System requirements   The program s manual document lists the following requirements for the Linux client  both 32 and  64 bit     Debian 6 0  7   OpenSUSE 11 4  12 2  12 3  13 1   SUSE Linux Enterprise Server 10 SP4  11 SP3  12   Red Hat Enterprise Linux 5 11  6 6  7 0   Ubuntu 10 04 4 LTS  12 04 5 LTS  14 04 1 LTS  14 10   CentOS 5 11  6 6  7   Fedora 19  20  21    Test platform  64 bit Ubuntu 14 04 1 LTS    Version tested   13 2 0  There is one installer for both 32  and 64 bit systems    Home business version   As the product name implies  G Data Client Security Business is targeted at business users  No home   user version is available     Licence  Commercial with a 30 day trial licence available     af Ox    AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Installation   G Data s business security solution can only be used with a centrally managed architecture   Therefore a Windows machine is required to host the application s management server  The necessary  installation files for all components can be downloaded from G Data s website      we used the  zip  version   After extracting the compressed files  the first installation step involves installing the  Management Server and the G Data Administrator on a Windows machine using the setup executable   After accepting the licence agreement  the user can choose to install the server as a main or  secondary server  and choose the type of database that the server will use  As we on
80. s  1 New View Notifications Security Response  ThreatCon  Virus Definitions and  Level 1  Normal Security Updates    RE Las Security News    Endpoint Status View Details   learn more about threat levels  Endpoint Protection   S ips  Virus and Risks Activity Summary  Total Endpoints   2 R         1  Spyware  m Up to date 0   Lasthour_ IZ Viruses ami Risks  EM Out of date 0 Cleaned   Blocked 0 0     Offline 2 Deleted 0 0  A Disabled 0 Quarantined 0 0  MM Host Integrity Failed 0 Suspicious 0 0   Endpoints can be counted in more than  ona catagory Newly Infected 0 0  Still Infected 0 0  New download risks  0 View Details  Computers needing a restart  0  Favorite Reports Edit  Windows Definitions Risk Distribution by Protection Technology  Latest from Symantec  03 30 2015 r32 Symantec Endpoint Protection Weekly Status  Latest on Manager  03 30 2015 r32  Top Targets Attacked  a   65     AV       comparatives    Linux Security Reviews 2015 www av comparatives org    Status Reactivation The application s protection components can be configured by changing the  respective policy in the    Policies    tab  For example  the Auto Protect component can be disabled in  the    Virus and Spyware Protection    policies  If security problems are detected  a warning in the  main window is displayed  and the cause can be accessed in the details window     Problem Details Possible Solutions  top   ES Auto Protect Failures   Computers with Auto Protect Disabled  1  Total Computers with Auto Protec
81. s however  since no uninstall script is provided  Performing on demand scans  using the product is straightforward      37     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    F Secure Linux Security    F Secure Linux Security   Mozilla Firefox         F Secure Linux Security       e     localhost  v C ki Q A  In English  Deutsch  y Ras  F Secure    LINUX SECURITY  Product status  OK EY  Summary CY  Summary   want to    ea canes A     o A  7  Firewall Protection Office  lt  Details     7  Integrity Protection Enabled   Details     About TTTTTTTTTTTTTYTTTTYTTTYTTTTTTTTTTTTTTTTTTTTTTTITTTTTTTTTTTTTTTTTYYIIIIIIIrIrrIrrrrrrrrrTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTTT  Reports    _ Virus definitions updated  30 03 2015  Y  No new security alerts  View  0 File system integrity baseline is not generated yet Create a baseline  VIA TO Aa iO  a semant rel  Protecting the irreplaceable       Advanced mode    Features   F Secure Linux Security is a business security solution that includes virus protection and a firewall  component  as well as a host based intrusion detection system  It can be installed as a stand alone  program on each workstation  or centrally managed        System requirements   The following Linux distributions are supported  CentOS 5 5  CentOS 6 4  6 5  6 6  CentOS 7 0  64 bit   command line edition only   Debian 6 0  Debian 7 0 7 6  Red Hat Enterprise Linux 5 5  5 9  5 10   5 11  Red Hat Enterprise Linux 6 4  6 5  6 6  Red Hat Enterpris
82. s org    Items covered in the review    Features  We note whether the program features real time protection  phishing protection  firewall  etc     System requirements  Supported Linux versions  according to the manufacturers documentation     Test platform  All programs were initially tested on 64 bit Ubuntu 14 04 1 LTS  In the event that a  program did not work at all on this platform  or that an included core feature such as real time  protection did not function properly  we additionally tested the program on 64 bit Ubuntu 12 04 2  LTS  In such cases  we have noted which features worked on which Ubuntu version     Version tested  The version number of the program tested  we note if there are separate 32 and 64   bit installers     Home business version  We state whether the program tested is marketed as a home or business  program  or if there are separate home and business versions     Licence  Is the program free or commercial  Is there is a free trial version     Installation  How to install the program on the Linux system  Where Linux Terminal commands are  needed  we have noted these  along with a description of GUI installation where this is available     Deinstallation  How to remove the program from the computer  with Terminal commands where  necessary     Accessing the program  Whether there is a tray icon  entry in the applications menu  or context  menu for scanning specific drives  files or folders     Non administrator access  Can a Linux user account without
83. savupdate     Logs Logs can be viewed from the    Log viewer    tab of the web interface  The logger will record  events of both the on access scanner and on demand scans    Quarantine The application does not use a pre defined quarantine directory  instead  the user can  specify a different quarantine directory for each on demand scan by adding the   quarantine    move  lt directory gt  flags to the savscan command    Scheduler Scheduled scans need to be configured from the command line  Sophos Anti Virus allows  administrators to create and schedule multiple so called    named scans      opt sophos   av doc namedscan example en contains an example of how to configure such a named scan   For  example  a scan called    DailyScan    that uses the configuration file at  home user dailyscan can be  added using the command sudo  opt sophos av bin savconfig add NamedScan DailyScan   nome user dailyscan    Licence We could not find licence information in the graphical user interface    Help The graphical interface does not contain links to help facilities  locally the user has to rely on  the provided man pages  e g   man savconfig     Settings The application s settings can be accessed using the web interface or the savconfig  command from the command line     Malware alerts   Sophos Anti Virus detects a download of the EICAR test file and displays a pop up window upon  detection  By default  the on access scanner will not quarantine or delete malicious detected files  it  only re
84. se   Licence This is displayed on the program   s home page   Help There is a   icon in the bottom left hand corner of the window    Settings The settings can be accessed by clicking the respective button in the main window   Malware alerts   These are not applicable  as there is no real time protection     Help    A user guide in pdf format can be accessed offline by clicking on the    Help    link in the main window     The program also installs man pages for both the command line scanner  man bdscan  and the user  interface  man bdgui      Verdict   BitDefender Antivirus Scanner for Unices provides an easy to user on demand scanner  which can be  controlled using both the Linux command line and the included graphical user interface  The  graphical interface is easy to use and the program   s help facilities are good      16     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Clam Antivirus for Linux    user ubuntu review       user ubuntu review    clamscan Downloads    Downloads eicar com txt  Eicar Test Signature FOUND    SCAN SUMMARY  Known viruses  3742637  Engine version  0 98 6  Scanned directories  1  Scanned files  1  Infected files  1  Data scanned  0 00 MB  Data read  0 00 MB  ratio 0 00 1   Time  8 135 sec  O m 8 s   user ubuntu review          Features   ClamAV is an open source anti virus engine with versions for Windows  Mac OS X  BSD  Solaris and  Linux systems  ClamAV provides on demand scanning to detect trojans  viruses and
85. should host the server  Using the    typical  installation    option  the server setup is straightforward  The only extra information the setup wizard  requires is the rough number of workstations that should be managed by the server  After the  installation is completed  the user has the option to open the Administration Console  As the  Administration Console is opened for the first time  the Quick Start Wizard is displayed  Using this  wizard  the user needs to provide his licence key for the software  The user can also choose whether  he or she wants participate in the Kaspersky Security Network or not  After configuring updates and  creating a list of trusted applications to exclude from the control of the Endpoint Protection clients   the wizard downloads the latest signature database updates and finishes the setup process     Installation files for the anti virus client and other tools can be found in the product update section  on Kaspersky Lab s website      To be able to set up Kaspersky Anti Virus for Linux File Server with central management capabilities   three files are required   1  The installation file for the anti virus client   deb version for Ubuntu  packages for other  distributions are available as well   2  The Administration Agent to establish a connection with the management server  same  package formats as for the client installer   3  The Administration plug in for the Kaspersky Security Center to be able to create specific  anti virus policies for 
86. st file  but  does not display any pop up notification messages  email alerts can be configured in the web  interface     Findings of the real time scanner are displayed as    Unread security alerts    in the Summary section of    the web interface and can be accessed from the Alerts section   Alerts    Unread security alerts  1  fatal errors  0  errors  0  warnings  0  informational  0    Status Severity  Unread       Security alert Y         Time Message    6 5 2015 09 34 59 Virus Alert  File renamed       Help  The program includes HTML documentation that can be accessed offline by clicking the   symbol in  the web interface  The help document is also available in  pdf format on F Secure s Linux Security    website     Verdict   F Secure Linux Security provides a variety of security features  also including a firewall and a host  IDS  In its standard mode  the web interface allows quick access to the program s functionality   while the advanced mode offers well structured configuration options     e    AV       comparatives    Linux Security Reviews 2015 www av comparatives org    G Data Client Security Business    G Data AntiVirus       el Actions Virus check Internet update    A Ch Z Signatures update    Features   The G Data AntiVirus client for Linux  included in the G Data Client Security Business suite  features  on demand scanning and on access scanning for samba shares in the file server version  Multiple  clients are centrally managed from the G Data Management Se
87. stricted by the need to enter login credentials for the administration  console     Main program window   The interface is mainly divided into three parts  a menu on the left  the content of the currently  selected menu entry in the centre and  optionally  a quick help section on the right hand side of  the page    The menu is structured into three categories  View  containing various status information  Schedule   containing options to create update and scheduled scans  and Configure  containing options to  configure the program behaviour    Real time protection status is shown in the console entry for the machine in question  The on   access scanner can be disabled enabled from the    On Access Settings    option in the Configure  section  The status of the on access scanner is shown in the    Host Summary    view     Monitored Hosts  i rit aay AT Cutra TZ E E a  as E a ea    gt   LICU   d a o 7 A a d      e  et ee    I 4c N 4 l i F   K L   crea re IC Vi i       127 0 0 1 65443 7306 1 7744 0000 18 Mar 2015 No 5700 7163 2 0 1 29052 Evaluation    comparatives       Linux Security Reviews 2015 www av comparatives org    On demand scans can be performed by creating a scan task and scheduling it to run immediately   from the On Demand Scan option in the Schedule section   The user can specify which directories to  scan and define a configuration for the scan  e g  to scan archives  exclude certain directories   At  the end of the task setup  the task is assigned a name  so it ca
88. stricts access to them      P sophos anti virus    Threat  EICAR AY Test    detected in file    tnp nFs2gYnv bin part  The file is still infected    Please contact your IT departnent     OK      The notification window does not disappear automatically     Help  Detailed install  and configuration guides can be obtained in  pdf format from the download section  of Sophos  website     Verdict   Sophos Anti Virus for Linux provides a very straightforward installation process and an intuitive user  interface to configure the application components  It requires administrators to possess some  experience in using the Terminal on Linux systems      62     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Symantec Endpoint Protection for Linux       Symantec Endpoint Protection    Symantec Endpoint Protection    Program Version    Program  12 1 5  12 1 RUS  build 5337  12 1 5337 5000   Scan Engine  141 2 0 59         Definitions  Version  03 29 2015 rev  1    Status       Auto Protect  Enabled  Scan  Scanning files    Management    Server   Group  My Company Default Group  Last Connected  Mon 30 Mar 2015 04 00 55 PM CEST    Location  Default  Policy Serial Number  55D2 03 30 2015 13 33 06 169       Close      Features   Symantec Endpoint Protection for Linux is part of a business security solution that includes on   demand and real time scanning for Linux systems  The client software is centrally managed by the  Symantec Endpoint Protection Manager  whic
89. t  Files scanned   PARO    1 1   O    S     Warnings reported   0  Errors reported O       user ubuntu review         Features   AVG Free Edition for Linux is a command line only scanner that features on demand as well as on   access scans  An installation also includes optional plugins for mail filtering and scanning of Samba  shares    Note  while the program s virus database can still be updated normally  AVG informed us that    AVG  Free Edition for Linux    itself is no longer developed nor maintained     System requirements   During installation  the install script displays required libraries for Linux systems   libc so 6  for amd64 architecture  the lib32 compat libraries are needed   For on access scanning redirfs  dazuko  dazukofs or a kernel supporting fanotify is needed     Test platform  64 bit Ubuntu 14 04 1 LTS  64 bit Ubuntu 12 04 2 LTS    Version tested  13 0 3118  32 bit  no 64 bit version available     Home business version  AVG Free is targeted at home users  There is no business version that runs on Linux systems     Licence  As the name suggests  AVG Free Edition for Linux is available free     Installation   Before installing the program using the installer from AVG s website    the 32 Bit compatible C library  needs to be installed  sudo apt get install libc6 i386   After marking the installer file as executable   the downloaded file needs to be run as the root user  chmod  x avg2013flx     sh followed by  sudo   avg2013flx     sh  After accepting the l
90. t Installed  1  Failure Ratio  100   Maximum Acceptable Failure Ratio  10   Computer Name IP Address User Name   ubuntu review None    Scan On demand scans can be started from both the server and the client side of the application   From the server side  scans can be started manually by right clicking the client to be scanned and  sending the    Scan    command    On the client side  the command line tool sav can be used to perform manual scans  The command  sudo  opt Symantec symantec_antivirus sav manualscan  s   starts a full filesystem scan  for  instance    The results of the manual scans are sent to the management server  where they can be displayed in    the    Monitor    tab     0 Symantec Endpoint Protection Manager      Symantec    Endpoint Protection Manager               Summary   Logs   Command Status   Notifications   Security Virtual Appliance      Summary type    Virus and Spyware Protection  y   data for the past 12 hours  Last updated at  03 26 2015 08 48 48    Risk Distribution Risk Distribution by Source       I    EICAR Test String 1          ES  _ New Risks   Risk Name Detected By Computer   gt  EICAR Test String Manual Scan ubuntu review  1 total risk detections   Risk Distribution by Group  _ SONAR  My Company Defautt                Update By default  new clients are assigned an update policy that performs virus definition updates  every 4 hours  can be changed in the    Policies    tab of the Endpoint Protection Manager   Manual  updates can be execut
91. tdefender engine       44     AV       comparatives    Linux Security Reviews 2015 www av comparatives org          Admin Organization Options License management          Q  gt  B  wy A ES Ey   Dashboard Clients Client settings Android settings Tasks Firewall Reports ReportManager    Search for client    D L   E     g Clients Y Detection method    virus hit list dnn list of neutralized infections  4 LAN ManagementServers    A N   N     gt   Gp USER PC   Period  23  11 12 2014   5 12 2015   ea   Display mode  Bar chart                 Virus hit list    EICAR Test File       0 1          Connected Status as per  5 7 2015 12 00 00 AM    Update By default  the security clients are configured to receive virus database updates from the  management server automatically  On the server side  no update schedule is created by default  This  can be changed from the Options  gt  Internet update window of the G Data Administrator  If allowed  by the management server  the clients may also create their own update schedules or perform  manual updates from the Signature update window of the client application s user interface    Logs for specific tasks can be displayed from the Tasks tab of the G Data Administrator by selecting  a task and clicking the notepad icon in the toolbar above the task list    Quarantine Quarantined files are stored centrally on the management server  From the G Data  Administrator  quarantined files can be displayed on the Reports tab    Scheduler An execution sched
92. te  After we informed the vendor of our difficulties   they responded quickly and updated the requirements website     Deinstallation  The program can be uninstalled using   opt PCOPAgent Common PCOP_Uninstaller sh      the uninstaller provided  located at    Accessing the program  The program does not display a tray icon or add entries to the context menu of nautilus     Non administrator access   Most of the available settings can only be changed from the web management console by an  administrator  Changing the configuration file on the client machines requires root privileges  as  does starting manual on demand scans     Main program window  The Linux client of Panda Endpoint Protection does not include a graphical user interface   The cloud hosted web management console consists of a tabbed menu on the top and a bigger             section  displaying information according to the currently selected tab  below the menu   ff Ex balbal  Y Endpoint Protection Plus   x N D      C   https   managedprotection pandasecurity com PartnerConsole cv12 Customers Status Default aspx In IR       a    Endpoint Elisa    Protection Plus    Y panda      a Users Preferences    Language  English v    STATUS MAIS B O E NCE  2  HELP  lt        QUARANTINE REPORTS OTHER SERVICES      Your last licenses of Endpoint Protection Plus expire in 9 day s   Contact your usual reseller or sales advisor to renew them           Intrusion attempts blocked  0   Devices blocked  0    Dangerous operations block
93. time scan options  by default  the scanner will try to  clean the file and quarantine it  if cleaning did not succeed      Help   Getting Started and Administrator Guides are available on Trend Micro   s website  Additionally  the  web interface can be used to access help topics for each of the menu options  Trend Micro   s  knowledge base and other online support facilities     Verdict   Trend Micro ServerProtect for Linux provides a straightforward web user interface  which enables the  user to change all of the program   s configuration options without having to use the terminal  The  help facilities provide quick access to specific information about program features      70     AV    comparatives       B EE avast File Server AVG Free Edition eek Senay COMODO Antivirus wak for Linux San Anti Virus for ESET NOD32 B gp  Security for Linux for Linux orUnices for Linux Linux Antivirus for Linux Workstations   E    Officially Supported Ubuntu Versions  12 04 discontinued 10 04 or newer 9 04 or newer 12 04 11 04 or newer 9 04   10 04 12 04 discontinued   Main User Target Business Users Home Users Business Users Home Users Home Users Home Users Home Users Home Users Home Users   License type COMMERCIAL FREE COMMERCIAL FREE FREE COMMERCIAL COMMERCIAL COMMERCIAL FREE   A A   Graphical User Interface  GUI  o e e e e   On demand scanner e o o o o o o e o   Real Time protection e only up to 12 04 2 e o   Block access to malicious phishing sites      Firewall   IDS   Removable media bl
94. tives org    Licence  The basic version of the program is available free        Installation   To be able to download the installer  the user first needs to create a    MySophos    account on Sophos     website  After the first login to the newly created account  the web interface will prompt the user to  enter his her licence username and password  Once the credentials are entered  the user can  download the installer in a  tgz archive from the Downloads section  Standalone Installers     Anti   Virus for Linux     After extracting the files within the archive  tar xzvf sav linux 9 i386 tgz   the software can be  installed by running the install script as root  sudo   sophos av install sh  During the installation  process little user interaction is required   the user needs to accept the licence agreement  specify a  username and password to access the web user interface and again enter his her licence username  and password to enable updates    No additional packages are required to install the software     Deinstallation  The software can be uninstalled using the included uninstaller  located at  opt sophos   av uninstall sh by default      Accessing the program  The application does not display a tray icon or add context menu entries to nautilus     Non administrator access   The web interface can only be accessed using the credentials that were created during the  installation process  Unprivileged users are therefore unable to change the program s configuration  or enab
95. to an online help document  the  technical support page and an administration guide     Verdict   Using Panda Endpoint Protection Plus  multiple clients on different platforms can be managed  centrally from a cloud based server  The Linux client of the security suite requires some additional  packages  but is still easy to install  From the web management console  computers can be  configured in administrative groups      58     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Seqrite Antivirus for Linux    On Segrite s website     a demo of their Linux antivirus solution can be requested  but obtaining a  trial licence directly is not supported  We tried to apply for a demo via the website  but did not  receive an answer  probably because the product is mainly targeted at the Indian market     Features  According to the datasheet on the vendor s website  Seqrite Antivirus for Linux includes on demand  an on access scanning  with a web user interface that allows remote administration     System requirements  The datasheet lists the following supported distributions     32 bit  Fedora 14  19  openSUSE 11 4  12 2  12 3  Ubuntu 10 10  12 04  12 04 3  13 04  13 10  64 bit  Fedora 14  18  19  openSUSE 12 1  Ubuntu 12 04 2  13 04  13 10  CentOS 6 3    7 http   www segrite com segrite for linux     59     AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Sophos Anti Virus for Linux    Sophos Anti Virus   Home   Mozilla Fir
96. ule can be configured for each scan task    Licence Information about currently used licences can be accessed from the Licence management  menu of the G Data Administrator    Help an HTML version of the program manual can be accessed from the help menu of the G Data  Administrators main window  the         menu    Settings Anti virus settings can be displayed and changed from the Client settings tab of the G Data  Administrator     Malware alerts  No notifications are displayed on the client side  If an on demand scan detects malware  a red virus  alert message will be displayed in the status bar of the G Data Administrator  Clicking on the  message displays details about the detection          USER PC      Host Ubuntu       User      Date  12 05 2015 22 34 41      File   home user Downloads eicar com   7 Infection  EICAR Test File  not a virus   EngineA      Status  File moved to quarantine          Ase    AV    comparatives       Linux Security Reviews 2015 www av comparatives org    Help    The archive containing the installation files contains a comprehensive program manual in pdf format     An HTML version of the manual can be accessed from G Data Administrators help menu          in the  menu bar   On the client side  the available options for the command line scanner and updater can  be accessed from the respective man pages  man gdavclientc and man gdavupdate      Verdict   G Data Client Security Business allows multiple security clients running on different platforms
97. ware does exist  even if the number of programs is small  for example  in March 2014  ZDNet   reported the discovery of the cybercrime campaign    Operation Windigo     One of Windigo s  components   Ebury   provided attackers with a backdoor to infected servers and the ability to steal  SSH credentials and send spam mails  Researchers observed that Ebury had infected approximately  26 000 Linux servers since May 2013     Another reason for using an antimalware program on a Linux computer is to intercept any Windows  malware before it can be passed on to a Windows system that it could infect     We mostly used Ubuntu Linux  details below  for our review and test  Ubuntu is a very popular  distribution  with support and management packages available from Canonical  the manufacturer   making it suitable for business use     We used CentOS to test Trend Micro s Linux solution  since there are no Ubuntu versions available for  their product  CentOS is a distribution based the commercial Red Hat Enterprise Linux distribution   but without the commercial support by Red Hat     The aim of this report is to provide an overview of available antivirus products for Linux systems  We  tried to focus on products targeted at home users  Only if a vendor does not offer a home user  version for Linux did we install the business version     The report is targeted at Linux users  1 e  some basic Linux knowledge is assumed  since every  product requires the usage of the Linux terminal at some p
98. workstations might  be another factor that influences the amount of Linux malware  According to Netmarketshare   the  market share of Linux is only 1 5  in the Desktop section  making Linux systems a rather un   lucrative target for attackers  The low market share might also explain the relatively low numbers of  available antivirus programs targeted at Linux home users     One last factor  we would like to mention is the way third party software is typically installed on  Linux distributions  This kind of software is mostly installed via software repositories that contain  trusted software and are maintained by the community and or authors of the distribution  This  makes it harder for malware authors to distribute malware by hiding it in seemingly benign software     Linux security advice    Employing good security practices can help to further secure your Linux system  We recommend the  following   1  Keep installed software up to date  2  Use phishing protection  at least the one provided in most  browsers   3  Only install software from trusted sources  e g   the package  manager of your Linux distribution   4  Don t log on as root   use the sudo utility to gain temporary  administrator access  Use strong passwords  Disable services that you don t use  IPv6  for instance   Don t run commands you do not understand  Backup your data system regularly       CON O UI    3 http    www netmarketshare com    AV    comparatives       Linux Security Reviews 2015 www av comparative
99. xx bin javaws   4  Extract the policy files and run  sudo cp UnlimitedJCEPolicyJDK8 local_policy jar   opt jre1 8 0_xx lib security   5  Change the owner of the install directory to root  sudo chown  R root root  opt jre1 8 0_ xx  xx    being a placeholder for the current revision number        To finish the installation  finally the install script needs to be run as root  sudo chmod  x   install sh   amp  amp  sudo   install sh  i     Note  the real time protection component    Auto Protect    does not work for the Linux kernel  included in Ubuntu 14 04  To test this component  we also installed the client on Ubuntu 12 04 2  with Linux kernel 3 5 0 23  The vendor informed us that the Auto Protect issue  as well as the other    31 http   www symantec com endpoint protection    32 The install script seems to contain a malformed path expression that will cause the installation to fail  if the  script is executed from a different directory   this problem seems to be specific to Ubuntu 14 x versions    33 http    www oracle com technetwork java javase downloads index html   34 http    www oracle com technetwork java javase downloads jce8 download 2133166 html    3 The alternative systems manages the symbolic links to different versions of the same or similar programs    different versions of Java  for instance      64     AV       comparatives    Linux Security Reviews 2015 www av comparatives org    problems with Ubuntu 14 04 we encountered during this review  will be resolved i
    
Download Pdf Manuals
 
 
    
Related Search
    
Related Contents
  Sweex eBook Reader 6" Black  Cutter HG-95614-1 Instructions / Assembly  Kenroy Home 32260CLR Installation Guide  Rocketfish QS2-T User's Manual    RECORDER DAS30- DAS50 USER`S MANUAL - HIK  防爆構造電気機械器具新規型式検定に適用する工場電気設備防爆指針  Zebra MtP400 User's Manual    Copyright © All rights reserved. 
   Failed to retrieve file