McAfee VirusScan Enterprise for Linux

McAfee VirusScan Enterprise for Linux

Always-on protection for Linux systems

Next Steps:

Overview

McAfee VirusScan Enterprise for Linux delivers always-on, real-time anti-malware protection for Linux environments. Its unique, Linux-based on-access scanner constantly monitors the system for potential attacks. Regular automatic updates from McAfee Labs protect your enterprise from the latest threats without requiring a system reboot.

VirusScan Enterprise for Linux provides:

Award-winning performance — Named a VB100 award winner for 100% detection of “in the wild” test samples, plus zero false positives in a selection of clean files.

Always-on protection — Uses heuristic scanning, archive scanning, and cross-platform protection to ensure comprehensive security.

Centralized management and reporting — With the McAfee ePolicy Orchestrator (ePO) platform, you can efficiently deploy and manage your Linux, Microsoft Windows, and Mac clients on your network, giving you better security visibility across your entire infrastructure. Control policy configuration, deployment, and reporting for all your endpoints from ePO’s single, web-based console.

Features & Benefits

Secure your enterprise with always-on protection

Protect your Linux environment with industry-leading protection:

  • Heuristic scanning — Uses behavior-based rules to identify and block new variants and unknown threats, without the need to download a patch.
  • Archive scanning — Detects and blocks viruses hidden within archived files.
  • Cross-platform protection — Blocks Microsoft Windows malware so it’s not transmitted through the Linux environment.
Save time with automatic updates

Count on automatic updating from McAfee Labs to ensure the most current protections are always in place — without requiring a server restart.

Make management easy with McAfee ePolicy Orchestrator (ePO)

Manage McAfee VirusScan Enterprise for Linux from a single, centralized console with the ePO platform, the first and only scalable tool for managing and enforcing anti-virus protection and policies.

Deploy new kernels quickly and easily

Get on-access scanning protection without kernel hooks, saving time and effort when you roll out new Linux distributions.

System Requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

All Platforms

  • Screen resolution: 1024x768 (minimum)

Supported Processors

  • Intel x86 architecture-based processor
  • Intel x64 architecture-based processor that supports Intel Extended Memory 64 Technology (Intel EM64T)
  • AMD x64 architecture-based processor with AMD 64-bit technology

Supported Distributions for 32-bit Platforms/64-bit Platforms

  • Red Hat Enterprise 5, 6, and 7
  • SuSE Linux Enterprise Server/Desktop 10, 11, and 12
  • Novell Open Enterprise Server 2 and 11
  • Ubuntu 12.04, 12.10, 13.04, 13.10, 14.04, and 14.10
  • CentOS 5, 6, and 7
  • Oracle Linux 5, 6, and 7 (Both Red Hat compatible and Unbreakable Enterprise Kernel)
  • Amazon Linux 3.2 Kernels and above
  • Support for public cloud such as Amazon EC2
  • Supports para-virtualization

Supported Browsers

  • Microsoft Internet Explorer
  • Konqueror
  • Mozilla
  • Firefox
  • Safari
  • Google Chrome

Resources

Data Sheets

McAfee VirusScan Enterprise for Linux

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • Meet ‘Tox': Ransomware for the Rest of Us
    Jim Walter - May 23, 2015

    The packaging of malware and malware-construction kits for cybercrime “consumers” has been a long-running trend. Various turnkey kits that cover remote access plus botnet plus stealth functions are available just about anywhere. Ransomware, though very prevalent, has not yet appeared in force in easy-to-deploy kits. But now we have Tox–and it’s free.       […]

    The post Meet ‘Tox': Ransomware for the Rest of Us appeared first on McAfee.

  • Understanding the Scope of Venom (CVE-2015-3456)
    Jim Walter - May 19, 2015

    In recent days, much has been said and written around the recently disclosed “Venom” vulnerability. It is important to fully understand the real-world severity of vulnerabilities such as Venom. Although the threat is potentially severe and certainly interesting (it is in a class of relatively rare guest escapes from virtual machines), one has to take into […]

    The post Understanding the Scope of Venom (CVE-2015-3456) appeared first on McAfee.

  • Enhanced Certificate Security – Pinning
    McAfee Foundstone Professional Services - May 18, 2015

    Written by Deepak Choudhary There are always risks involved when relying on a third party to send and receive sensitive data over secure network channels. While we recognize the roles of the Public Key Infrastructure (PKI) and third party certificate authority (CA), we also believe that Certificate SSL Pinning can play a key role in […]

    The post Enhanced Certificate Security – Pinning appeared first on McAfee.

  • Defending Against Ransomware with McAfee Threat Intelligence Exchange
    Dan Larson - April 30, 2015

    In a blog last week, I discussed CryptoLocker, a particularly nefarious family of ransomware, and how to defend against it. I thought it would be worthwhile to demonstrate how McAfee Threat Intelligence Exchange can detect and stop malware like ransomware, even if the suspicious file has not been flagged as malware by antivirus signatures. Click […]

    The post Defending Against Ransomware with McAfee Threat Intelligence Exchange appeared first on McAfee.

  • Advice for Unfastening CryptoLocker Ransomware
    Dan Larson - April 22, 2015

    In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]

    The post Advice for Unfastening CryptoLocker Ransomware appeared first on McAfee.

Threats and Risks