McAfee VirusScan Enterprise for Linux

McAfee VirusScan Enterprise for Linux

Always-on protection for Linux systems

Next Steps:

Overview

McAfee VirusScan Enterprise for Linux delivers always-on, real-time anti-malware protection for Linux environments. Its unique, Linux-based on-access scanner constantly monitors the system for potential attacks. Regular automatic updates from McAfee Labs protect your enterprise from the latest threats without requiring a system reboot.

VirusScan Enterprise for Linux provides:

Award-winning performance — Named a VB100 award winner for 100% detection of “in the wild” test samples, plus zero false positives in a selection of clean files.

Always-on protection — Uses heuristic scanning, archive scanning, and cross-platform protection to ensure comprehensive security.

Centralized management and reporting — With the McAfee ePolicy Orchestrator (ePO) platform, you can efficiently deploy and manage your Linux, Microsoft Windows, and Mac clients on your network, giving you better security visibility across your entire infrastructure. Control policy configuration, deployment, and reporting for all your endpoints from ePO’s single, web-based console.

Features & Benefits

Secure your enterprise with always-on protection

Protect your Linux environment with industry-leading protection:

  • Heuristic scanning — Uses behavior-based rules to identify and block new variants and unknown threats, without the need to download a patch.
  • Archive scanning — Detects and blocks viruses hidden within archived files.
  • Cross-platform protection — Blocks Microsoft Windows malware so it’s not transmitted through the Linux environment.
Save time with automatic updates

Count on automatic updating from McAfee Labs to ensure the most current protections are always in place — without requiring a server restart.

Make management easy with McAfee ePolicy Orchestrator (ePO)

Manage McAfee VirusScan Enterprise for Linux from a single, centralized console with the ePO platform, the first and only scalable tool for managing and enforcing anti-virus protection and policies.

Deploy new kernels quickly and easily

Get on-access scanning protection without kernel hooks, saving time and effort when you roll out new Linux distributions.

System Requirements

These are minimum system requirements. Actual requirements will vary depending on the nature of your environment.

All Platforms

  • Screen resolution: 1024x768 (minimum)

Supported Processors

  • Intel x86 architecture-based processor
  • Intel x64 architecture-based processor that supports Intel Extended Memory 64 Technology (Intel EM64T)
  • AMD x64 architecture-based processor with AMD 64-bit technology

Supported Distributions for 32-bit Platforms/64-bit Platforms

  • Red Hat Enterprise 5, 6, and 7
  • SuSE Linux Enterprise Server/Desktop 10, 11, and 12
  • Novell Open Enterprise Server 2 and 11
  • Ubuntu 12.04, 12.10, 13.04, 13.10, 14.04, and 14.10
  • CentOS 5, 6, and 7
  • Oracle Linux 5, 6, and 7 (Both Red Hat compatible and Unbreakable Enterprise Kernel)
  • Amazon Linux 3.2 Kernels and above
  • Support for public cloud such as Amazon EC2
  • Supports para-virtualization

Supported Browsers

  • Microsoft Internet Explorer
  • Konqueror
  • Mozilla
  • Firefox
  • Safari
  • Google Chrome

Customer Stories

GAD eG

This provider of banking IT services centralizes security management and improves security throughout its endpoints, including ATMs and point-of service systems in branches.

Resources

Data Sheets

McAfee VirusScan Enterprise for Linux

For a technical summary on the McAfee product listed above, please view the product data sheet.

Community

Blogs

  • Advice for Unfastening CryptoLocker Ransomware
    Dan Larson - April 22, 2015

    In the McAfee Labs Threats Report: November 2014, Intel Security predicted nine major threats that would occur in 2015. Regarding ransomware, we said this: “Ransomware will evolve its methods of propagation, encryption, and the targets it seeks.” Almost immediately, we began to see a huge rise in ransomware, especially with the family CTB-Locker, followed by […]

    The post Advice for Unfastening CryptoLocker Ransomware appeared first on McAfee.

  • Building Secure Castles in the Cloud
    PageOne Pr - April 21, 2015

    You, along with the vast majority of companies, use public cloud servers for something. Whether they are your primary service infrastructure, overflow capacity, or emergency backup, this Infrastructure as a Service (IaaS) is delivering on the promises of reduced costs, greater agility, and enhanced scalability. But there are still questions about security. You need to […]

    The post Building Secure Castles in the Cloud appeared first on McAfee.

  • Update on the Beebone Botnet Takedown
    Raj Samani - April 20, 2015

    On April 8, the takedown operation for the polymorphic botnet known as Beebone successfully concluded. This action redirected traffic from infected hosts to a sinkhole operated by the Shadowserver Foundation. In addition to halting additional infections and the continued morphing of the W32/Worm-AAEH worm, the sinkhole allows McAfee Labs and other partners in the takedown […]

    The post Update on the Beebone Botnet Takedown appeared first on McAfee.

  • Taking a Close Look at Data-Stealing NionSpy File Infector
    Sanchit Karve - April 14, 2015

    W32/NionSpy is a family of malware that steals information from infected machines and replicates to new machines over networks and removable thumb drives. Aside from stealing keystrokes, passwords, Bitcoins, system information, and files on disk, NionSpy (also known as Mewsei and MewsSpy) can record video (using the webcam), audio (using the microphone), take screenshots, and […]

    The post Taking a Close Look at Data-Stealing NionSpy File Infector appeared first on McAfee.

  • VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials
    Diwakar Dinkar - April 13, 2015

    Since the beginning of the year we have seen a spike in ransomware including the emergence of new ransomware families. One family that has recently resurfaced is Vaultcrypt. This variant both tidies up after itself and steals web page login data. Infection vector The malware arrives on a victim’s machine through a spam email containing […]

    The post VaultCrypt Ransomware Hides Its Traces While Stealing Web Credentials appeared first on McAfee.

Threats and Risks