Antivirus Protection for Linux File Servers
The Best Protection for OpenSource File Servers & Desktops
NOD32 Antivirus for File Servers runs seamlessly on all mainstream Linux distributions (RedHat, Mandrake, SuSE, Debian and others) and FreeBSD. The small footprint and fast performance makes NOD32 optimally suited for real-time or on-demand protection of your Unix File System Servers.
Key features - ThreatSense™ technology — a single optimized Anti-Threat engine for analyzing code to identify malicious behavior such as viruses, spyware, adware, phishing, and more.
- Unprecedented heuristic analysis capable of discovering new malware threats as they emerge.
- Powerful virtual PC emulation technology enables unpacking and decryption of all types of archives and run-time packing.
- User-friendly installation and simple configuration.
- Does not require external libraries or programs except for libc.
- Flexible six-level infiltration and activity logging.
- Uses both the on-demand and on-access scanning techniques to secure and protect the entire file system and running processes.
- Provide file access control over Samba, Nettalk and NFS.
System Requirements
- OS Linux (Kernel 2.2.x, 2.4.x and 2.6.x, glibc 2.2.5 or higher)
- 5MB hard-disk space and 8MB RAM
- Dazuko kernel module 2.0.0 and higher
Supported Distribution
- RPM for RedHat, Mandrake and SuSE distributions
- DEB for GNU/Linux Debian
- TGZ for all other Linux flavors
- TGZ for FreeBSD
System architecture
NOD32 for File Servers consists of on-demand and on-access scanning modules. The on-demand scanner performs scanning of the selected file system upon user request via command line. Using standard Linux operating system schedulers, various periodic scanning tasks can be pre-defined. The on-access scanner daemon provides real-time monitoring of the entire file system. File scanning is triggered by user or system events that result in file access calls by the Linux kernel. The file infomation is passed on to the NOD32 scanning engine. Depending on the scanning results a predefined action on the file is triggered. File access can be allowed or denied and the appropriate log output is created. |