Prerequisites
Hardware and Software Requirements
To ensure successful installation, your system must meet the following hardware and software requirements:
- OpenSSH Server
- OpenSSH Client
- OpenSSH SFTP Server
- AVX (Advanced Vector Extensions)
The following software components are required for a successful installation. The installer will handle the installation of these components automatically:
- Java
- Nginx
- Wildfly
- Kafka
- MongoDB
- Redis
- Curl
Ensure that your system meets these System Requirements before proceeding with the installation.
Installing Seqrite Endpoint Protection Server
To begin the installation of Seqrite Endpoint Protection server, follow these steps:
- Ensure that the product key is readily available and visit the following link: https://www.seqrite.com/seqrite-product-installer
- Enter the product key into the designated field and click Submit.
- Select the preferred option to download the installer based on your package specifications.
- Save the installer to your preferred location on your Linux system.
- Open the terminal and log in as a root user.
-
Execute the Installer by typing the following command:
sh Seqrite_EndPoint_Security_8_3.sh -c
The Seqrite Endpoint Protection setup wizard starts.
- The list of actions appears. To continue, hit [Enter].
-
The license agreement appears. Read the License Agreement carefully. Installation and usage of Seqrite Endpoint Protection is subject to your formal acceptance of the Seqrite Endpoint Protection end-user license terms and conditions.
To continue, hit [Enter] or press the R key to read more.
- Terms & Conditions appear. To continue, hit [Enter] or press the R key to read more.
- To continue, type A and hit [Enter] to accept the terms and conditions; the D option is to decline. If you decline, the installation process is stopped.
-
The Installation types appear. Type one of the following options.
- Single Node Installation – Type S and hit [Enter].
- Distributed Installation – Type D and hit [Enter].
-
Select one of the following:
- I will enter Product Key after Installation – Type 1 and hit [Enter].
- If you select, I will enter Product Key after Installation, the installation of Seqrite Endpoint Protection will be done. But you must provide the Product Key when you logon for the first time to the Seqrite Endpoint Protection console. The Product Key activates the Seqrite Endpoint Protection product.
- I have Product Key – Type 2 and hit [Enter].
- If you select, I have Product Key, enter Product key carefully. The Product Key will be validated. The success message appears.
- I will enter Product Key after Installation – Type 1 and hit [Enter].
- The Customer Information screen appears. Type information about the customer step by step. This information is important to activate Seqrite Endpoint Protection on your machine.
-
The Setup will install Seqrite Endpoint Protection in the default folder. The folder path appears. Available and required disk space is calculated automatically and the figures are displayed.
To continue, hit [Enter]. Ensure that there is required space available on the disk.
-
The Server Configuration screen appears.
– Here for Private IP or Public or FQDN installation, select IP Address or Domain Name from the list. To continue, hit [Enter].
Note: Client will communicate to the Server through IP/Host Name provided by you. Ensure that, the IP Address /Host Name is reachable. You can do that by adding IP Address – Domain name mapping in the hosts file. C:WindowsSystem32driversetchosts file for Windows and /etc/hosts for Linux clients and /private/etc/hosts for Mac clients.
– Default values of **HTTP Port** and **SSL Port** appears. To continue with default values, hit [Enter]. Else type the port values and hit [Enter].The port connections are tested, and port numbers are validated.This port number serves as a listening port for the server. With Seqrite Endpoint Protection server address, you can launch the console.
-
If you select, Distributed Installation in step 7, then only Distributed Server Configuration screen appears. Else, the Proxy Settings screen appears, go to step 14.
- Type IP address or hostname of the Distributed Server and hit [Enter].
- Type Username and hit [Enter].
- Type Password and hit [Enter]. You cannot view the typed password.
-
The Proxy Settings screen appears.If you are using a proxy server to connect to the Internet, type 1 and hit enter.
If you want to continue without enabling Proxy Settings, type 2 and hit enter.The Proxy Setting information is used by Seqrite Endpoint Protection server for internet connectivity, activation and for downloading updates.To enable and configure proxy settings:- Type the IP address of the proxy server or domain name (For example, proxy.yourcompany.com) and hit [Enter].
- Type the port number of the proxy server (For example: 80) and hit [Enter].
- Type 1 to Authenticate to connect through Proxy server. Type 2 to continue without authentication.
- Type User Name.
- The success message appears if the connection to the proxy server is successful.
-
The Installation Folder screen appears. Seqrite client is installed on the endpoint as per the path specified in this screen.
Required disk space and available disk space is shown.
To continue hit [Enter]. -
The Authentication screen appears.Create Seqrite Endpoint Protection administrator password to access the Web console and endpoint password to access the endpoint settings at the endpoint side.
- Type in Administrator Email Address and hit [Enter] or you can continue with the Email address appeared. To continue, hit [Enter].
- Type in your password and hit [Enter]. Type password again to confirm the password and hit [Enter]. You cannot view the typed password.
- You can provide client credentials. This is optional. Type 1 to specify client credentials and hit [Enter]. Type in client password and hit [Enter]. Type client password again to confirm the password and hit [Enter]. You cannot view the typed password.
- This helps prevent unauthorized users from accessing the Web console and make changes in your settings or remove the endpoints.
- Type 2 to continue without providing client credentials and hit [Enter].
-
The installation summary screen appears. Activation and Server Configuration data is displayed. Please note the Seqrite Endpoint Protection login URL.
- Type 1 to save summary file at path/opt and hit [Enter].
- Type 2 to continue without saving and hit [Enter].
- The installation process starts. Success screen appears.
Re-installation of Seqrite Endpoint Protection server
In Minimal/CLI Mode for UBUNTU 22.04 LTS after uninstalling Seqrite Endpoint Protection 8.1/8.2, you cannot install Seqrite Endpoint Protection 8.3 server with the same product key.