Perform these steps when rolling back the scan engine and pattern file of ServerProtect for Linux (SPLX).
- Download the older SPLX virus pattern and scan engine file that you want to roll back to. You can also use a back up copy of the virus pattern and scan engine that you saved. If you have a back up copy of the files, then kindly proceed to step 4.
- Open a Command Terminal and then stop the SPLX service using this command:
Note: You may also use this command: “service splx stop” (Red Hat)
- Delete the latest engine file that you wish to roll back. The filename is “libvsapi.so”, located in /opt/TrendMicro/SProtectLinux.
- Delete the latest virus pattern file lpt'$'vpn.xxx from the /opt/TrendMicro/SProtectLinux directory. Leave the previous pattern file that you wish to roll back to (if it exists).
- Copy or extract the back up scan engine and pattern file into the /opt/TrendMicro/SProtectLinux directory.
- Start the SPLX server using this command:
Note: You may also use this command: “service splx start” (Red Hat)
- Verify that the scan engine and pattern file are properly rolled back via the management console.
- Access the URL below through IE (on Windows platform) or Netscape (on both Windows and Linux platforms) web browsers:
Note: There are instances when the latest scan engine or pattern files are not immediately reflected on the management console. When this happens, you can restart the SPLX service on the Linux server.
- You can also verify the version using this command:
cat /opt/TrendMicro/SProtectLinux/tmsplx.xml | grep –i version