Your request for Endpoint Protector was sent!
One of our representatives will contact you shortly to schedule a demo.
Free, custom demo to suit your needs
One of our representatives will contact you shortly to schedule a live demo. We'll answer questions, address your concerns and tailor the demo to your needs.



* We don't share your personal info with anyone.
Check out our Privacy Policy for more information.
Please use a valid email address!
Thousands of global clients
already use our product
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Join them
Trusted by companies of all sizes, from all industries. Fortune 500 companies, Universities, Governments, Banks, Media, and more.
Endpoint Protector Knowledge Base

Below you can explore FAQs related to Endpoint Protector and find the information you need. For any other additional questions, suggestions, and improvements please contact the support team.

Why do Linux various system users appear in the Endpoint Protector’s UI?

For Linux computers, besides the actual users, there are also multiple users created by the system. Depending on the distributions, the list of users can include root, 65534 and lightdm.

Linux system users

Based on the system processes running at any given time on the computer, besides the real user, any of the system users can become active. The Endpoint Protector Client is not identifying the users on its own but instead, it interrogates a system library for the detection process. It is that system library that returns the active user at that moment. The subsequent information is displayed in the UI.

Linux users in Endpoint Protector

We are constantly making improvements in Endpoint Protector so please ensure you are using the latest server and client versions to take full advantage of the features and enhancements.
Was this article helpful?
YES NO
Can you please tell us how we can improve this article.
Thank you for your feedback!