How to Install Zeek on Linux

MM0X
Posted:
June 24, 2025
Home
Posts
Cybersecurity
How to Install Zeek on Linux
Contents

In this guide, we will take you through the steps to install Zeek, a powerful network analysis tool, on a native Linux environment. Zeek is widely used for security monitoring and network traffic analysis. We’ll cover the installation process from updating packages, installing dependencies, to downloading, compiling, and configuring Zeek on your Linux machine.

Step 1: Update Ubuntu Packages

Open your terminal and run the following commands to update the package list and upgrade the installed packages to the latest versions:

Step 2: Install Dependencies for Zeek

To install Zeek, you’ll need several dependencies. Run the following command in the terminal to install them:

Step 3: Download and Install Zeek

Download Zeek from the official source by running the following command in the terminal:

Extract the Zeek archive:

Navigate to the extracted folder:

Compile Zeek:

Run the following commands to compile and install Zeek:

This step may take some time as Zeek is being compiled from source.

Note: During the installation of Zeek, you may encounter some errors that require you to manually add #include <cstdint> in the following files. Be sure to follow any on-screen instructions to resolve these errors.

Some network security related content you should check to gain necessary skills:

Step 4: Configure Zeek

Set the Zeek PATH:

  • You need to add Zeek to your system’s PATH variable so that you can run it from any directory. Open the .bashrc file in your home directory:

Add the following line to the end of the file:

Save and exit the file

Apply the changes:

We already published a blog post about detect Fileless Malware with Zeek, if might helpful for you.

Step 5: Test Zeek Installation

To verify that Zeek is installed correctly, run:

If installed properly, this command will display the installed version of Zeek.

By following these steps, you should have Zeek successfully installed and configured on your Linux machine, ready for network traffic analysis.

Share
letsdefend description card

You might also be interested in ...

Start learning cybersecurity today