F-Secure Linux Security 64 provides an integrated, out-of-the-box security solution with strong real-time protection against viruses and potentially unwanted applications. It also includes host intrusion prevention (HIPS) functionality that provides protection against unauthorized system modifications, userspace and kernel rootkits. The solution can be easily deployed and managed using F-Secure Policy Manager.
Linux Security 64 Download
Main features in this release
- New on-access scanner for continuous protection.
- New system integrity checker for protection against unauthorized system changes.
- Support for manual scanning of files.
- Configurable automatic updates.
- Support for management using F-Secure Policy Manager.
Linux Security 64 supports the following Linux distributions:
- CentOS 7
- RHEL 7
- Oracle Linux 7
- Amazon Linux 2.0
- Debian 9
- Ubuntu 16.04
- Ubuntu 18.04
Linux Security 64 requires the following packages to be installed before installing the product:
CentOS, RHEL, Oracle Linux, and Amazon Linux
Debian and Ubuntu 16.04
To install Linux Security 64, you first need to create an installation package using Policy Manager, then use that installation package to install the product on the target machine.
Note that you will need Policy Manager version 14.20 to install and manage Linux Security 64.
- Create the installation package:
- In Policy Manager Console, select Tools > Installation packages from the menu. This opens the Installation packages window.
- Click Import.
- Select the Linux Security installation package you want to use and click Import.
- Select the imported installation package in the packages list and click Export.
- Specify a name and a folder for the exported zip file. A Remote Installation Wizard window will appear.
- Click Next.
- Enter your license keycode for the product and click Next.
- Adjust the address of your Policy Manager Server and its HTTP and HTTPS ports if necessary, then click Finish.
- Install the product:
- Log into the Linux host as
- Copy the exported zip file to the Linux host in your network.
- Make sure that you have the prerequisites installed (refer to the dependencies listed above).
- Extract the zip file into an empty directory.
- Run the following command:
- Read and accept the license terms when prompted.
- After the installation process finishes, Policy Manager Console will shortly show the Linux host in Pending hosts list.
You can uninstall the product from the command line.
- Log in to the Linux host as
- Run the uninstallation command:
- RHEL-based distributions:
rpm -e f-secure-linuxsecurity
- Debian-based distributions:
dpkg -r f-secure-linuxsecurity
- CSLP-3319: Manual scanning cannot be invoked from Policy Manager Console.
- CSLP-3320: Scheduled scanning reports do not contain checksums of the detected files.
- CSLP-3321: Scheduled scanning reports do not contain engine names and versions.
- CSLP-3322: Command-line and scheduled scanning also applies malware actions to files that are part of integrity checker baseline.
- CSLP-3323: Manual channel updates cannot be triggered from Policy Manager Console.
- CSLP-3289: All alerts are not mirrored in the system log.
- CSLP-3327: Removing the product does not stop or remove f-secure-linuxsecurity-scand service.