This product includes software developed by the OpenSSL Project for use in the OpenSSL Toolkit (http://www.openssl.org/). Copyright © 1998-2020 The OpenSSL Project. All rights reserved.

This product includes cryptographic software written by Eric Young ([email protected]). Copyright © 1995-1998 Eric Young ([email protected]). All rights reserved.

For further copyright information, check the license files in the following locations:

  • /opt/f-secure/linuxsecurity/doc/3rd-party/*/*
  • /var/opt/f-secure/baseguard/installed/hydra/license*.txt
  • /var/opt/f-secure/baseguard/installed/fmlib/license*.txt
  • /var/opt/f-secure/baseguard/installed/aquarius/LICENSE.*

For details on the latest release of F-Secure Linux Security 64, see the change log on F-Secure Community.

F-Secure Linux Security 64 provides an integrated, out-of-the-box security solution with strong real-time protection against viruses and potentially unwanted applications. It also includes host intrusion prevention (HIPS) functionality that provides protection against unauthorized system modifications, userspace and kernel rootkits. The solution can be easily deployed and managed using F-Secure Policy Manager.

Main features in this release

  • New on-access scanner for continuous protection.
  • New system integrity checker for protection against unauthorized system changes.
  • Support for manual scanning of files.
  • Configurable automatic updates.
  • Support for management using F-Secure Policy Manager.

System Requirements

F-Secure Linux Security 64 should be installed on a computer that meets the following minimum system requirements:

  • Processor: Intel i686 compatible CPU
  • Memory: 1024 MB RAM
  • Disk space: At least 3GB recommended

Having a sufficient swap memory is highly recommended.

Supported platforms

Linux Security 64 supports the following Linux distributions:

  • CentOS 7 (7.3 or newer)
  • CentOS 8
  • CentOS Stream
  • RHEL 7 (7.3 or newer)
  • RHEL 8
  • SUSE Linux Enterprise Server 12
  • SUSE Linux Enterprise Server 15
  • Oracle Linux 7 (7.3 or newer)
  • Oracle Linux 8
  • Amazon Linux 2
  • Debian 9
  • Debian 10
  • Ubuntu 16.04
  • Ubuntu 18.04
  • Ubuntu 20.04
Discover More help  F-Secure Policy Manager Proxy 15.10, Linux version

All minor versions of the listed major releases are supported, except explicitly mentioned exceptions.


Linux Security 64 requires the following packages to be installed before installing the product:

CentOS 7, RHEL 7, Oracle Linux 7, and Amazon Linux

  • fuse-libs
  • libcurl
  • python

CentOS 8, CentOS Stream, RHEL 8, Oracle Linux 8

  • fuse-libs
  • libcurl
  • python36

SUSE Linux Enterprise Server

  • libfuse2
  • libcurl4
  • python3

Debian 9 and Ubuntu 16.04

  • libfuse2
  • libcurl3
  • python

Debian 10 and Ubuntu 18.04

  • libfuse2
  • libcurl4
  • python

Ubuntu 20.04

  • libfuse2
  • libcurl4
  • python3


To install Linux Security 64, you first need to create an installation package using Policy Manager, then use that installation package to install the product on the target machine.

Note that you will need Policy Manager version 14.20 to install and manage Linux Security 64.

Create the installation package
  1. In Policy Manager Console, select Tools > Installation packages from the menu.
  2. Click Import.
  3. Select the Linux Security 64 installation package that you want to use, then click Import.
  4. Select the imported installation package in the packages list and click Export.
  5. Enter a name and select a folder for the exported zip file.
  6. Click Next.
  7. Enter your license keycode for the product, then click Next.
  8. Enter the Policy Manager Server address:
    • If the installation package is for computers that are centrally managed through Policy Manager, enter the address for your Policy Manager Server and modify the ports to use for both HTTP and HTTPS communication if necessary.
    • If the installation package is for stand-alone deployment on computers that are not connected to Policy Manager, enter as the Policy Manager Server address.
  9. Click Finish.
Create the content package for isolated hosts
To install F-Secure Linux Security 64 in an isolated environment with limited network connectivity, you need to prepare an additional content package for the product installer.

Note: To generate the content package, use a computer that has network access to F-Secure servers and has Policy Manager Server installed.

The installation package that you create using Policy Manager Console installs the latest available version of the product by downloading it over the network. Skip these steps if you are only deploying the installation package to hosts that can connect to the network to download data during installation.

The additional package for isolated hosts provides the necessary components that are usually downloaded from the network during installation. Use this with the installation package on each isolated host to which you deploy the product.

To create the content package:

    1. Open a command line.
    2. Select the directory where you want to extract the Policy Manager definitions update tool.
    3. Run the following command to extract the definitions update tool:
    4. Open the following file in a text editor: <DIR>/fspm-definitions-update-tool/conf/channels.json.
    5. Edit the file so that it includes the following content:[
    6. Make sure that the <DIR>/fspm-definitions-update-tool/data/ directory is empty or does not exist, then run the following command to create the content package:<DIR>/fspm-definitions-update-tool/fspm-definitions-update-tool

The output for this command is similar to the following example:

The last line of the output shows the path for the product content package.

Deploy and install the product
  1. Copy the exported zip installation package to the Linux hosts in your network.
  2. Install the product on each host:
    1. Log in to the Linux host as root.
    2. Check that the required dependencies are installed:
    3. Extract the installation package that you exported from Policy Manager Console to a fresh, empty directory.
    4. Run the installation command:
  • CentOS 7, RHEL 7, Oracle Linux 7, Amazon 2: fuse-libs, libcurl, python
  • CentOS 8, CentOS Stream, RHEL 8, Oracle Linux 8: fuse-libs, libcurl, python36
  • SUSE Linux Enterprise Server: libfuse2, libcurl4, python3
  • Debian 9, Ubuntu 16.04: libfuse2, libcurl3, python
  • Debian 10, Ubuntu 18.04: libfuse2, libcurl4, python
  • Ubuntu 20.04: libfuse2, libcurl4, python3
  • To install the latest version of the product over the network, run:bash f-secure-linuxsecurity/f-secure-linuxsecurity-installer
  • To install the product on an isolated host using a content package (f-secure-updates.zip), run:bash f-secure-linuxsecurity/f-secure-linuxsecurity-installer –package=/PATH/TO/f-secure-updates.zip –automatic-updates=none


You can uninstall the product from the command line.

  1. Log in to the Linux host as root.
  2. Run the uninstallation command:
    1. RHEL-based distributions: rpm -e f-secure-linuxsecurity
    2. Debian-based distributions: dpkg -r f-secure-linuxsecurity

Source : Official F-Secure Brand
Editor by : BEST Antivirus KBS Team

How useful was this post?

Click on a star to rate it!

Average rating / 5. Vote count:

No votes so far! Be the first to rate this post.

(Visited 1 times, 1 visits today)