Linux Security 64 Change Log
Linux Security 64 Beta Release Notes
Major Features in this Release
This is a beta release of Linux Security 64. This release introduces a new on-access scanner for continuous protection against viruses and potentially unwanted applications. In addition, Linux Security 64 features a system integrity checker for protection against unauthorized system modifications. The product also supports manual scanning of files.
Linux Security 64 supports the following Linux distributions:
- CentOS 7
- RHEL 7
- Oracle Linux 7
- Amazon Linux 2.0
- Debian 9
- Ubuntu 16.04
- Ubuntu 18.04
Linux Security 64 requires the following packages to be installed before installing the product:
CentOS, RHEL, Oracle Linux, and Amazon Linux
Debian and Ubuntu 16.04
Installing Linux Security 64 happens by first creating an installation package using Policy Manager and installing the product from the newly-created installer on the target machine.
Please, note that you will need the Policy Manager version 14.20 to be able to install and manage Linux Security 64.
Configure the Policy Manager Server to use F-Secure beta GUTS2 server:
- Log into a host with Policy Manager Server 14.20.
- Stop Policy Manager Server by running
systemctl stop fspms.
- Remove everything from
- Open file
-Dguts2ServerUrl=<A href="http://guts2tp.sp.f-secure.com" target="_blank" rel="noopener noopener noreferrer">http://guts2tp.sp.f-secure.com</A>to additional_java_args config parameter.
- Start Policy Manager Server by running
systemctl start fspms
Create the installation package:
- In Policy Manager Console, select Tools > Installation Packages from the menu. This opens the Installation Packages window.
- Click import.
- Select Linux Security installation package you want to use and click Import.
- Select the imported installation package in the packages list and click Export.
- Specify a name and a folder for the exported zip file. A Remote Installation Wizard window will appear.
- Click Next.
- Enter your license keycode for the product and click Next.
- Adjust the address of your Policy Manager Server and it’s HTTP and HTTPS ports if you need and click Finish.
Copy the exported zip file to the Linux host in your network.
Install the product:
- Log into the Linux host as root.
- Make sure you have the prerequisites installed (refer to dependencies section above).
- Extract the zip file into an empty directory.
- Run the following command:
- Read and accept the license terms when prompted.
- After the installation process finishes, Policy Manager Console will shortly show the Linux host in Pending hosts list.
You can uninstall the product from the command line.
- Log in to the Linux host as root.
- Run the uninstallation command:
- RHEL-based distributions:
rpm -e f-secure-linuxsecurity
- Debian-based distributions:
dpkg -r f-secure-linuxsecurity
- CSLP-3285: Manual and scheduled scanning are present on the GUI but currently are not operational. You can use the “fsanalyze” command to perform manual scanning from the command line.
- CSLP-3288: Fsdiag generation does not work from the GUI. Use the command-line tool directly on the node, instead.
- CSLP-3286: The update service currently does not generate alerts in case of failures.
- CSLP-3291: Service status and statistics are currently not displayed in the policy manager UI.
- CSLP-3289: Alerts are not mirrored in the system log.
- CSLP-3292: Specifying special files or files in /proc and /sys in manual scanning may hang the product.
- CSLP-3293: Debian-based systems are shown as "Unknown" in the Policy Manager Console.
- CSLP-3309: Uninstall leaves 'fsaccd' process running. As a workaround, kill the fsaccd main process manually.
A re-install will fail if the process is still running.