Security How to install (Linux)
Introduction
The installation procedure consists of the following three steps.
- Uninstall other installed anti-virus software
- Download the installer
- Execute the installer
Administrator privileges on your computer are required for installation, so please check the administrator privileges account and password in advance. Please note that the computer administrator account is different from the account issued by the Information and Media Center.
Uninstall other installed anti-virus software
Before installing F-Secure Computer Protection, uninstall another anti-virus software that has already been installed (including F-Secure with a different version). If another anti-virus software is installed, the installation may fail or the operation may become unstable.
- How to uninstall for Symantec Endpoint Protection
- How to uninstall for F-Secure Computer Protection (Linux)
Download the installer
You can download the installer from the link below. To download the installer, you need to authenticate with an account issued by the Information and Media Center.
Execute the installer
- Connect the computer to be installed to the network and log in with administrator (root) privileges.
- Make sure you have the required dependencies installed.
CentOS 7, RHEL 7, Oracle Linux 7, Amazon 2 | fuse-libs、libcurl、python |
---|---|
CentOS 8, RHEL 8, Oracle Linux 8 | fuse-libs、libcurl、python36 |
AlmalLinux 9, RHEL 9 | libcurl、python3 |
SUSE Linux Enterprise Server 12 | libfuse2、libcurl4、python3 |
Debian 10, Ubuntu 18.04 | libfuse2、libcurl4、python |
Debian 11, Ubuntu 20.04 | libfuse2、libcurl4、python3 |
Ubuntu 22.04 | libcurl4、python3 |
3. Create a directory for package extraction and extract the downloaded installer package.
unzip fsls64-(version number).zip
4. Execute the installation command.
bash f-secure-linuxsecurity/f-secure-linuxsecurity-installer
Other information
The anti-virus software can be configured from the command line. Please refer to this guide for the procedure.
If a file is detected as malware, ".malware" is added to the end of the file name (e.g., "file" is renamed to "file.malware"). In addition, the following log is output to Syslog.
Apr 5 11:37:55 hostname lspmd-start[943]: alert [source=oas; type=detection]: path=/home/hoge/Downloads/eicar.com; action=rename; infection=EICAR_Test_File