Custom Installations; Preparing For Custom Installation; Unattended Installation - F-SECURE LINUX SECURITY Manual

Table of Contents

Advertisement

3. Enter the keycode to upgrade to the licensed version of the product. Enter the keycode in
the format you received it, including the hyphens that separate sequences of letters and
digits.
After you have entered the keycode, the evaluation version is upgraded to the full version.
To upgrade the evaluation version from the command line, run the following command:
/opt/f-secure/fsav/sbin/convert_to_full_installation.sh
Note: If the evaluation period of the current version of the product has expired before you
upgrade to the full version, you have to restart the product after entering the keycode.

Custom Installations

If you do not want to install stand-alone or centrally managed product with the default options,
you can do a custom install.

Preparing for Custom Installation

The RPM files can be extracted from the installation package if you need to create a custom
installation package.
The product installation package is a self extracting package, which contains the software as
RPMs. The RPM files can be extracted from the package as follows:
1. Type the following command: ./f-secure-linux-security-<version>.<build>
rpm
2. Install RPM packages.
3. Run the following script: /opt/f-secure/fsav/fsav-config

Unattended Installation

In unattended installation mode, you can provide a set of default settings on the installer command
line. This way, you can force the Integrity Checking baseline to be generated as a part of the
installation process.
Use the following command line switch during the installation:
--auto MODE [fspms=FSPMSURL adminkey=/PATH/TO/ADMIN.PUB] lang=en|de|ja
[no]remotewui [no]locallogin user=USER kernelverify|nokernelverify
pass=PASSPHRASE keycode=KEYCODE
F-Secure Linux Security | Installation | 23

Hide quick links:

Advertisement

Table of Contents
loading
Need help?

Need help?

Do you have a question about the LINUX SECURITY and is the answer not in the manual?

Subscribe to Our Youtube Channel

This manual is also suitable for:

Linux security 7.02

Table of Contents