AI-Powered Cyberattacks: How to Detect, Prevent & Defend Against Intelligent Threats

Read Now
We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.

MetaDefender Core v5.4.0 Release

by Ngoc Nguyen, Senior Marketing Manager
Share this Post

Product Overview

OPSWAT MetaDefender Core protects organizations’ web applications, endpoints, and other data sources from advanced cybersecurity threats.

MetaDefender Core leverages proprietary technologies—including Deep Content Disarm and Reconstruction (Deep CDR), Multiscanning, File-Based Vulnerability Assessment, Data Loss Prevention, and Threat Intelligence—to provide comprehensive protection for your networks and infrastructure against increasingly sophisticated malware.

Release Highlights

Central Hub Version 1.1.0

  • For archive processing, extracted child files are shared among MetaDefender Core instances for optimized productivity and boosted performance.
  • MetaDefender Core instances now share authentication sessions using Redis caching server.
  • MetaDefender Core Central Hub now supports batch processing.

Docker Containerization Enhancements

  • Supports MetaDefender Core upgrade with zero down time on containerization environment Kubernetes (blue/green and rolling strategies)
  • Supports MetaDefender Core upgrade with data retention
  • Log rotate service built in Docker base image
  • Supports proxy configuration for Docker run
  • Supports new option to enable "allowCrossIPSessions" when starting MetaDefender Core on container environment

Windows 11 Support

For Microsoft Windows deployments, MetaDefender Core supports the following operating systems:

  • Windows 10, 11
  • Windows Server 2012, 2012 R2, 2016, 2019, 2022

New Configuration: Reject File Submissions Based on Engine Availability

Allow MetaDefender Core to only accept file processing submissions when certain specific engines are available.

To find this setting go to Workflow Rule -> General tab.

New Configuration: Add an Exception to Process Unsupported File Types for Sanitization

When “Block unsupported file types” is enabled, configure an exception list to allow specific unsupported file types. By doing so, those file types configured in the exception list will not be blocked.

To find this setting go to Workflow Rule -> Deep CDR tab.

New Configuration: Set File Size Conditional Limits for Blocklisting File Processing

Configure MetaDefender Core to block file processing for file sizes greater than or less than a specified file size.

To find this setting go to: Workflow Rule -> Blocklist and Allowlist tab.

New Configuration: Skip Processing Fast Symlink in Archive Files

By default, MetaDefender Core will try to process any files, including fast symlink in archives. Administrators now can skip fast symlink process by selecting this option in the workflow rule.

To find this setting go to: Workflow Rule -> General tab.

UI Enhancements

  • Enhance and remediate UI accessibility support and compliance
  • Display backup license status
  • Add sanitized label as an indicator in the processing history
  • Support “search by name" for workflows
  • Add result for vulnerability assessment when "skip hash calculation" setting is enabled
  • Add descriptive tooltip for "Fallback file type detection to current extension if needed" setting
  • Change setting name "Blocklist unsupported file types" to "Block unsupported file types"

Enhancement: Import Full Configuration Package (.zip) with the Ignition File

Better automation support by importing full configuration package (.zip) via the ignition file.

Example:

eula=true [config] import=settings.zip import_password=123 ....

Details: Ignition file.

Enhancement: Webhook Callback Retry Mechanism

Enhanced webhook retry mechanism for resending callback result in case of timeout or not receiving a webhook server’s response.

Define timeout threshold via new transfertimeout key (by default, 30000 ms) with PUT - Webhook set configuration

New CLI Tool: Clean Up Database Created by No-Longer-Used MetaDefender Core Instance in Shared DB Mode

Clean all scan data from MetaDefender Core instance(s) that you no longer use, applicable in the shared DB mode.

Tool located at:

  • Windows: C:\Program Files\OPSWAT\MetaDefender Core\ometascan-db-cleaner.exe
  • Linux: /usr/sbin/ometascan-db-cleaner

Details: Database Cleanup Tool in Shared DB Mode

New CLI Tool: Check Remote PostgreSQL User Compliance

Database system admins can quickly determine if a remote PostgreSQL database has sufficient user privileges as described in PostgreSQL User Privilege Requirements to work properly with MetaDefender Core application.

Details: Remote PostgreSQL User Privileges Checking Tool

Other Enhancements and Updates:

Security enhancements

  • Upgrade third-party libraries (gperftool, libxml2) for vulnerability risk
  • Add support for digest verification in FIPS enabled environment while installing MetaDefender Core

Logging enhancements

  • Prevent misleading (and unharmful) error messages in PostgreSQL logs
  • Add batch ID and data ID information in NGINX access logs
  • Remove misleading warning messages in MetaDefender Core logs while updating engines via folder

Performance enhancements

  • Improve hash lookup performance

For more information, please visit opswat.com/products/metadefender/core or contact our critical infrastructure cybersecurity experts for assistance.

Release Details

Product: MetaDefender Core
Release Date: 4 January 2022
Release Notes: 5.4.0
Download Link on OPSWAT Portal: Download

Stay Up-to-Date With OPSWAT!

Sign up today to receive the latest company updates, stories, event info, and more.