With the release of Metascan version 3.2.0, custom post actions are now available for your unique solution's needs.
Using post actions, you can now configure Metascan to run custom scripts after completing a file scan. This will allow you to adapt the actions taken for both clean and infected files. Example use cases are:
- Sending an alert when a threat is detected such as a syslog or an email notification
- Pushing clean files to a specific location
(e.g. a folder on an FTP server or onto your local network)
Other post action use case examples and sample code are available in the OPSWAT knowledge base.
Additionally, Metascan Connector now includes proxy support, allowing it to sync with a Metascan RESTful server even if it's behind a proxy.
Other enhancements included in Metascan3.2.0 include:
- An update to CA scan engine to the latest version, 1.3.1
- Improved handling for large amounts of asynchronous scan requests
- An enhanced command line tool allowing you to easily add custom white and black lists of files
Example of post action usage (click image to enlarge):
If you have an questions or concerns, please submit a support ticket.
