OPSWAT Media Validation Agent

The OPSWAT Media Validation Agent (OMVA) is a lightweight tool that is deployed on Windows endpoints ensuring that the contents of media can only be accessed if it has been processed & allowed by MetaDefender Kiosk. With the media manifest feature enabled, after media is processed by MetaDefender Kiosk, it will contain a media manifest that is digitally signed and hashes of all the clean and approved files. When an endpoint has OMVA installed, any media that is inserted is first checked for a valid digital signature from the Kiosk and then a hash check is performed verifying that the contents of the media have not been altered.

Encrypted devices supported by Kiosk are not supported by OMVA

Supported Operating Systems

OMVA is supported on the following operating systems (32\64 bit):

  • Windows XP SP3

  • Windows Vista

  • Windows 7

    • Requires Service Pack 1 and Microsoft updates KB2533623 and KB3033929
  • Windows 8

  • Windows 8.1

  • Windows 10

  • Windows 11

  • Windows Server Small Business Server standard FE (version: 2011 Standard)

  • Windows Server 2008 R2*

  • Windows Server 2012*

  • Windows Server 2012 R2*

  • Windows Server 2016*

  • Windows Server 2019*

  • Windows Server 2022*

Installing the Agent

The OMVA installer can be obtained from the Kiosk Resources page or My OPSWAT. Run the .msi obtained on the Windows endpoint.

The Agent must be provided with the certificates it should consider trusted. The Agent will look in %ALLUSERSPROFILE%\OPSWAT\.ssh\ to locate all trusted certificates.

If the trusted certificate is not in the directory, the Agent can also verify certificate trust if the root Certificate Authority certificate is installed. OPSWAT recommends automating the deployment and installation of trusted certificates to the client using an AD Push or similar technique. A Certificate Authority certificate can also be installed for an individual end-point by copying the .crt file over, right clicking on it, and selecting Install Certificate.

Usage / Verification of the Media

Insert the media to the endpoint.

The Validation Agent will begin checking the media according to these steps:

  1. Looks for an OPSWAT Media Manifest file on the media
  2. Checks to make sure the Certificate that signed the media manifest is trusted
  3. Checks each file on the removable media against the media manifest to make sure it has not been modified

Result of Verification

If the manifest is found to have all files on the media recorded and unmodified, the media will be allowed to be accessed on the endpoint:

If the manifest is found to be invalid or files on the media are found to be missing/modified from the manifest, the media will be blocked from being accessed on the endpoint:

The Validation Agent takes an "all-or-nothing" approach. Any invalid file or manifest will result in the entire media being blocked. There is no access to a subset of valid files.

Logging

OMVA logs JSON formatted messages of its operation. This can be used to determine the validation ran on the system and identify any media that was blocked. Logging can be found in the OMVA install directory: %PROGRAMFILES(X86)%\OPSWAT\OPSWAT OMVA\LOG\omva_logs.json

When extracting logs from the file, the JSON objects must be wrapped within square brackets "[ ]" to allow for proper parsing.

log JSON object structure
Copy
Event CodeDescriptionNotes
0Validation begin - USB insertedcontains additional user_data string field in the json message
1File result error
2Validation end - Media validation result
3Signature Result
sample logging
Copy

Configuration of the Agent

Registry configuration:

For Wins 32 bit: HKLM\SOFTWARE\OPSWAT\OPSWAT-OMVA

For Wins 64 bit: HKLM\SOFTWARE\WOW6432Node\OPSWAT\OPSWAT-OMVA

KeyTypeDescription
days_trustedREG_SZ or REG_DWORDThe maximum days to use a media manifest result If blank or omitted, the manifest is trusted forever

Uninstalling the Agent

Uninstalling the agent requires the password: Opswat1234! to successfully complete

OMVA Tool

Run OPSWAT-OMVA-Tool.exe obtained from the Kiosk Resources page before installing OMVA on endpoints.

Enter in the new password to configure. Click Generate to create a new filename for the OMVA installer. Download the new OMVA installer from the Resources page. Copy the New File Name and rename the installer. Installing this renamed file on all endpoints will ensure the uninstall password adheres to what was configured in the tool.

When the "Enable boot protection" __option __is checked, the OMVA application block access to any external removable media drives that are connected before the system boots up.

To update existing installations, the previous OMVA must be uninstalled with the default password. Then install the newly renamed OMVA installer.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard