06-16-2011 04:36 AM
We have the same problem.
We use Juniper to connect to our client VPN and we keep our antivirus up to date, hence now we can not access our client servers / network / business application.
Any awake at Juniper to address this?
06-23-2011 07:14 AM
ya, this is getting REALLY annoying. v15 has been out for months and they still don't support it. I even have a support ticket open with them that is getting nowhere. This affects a few AV products we allow that have recently been updated
06-23-2011 07:37 AM
Yeah.. Opening tickets for these never really seems to get anywhere.. Half the time they want us to go through all this logs gathering and stuff that's a real pain when you need a remote rep to do it all. In the end they almost always say the version is not supported and we have to wait for an updated ESAP. Rarely have they said "it will be in the next update."
We tell all our users when they get setup to turn off the Application auto-updates but make sure to leave on the pattern updates, and then always check our Knowledgebase article before doing any manual updates... Alot of them still update anyway, but we try.
06-24-2011 09:16 AM
JTAC has had recent communications with OPSWAT regarding support for McAfee VirusScan v15 and they have confirmed that this has already been included in the OPSWAT package they will be releasing next Thursday which Juniper will then release with ESAP 1.7.4. ESAP 1.7.3 was just released last week and was posted to the support site yesterday, so I would look for ESAP 1.7.4 to be available the last week of July.
09-06-2011 11:17 AM
We download every night from https://download.juniper.net/software/av/uac/epupd
09-07-2011 05:33 AM
Have you updated the ESAP package which you can get from https://www.juniper.net/support/products/esap/ ? This contains the 3rd party applications you can use Host Checker to test for, the ESAP 1.7.4 Release Notes show
"[McAfee] McAfee VirusScan 15.x" was aded in that version. Once this version or later is loaded you should see VirusScan 15.x in the McAffee section when you create a new Predefined Antivirus HC Policy.
The epudate file contains the anti-virus definitions so you can check if the AV product on the client has updated it's definitions.
04-21-2014 11:04 AM
We at OPSWAT are aware that consumption of OESIS Framework updates by Juniper (and other partners) for inclusion in Hostchecker features released to end customers can be painful for Juniper and for its customers.
We are committed to releasing OESIS more frequently (currently weekly, with a goal of daily updates by end of 2014) and to make it easier for Juniper to validate OESIS releases and incorporate into their packages.
In addition, OPSWAT recently released a configurable client, GEARS, which auto-updates OESIS and stores endpoint device compliance status in the Windows Registry or Mac OS p-list.
The Host Checker can access and use this information through implementing either a (1) the default Antivirus Rule or (2) a custom process / registry checks.
A Hostchecker-GEARS configuration guide is posted at http://files.cdn.opswat.com/www.opswat.com/files/g
Using GEARS together with Hostchecker should reduce the number of issues you encounter with your end users being blocked due to their running an unrecognized endpoint security application.