10. OPSWAT Media Validation Agent
The OPSWAT Media Validation Agent (OMVA) is a lightweight tool that is deployed on Windows endpoints ensuring that no media can be mounted that has not been first processed by MetaDefender Kiosk.
With the media manifest feature enabled, after media is processed by MetaDefender Kiosk, it will contain a media manifest that is digitally signed and hashes of all the clean and approved files.
When an endpoint has the
OMVA
installed, any media that is inserted is first checked for a valid digital signature from the Kiosk and then a hash check is performed verifying that the contents of the media have not been altered.
Limitations: encrypted devices supported by Kiosk are not supported by OMVA.
Supported Operating Systems
OMVA is supported on the following operating systems (32\64 bit):
-
Windows XP
-
Windows Vista
-
Windows 7
-
Requires Service Pack 1 and Microsoft updates KB2533623 and KB3033929
-
-
Windows 8
-
Windows 8.1
-
Windows 10
-
Windows Server Small Business Server standard FE (version: 2011 Standard)
-
Requires KB2533623 installed (http://go.microsoft.com/fwlink/p/?linkid=217865)
-
-
Windows Server 2008 R2*
-
Windows Server 2012*
-
Windows Server 2012 R2*
-
Windows Server 2016*
*Any server OS requires KB4474419 installed (https://support.microsoft.com/en-us/help/4474419/sha-2-code-signing-support-update)
Installing the Agent
Run the .msi obtained from the Kiosk Resources page on the Windows endpoint.
Note:
The Agent must be provided with the certificates it should consider trusted.
The Agent will look in %ALLUSERSPROFILE%\OPSWAT\.ssh\ to locate all trusted certificates.
If the trusted certificate is not in the directory, the Agent can also verify certificate trust if the root Certificate Authority certificate is installed.
OPSWAT recommends automating the deployment and installation of trusted certificates to the client using an AD Push or similar technique.
A Certificate Authority certificate can also be installed for an individual end-point by copying the .crt file over, right clicking on it, and selecting "Install Certificate."
Usage / Verification of the Media
Insert the media to the endpoint, automatically, the Validation Agent will begin checking the media, it performs the following steps:
-
Looks for an OPSWAT Media Manifest file on the media
-
Checks to make sure the Certificate that signed the media manifest is trusted
-
Checks each file on the removable media against the media manifest to make sure it has not been modified
Result
If the manifest if found to have all files on the media recorded and unmodified, the media will be allowed to be accessed on the endpoint.
If the manifest is found to be invalid or files on the media are found to be missing/modified from the manifest, the media will be blocked from being accessed on the endpoint.
The Validation Agent takes an "all-or-nothing" approach.
Any invalid file or manifest will result in the entire media being blocked.
There is no access to a subset of valid files.
Configuration of the Agent
Registry configuration: HKLM\SOFTWARE\OPSWAT\OPSWAT-OMVA
Key |
Type |
Description |
days_trusted |
REG_SZ |
The maximum days to use a media manifest result
|
Uninstalling the Agent
Uninstalling the agent requires the password: " Opswat1234! " to successfully complete.
Modifying the uninstall password
Run OPSWAT-OMVA-Tool.exe obtained from the Kiosk Resources page before installing OMVA on endpoints.
Enter in the new password to configure.
Click "Generate" to create a new filename for the OMVA installer.
Download the new OMVA installer from the Resources page.
Copy the "New File Name" and rename the installer.
Installing this renamed file on all endpoints will ensure the uninstall password adheres to what was configured in the tool.
To update existing installations, the previous OMVA must be uninstalled with the default password.
Then install the newly renamed OMVA installer.