5.8. OPSWAT Client for Redhat-based Linux (Persistent client)

Known issues on Linux client version 15.6.x.0:

  • To upgrade to this version from version 15.x.y.1/14.x.y.0, a user needs to uninstall old Linux client version and reinstall this version

  • The client doesn't have UI/tray icon, the client only supports command line

15.6.31.0: April 21, 2021

  1. OPSWAT Client only reports applications in categories enabled in a policy if an account turns on privacy setting for applications

  2. Bugs fixed:

    • the client reported a wrong user login ID when there is no user logged into a device

  3. Built-in SDK signature version: 4.3.1542.0

15.6.24.0: April 08, 2021

  1. Enhancement

    • Update blacklist for device identifier.

  2. Built-in SDK signature version: 4.3.1498.0

15.6.21.0: March 16, 2021

  1. The agent auto-upgrades SDK based on the SDK auto-upgrade setting on an account

  2. Bugs fixed:

    • The client didn't stop custom check when the script is timeout

  3. Built-in SDK signature version: 4.3.1304.0

15.6.20.0: February 02, 2021

  1. Minor enhancement:

    • Now support both runwhile and runone options in the command line. The client will exit if either the client has done the first device compliance check or conditions in runwhile option meet

  2. Built-in SDK signature version: 4.3.1532.0

15.6.19.0: December 22, 2020

  1. Support custom check based on a policy

  2. Built-in SDK signature version: 4.3.1304.0

15.6.17.0: October 29, 2020

  1. Fixed: the client consumed high CPU sometimes.

  2. Built-in SDK signature version: 4.3.1210.0

15.6.15.0: September 29, 2020

  1. Built-in SDK signature version: 4.3.1210.0

15.6.12.0: August 18, 2020

  1. Add a signature to a cross-domain API's response to allow 3rd party validate the API response if it comes from OPSWAT Client

  2. Built-in SDK signature: 4.3.1117.0

15.6.11.0: July 07, 2020

  1. Bugs fixed

    • The agent could not connect to the server after it disconnected to the server for a long time

    • The client reports the same device ID on some devices

  2. Built-in SDK signature: 4.3.1089.0

15.6.10.0: June 02, 2020

  1. The client can now upgrade product definition SDK separately

  2. Bugs fixed

    • The agent could not enroll in an account on a cloned Suse 12 machine.

    • The agent did not report device type in compliance reports

  3. Built-in SDK signature: 4.3.1055.0

15.6.9.0: April 28, 2020

  1. Bugs fixed

    • The agent reported the same device ID for devices that cloned from a same golden image

  2. Built-in SDK signature: OESIS 4.3.1017.0

15.6.7.0: March 24, 2020

  1. Updated a certificate for cross-domain API

  2. Built-in SDK signature: 4.3.938.0

15.6.6.0: February 11, 2020

  1. Bugs fixed

    • The agent consumed high CPU sometimes

  2. Built-in SDK signature: 4.3.914.0

15.6.5.0: January 07, 2020

  1. Built-in SDK signature: 4.3.859.0

Known issues:

  • To upgrade to this version from version 15.x.y.1/14.x.y.0, a user needs to uninstall old Linux agent version and reinstall this version

  • The agent doesn't have UI/tray icon, the agent only supports command line

15.6.4.0: November 26, 2019

  1. Built-in SDK signature: 4.3.812.0

15.6.3.0: October 22, 2019

  1. Bugs fixed

    1. A user couldn't use sudo command after running the client for a while

  2. Built-in SDK signature: 4.3.758.0

15.6.2.0: September 17, 2019

  1. Bugs fixed

    1. Couldn't detect some encryption products

  2. Built-in SDK signature: 4.3.714.0

15.6.1.0: September 10, 2019

  1. Auto-upgrade itself based on agent auto-update settings on the cloud

  2. Support cross-domain API

  3. Has capability to report installed applications and application settings

  4. Built-in SDK signature: OESIS 4.3.656.0

14.0.41.0: September 10, 2018

  • Fixed reporting encryption status for /home partition.

14.0.24.0: December 01, 2015

  • Fixed firewall status detection issue for IPTable product

14.0.8.0: September 15, 2015

This is the first release. The agent is able to

  • Enroll a device to a given account

  • Report running processes

  • Report installed packages

  • Report compliance data

  • Perform an IP connection and running processes scan with Metadefender Cloud

  • Be installed from the command line (apt-get, yum) or from installer package