​MetaDefender ICAP Server v4.7.3 Release

Product Overview

OPSWAT MetaDefender ICAP Server is the Internet Content Adaptation Protocol (ICAP) connector to our industry-leading Deep Content Disarm and Reconstruction (Deep CDR), Multiscanning, File-Based Vulnerability Assessment, Proactive Data Loss Prevention (Proactive DLP) and Threat Intelligence technologies. Designed to protect network appliances and storage devices against advanced threats in network traffic.

New In This Release

MetaDefender ICAP Server 4.7.3 is a maintenance release providing minor improvements and fixes.

For further details see the Release Notes.

Export ICAP History

MetaDefender ICAP Server v4.7.3 supports exporting Dashboard > ICAP History to CSV.

All (even hidden on an other page) entries are exported that fulfill the currently configured filter condition.

First violation placeholder for custom block pages

ICAP Server block page placeholder for violations (%%%violations%%%) can be a quite long list in certain cases as different engines might use different names for the same threat. ICAP Server 4.7.3 introduced the new placeholder %%%violations_short%%%, which contains only the first violation.

For further details about customizing the block page and about available placeholders please see the 3.8 Customizing the block page section in the user guide.

Erroneous blocking of empty files fixed

In case of multi-part HTTP messages (HTML forms, for example) ICAP Server tried to scan even the empty parts (e.g. a file upload input that does not contain a file). In certain cases this resulted in blocking the message even if there was no malicious content in the requests. The problem was caused by Core 4.17.0 (and newer) that blocks empty files.

This is fixed now, ICAP Server won't send empty files for scanning, no matter what Core does.

For more information, please contact one of our cybersecurity experts.

Sign up for Blog updates!
Get information and insight from the leader in advanced threat prevention.