CLEANACCESS Archives

November 2007

CLEANACCESS@LISTSERV.MIAMIOH.EDU

Options: Use Monospaced Font
Show Text Part by Default
Show All Mail Headers

Message: [<< First] [< Prev] [Next >] [Last >>]
Topic: [<< First] [< Prev] [Next >] [Last >>]
Author: [<< First] [< Prev] [Next >] [Last >>]

Print Reply
Subject:
From:
"Osborne, Bruce W. (NS)" <[log in to unmask]>
Reply To:
Cisco Clean Access Users and Administrators <[log in to unmask]>
Date:
Fri, 23 Nov 2007 14:58:42 -0500
Content-Type:
text/plain
Parts/Attachments:
text/plain (27 lines)
Max,
 
Cisco uses a third party kit to detect Antivirus. Cisco has to wait for _that_ company to support the new version before it can be supported in Clean Access. 
 
With the agent installed, you will notice a whole directory of dlls from this. Cisco does not need to maintain the old-style checks, but support for new versions is delayed.
 
Bruce Osborne
Liberty University

________________________________

From: Cisco Clean Access Users and Administrators on behalf of Caines, Max
Sent: Fri 11/23/2007 12:39 PM
To: [log in to unmask]
Subject: [CLEANACCESS] AV checks


Hi
 
I've got various students here who have installed MacAfee 12 and are complaining that Clean Access doesn't recognize it. Given that this happens quite often when new AV versions are released, I wondered if the developers had considered giving CCA the option of using WMI calls to Security Center to check AV status? It's a similar idea to using WSUS checks for Windows security patches instead of the Cisco-supplied rules. It would have the advantage that while AV suppliers don't always seem to be bothered about Clean Access, they all make sure that Security Center recognizes their products
 
Max Caines
IT Services, University of Wolverhampton
Wolverhampton, West Midlands WV1 1SB
Tel: 01902 322245 Fax: 01902 322777
 

ATOM RSS1 RSS2