PMT Hps Anti Virus Quick Reference Guide
PMT Hps Anti Virus Quick Reference Guide
RELEASE 9.1
Information contained herein is to be used solely for the purpose submitted, and no part of
this document or its contents shall be reproduced, published, or disclosed to a third party
without the express permission of Honeywell International Sàrl.
While this information is presented in good faith and believed to be accurate, Honeywell
disclaims the implied warranties of merchantability and fitness for a purpose and makes
no express warranties except as may be stated in its written agreement with and for its
customer.
In no event is Honeywell liable to anyone for any direct, special, or consequential damages.
The information and specifications in this document are subject to change without notice.
1.1 Scope
This document identifies Anti-virus software certified for currently supported Windows
based HPS products.
Note:
Due to the transition from McAfee to Trellix in 2023,
McAfee decided to keep the legacy product names
without changing it to the Trellix, and few places in
our SUIT Anti-Virus documents, we could still refer to
McAfee. Kindly ignore the name change (McAfee to
Trellix) and suggested to proceed for further
steps/procedure.
8.60 4/09/2023 Added "Trellix ENS 10.7.0 May 2023 Update (Security
Common 10.7.0.5828, Threat Prevention client
10.7.0.5786), Trellix Agent (5.7.9.139 ) and
ePO_5.10.0_Servicepack1Update1" support to the
"Anti-Virus ENS Certification Matrix".
This includes the DAT files that should be updated by customers independent of
Honeywell’s certification. For customers requiring qualified DAT files, Honeywell provides a
secure automated distribution service to move to site only those DAT files which pass
system testing. Contact your local Account Manager for more information.
McAfee has introduced DAT Reputation feature for the DAT Files. McAfee
included a “Reputation engine” in their repositories starting May 6th. This
NOTE means some binaries will be installed on clients what will check the “cloud”
before installing DAT files.
This engine is included in the DAT file. The McAfee DAT Reputation feature
will be automatically enabled on May 19, 2015 even if the policy is not yet
configured. Honeywell does not recommend the usage of this feature.
Hence, kindly remove this McAfee point product “DAT Reputation Engine”
from the Master repository of the ePO to disable this feature, by default this
feature is not present in the ePO for use.
Procedure to Disable DAT Reputation feature for McAfee unmanaged clients: Open
regedit.exe and navigate to the following registry location:
HKLM\Software\McAfee\DATReputation. Then please make sure that the value named
"dwDisableDATReputation" should be set to 1 (TRUE).
The table in Section Error! Reference source not found. provides certified versions of
the various Anti-Virus software packages and update agents for the supported HPS
releases. To facilitate the use of Anti-Virus software on HPS provided systems,
various versions of specific Anti-Virus software packages have been certified for use
with each release of HPS software. For virtualized systems there is also an option of
using an ESXi host based Anti-Virus solution that does not require Anti-Virus agent
software to be directly installed into each virtual machine.
HPS requires the installation and use of Anti-Virus software on all Windows
based HPS products or use of an ESXi host based solution for Windows
NOTE virtual machines on that host.
Traditional Anti-Virus Is Resource Intensive and not a viable anymore. So, running
endpoints without Anti-Virus is not an option. In comparison to past, emerging needs for
constant
protection has actually increased with the consolidation of data centers because activity at
the endpoint is now closer to critical data and servers than ever before.
The host-based endpoint security solution allows the virus scanner to run at a host level
rather than a virtual machines level. This allows for just one agent per virtualization host
server, thus reducing the number of agents and repositories required to maintain virus
definition files. The solution utilizes a Security Virtual Appliance (SVA) to provide antivirus
services to the associated virtual machines, and this node is delivered as an Open
Virtualization Format (OVF) package for easy deployment. McAfee MOVE (Management
for Optimized Virtual Environments) is the host-based solution qualified by SUIT for
supported HPS Products (product releases as applicable in the certification matrix table)
that are certified to run in virtualized environment protected.
Follow the below link procedure to uninstall the NSX Network introspection
driver.
Link: https://kb.vmware.com/s/article/2149764
3 Anti-Virus Certification
3.1 Overview
Honeywell Certification Policy:
Honeywell periodically evaluates and certifies Anti-Virus software updates for all
supported Windows based HPS Products. This document identifies the current certified
Anti-Virus updates (N) along with the two previously certified releases of the Anti-Virus
updates (N-1, N-2). In some cases, Honeywell may choose to skip Anti-Virus update
certifications where the released updates are too close chronologically, or testing uncovers
issues with an update.
Honeywell certifies the Anti-Virus products with the specific configurations stated in this
document. Any other configurations and/or 3rd party product offerings not specifically
mentioned, including those from McAfee and Symantec are NOT certified by default.
Honeywell will define, test, and certify new Anti-Virus versions released by the
manufacturer no later than six months (180 days) for major releases and three months (90
days) from a minor Anti-Virus update.
Experion PKS R430, R431, and R432 (collectively known as R43x) is now
phased-out, Honeywell AV testing (both McAfee and Symantec) for Experion
ATTENTION R43x releases will continue under the following conditions:
The “Anti-Virus Certification Matrix” in Section 1.2 defines the supported Anti-Virus versions for
the Windows based HPS products.
If a particular HPS Product Release does not appear in the “Anti- Virus
Certification Matrix” Table, please refer to Honeywell Product Support Policy
NOTE or TAC to determine if it is no longer under standard HPS Product. This
document covers only those releases that are under standard HPS support
and does not cover releases that are on special extended or contractual
support.
For virtualized systems, there is also an option of using an ESXi host based
Anti-Virus solution that does not require Anti-Virus agent software to be
NOTE directly installed into each virtual machine.
Symantec has modified the structure of the daily signature file starting from
Symantec End Point Protection Manager (SEPM) 14.3, and the files are not
CAUTION compatible with legacy versions of SEPM (i.e., SEPM 14.0\14.1\14.2).
Starting from 1st January-2022, Honeywell will qualify signatures only for
SEPM 14.3, and will no longer qualify daily signature for legacy versions of
SEPM prior to 14.3 (i.e., 14.0, 14.1, 14.2).
December 2021. Honeywell will cease testing for VSE with Experion PKS
CAUTION
R5xx releases. Honeywell has qualified McAfee Endpoint Security (ENS) for
Experion PKS R51x, and Experion PKS R520. McAfee ENS is the successor
Effective December 31, 2021, Honeywell will cease testing for VSE with Experion PKS
R5xx releases. Honeywell has qualified McAfee Endpoint Security (ENS) for currently
supported releases of Experion PKS, including Experion PKS R50x, Experion PKS
NOTE R51x, and Experion PKS R520. McAfee ENS is the successor to McAfee VSE and
provides new security features, product enhancements and improved agent
performance over McAfee VSE. For the latest qualified build details, please refer the
Section 5.2.1 ENS 10.7.x build information [Nth release] table in the Anti-Virus
Software guide.
Reference information:
• McAfee KB93335:
NOTE
https://kcm.trellix.com/corporate/index?page=content&id=KB93335&actp=
null&viewlocale=en_US&showDraft=false&platinum_status=false&locale=en_US
This document is for quick reference only; refer to the “Anti-Virus Software
Guidelines” document for complete installation, configuration,
CAUTION maintenance, and revision history details.
Table Legend
1. The release number for the Windows based HPS Products listed in the
matrix indicates the latest point release within the supported release
series, which is actively tested with the latest certified Anti-Virus software.
The certification results are however valid to the prior point releases, which
are currently supported even though those are not effectively tested.
4. N/A means Not Applicable. For example, the release has not been tested
with prior versions of Anti-Virus software.
HF1080544, , EPO5xHF1147158,
HF *C EPO5xHF1151890, HF1159675
EPO5xHF1178101, EPO532HF1167013,
HF *D EPO5xHF1179774
4 SM 212.x 1
5 SM 211.x 1
6 SM 210.x 4
7 SM R162.x 7
8 SM R161.x 1
9 SM R153.x 3
10 SM R146.x 5
11 FSC R801.x 1
12 FSC R710.x 9
13 UPS R323.x 2
14 PHD R430.x 1
15 PHD R410.x 1
16 PHD R400.x 1
17 PBM R511.x 1
18 PBM R510.x 3
19 PBM R501.x 3
20 PBM R500.x 2
21 PBM R431.x 4
22 BMA R430.x 4
23 BMA R410.x 6
24 BMA R401.x 5
25 BMA R400.x 4
26 RAE R61X.x 1
29 RAE R700.x 5
30 RAE R701.x 4
31 RAE R702.x 3
32 RAE R703.x 1
33 QCS SE R1XX.x 1
34 PMD R800.x 3
35 PMD R830.x 1
36 PMD R831.x 2
37 PMD R900.x 2
38 PMD R910.x 2
39 PMD R920.x 2
43 CPA R610.x 1
44 CPM R603.x 1
45 CPM R602.x 1
The last supported VSE in ePO server using managed mode is ePO 5.10
update 10. From ePO 5.10 update 11 onwards, users should migrate to ENS
NOTE 10.7.x for manage mode.
1. After January 11th 2023, Honeywell will no longer qualify VSE DAT
file for EPKS R43x releases. Refer KSM20210 42 for more details.
NOTE
2. Broadcom Symantec has made changes in the naming convention
of their daily released signature files. Broadcom Symantec is
sharing signature files in the format “core3sdsi64.jdb/
core3sdssepv5i64.exe” for SEP 14.3 RU4 (Refresh) or prior, and for
SEP14.3 RU5, signature files are being released in the format
“core3sdsn64.jdb/core3sdssepn64v5i64.exe”. SUIT Team will start
sharing signature files for both SEP RU4 and RU5 versions from 1st
December 2022 onwards till 28th February 2023. From 1st March
2023 onwards, SUIT team will stop sharing signature files for SEP
14.3 RU4 and will continue to share signature files only for SEP
14.3 RU5.
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
Experion PKS/EAPP ENS Security Threat
icepack1Update SEP 14.3 RU 7
R511.x Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
Experion PKS/EAPP ENS Security Threat
icepack1Update SEP 14.3 RU 7
R510.x Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
Experion HS R520.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
Experion HS R511.x/R and Agent 5.8.0
510.x ePO_5.10.0_Serv
ENS Security Threat
icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
Anti-Virus Quick Reference Guide 16
ANTI-VIRUS CERTIFICATION
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
SM R212.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
SM and Agent 5.8.0
R211.x/210.x/201.x/200 ePO_5.10.0_Serv
ENS Security Threat
.x/162.x icepack1Update SEP 14.3 RU 7
Common Prevention client
161.x/R160.x/R153.x/R 1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
146.x and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
FSC 801.x/R710.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
LX/PC R520.x
ePO_5.10.0_Serv
ENS Security Threat
icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
Anti-Virus Quick Reference Guide 17
ANTI-VIRUS CERTIFICATION
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
LX/PC R511.x/R510.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
PA ENS Security Threat
icepack1Update SEP 14.3 RU 7
R520.x Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
PA ENS Security Threat
icepack1Update SEP 14.3 RU 7
R511.x/R510.x Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
FDM R520.x
ePO_5.10.0_Serv
ENS Security Threat
icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
Anti-Virus Quick Reference Guide 18
ANTI-VIRUS CERTIFICATION
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
FDM R511.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
EBR R520.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
SH 202.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15
Common Prevention client NA
and Agent 5.7.9
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
SH 201.x/200.x
ePO_5.10.0_Serv
ENS Security Threat
icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
Anti-Virus Quick Reference Guide 19
ANTI-VIRUS CERTIFICATION
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
PHD 430.x
NA NA NA NA
NA NA NA NA
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
PHD 410.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
PHD 400.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
UPS and Agent 5.8.0
R323.x ePO_5.10.0_Serv
ENS Security Threat
icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update
Common Prevention client SEP 14.3 RU 8
2
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
Experion MX/MX Proline ENS Security Threat
icepack1Update
R720.x Common Prevention client SEP 14.3 RU 7
1
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
NA NA NA SEP 14.3 RU 6
ePO_5.10.0_Serv
ENS Security Threat
icepack1update
Common Prevention client SEP 14.3 RU 8
2
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
Experion MX/MX Proline ENS Security Threat
icepack1Update
R704.x Common Prevention client SEP 14.3 RU 7
1
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
SEP 14.3 RU 6
NA NA NA
(Refresh)
ePO_5.10.0_Serv
ENS Security Threat
icepack1update
Common Prevention client SEP 14.3 RU 8
2
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
Experion MX/MX Proline ENS Security Threat
icepack1Update
R703.x Common Prevention client SEP 14.3 RU 7
1
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.8 (Refresh)
10.7.0.5162 10.7.0.5200
ENS Security Threat
ePO 5.10 U13 SEP 14.3 RU4
Common Prevention client
and Agent 5.7.6 (Refresh)
Experion MX/MX Proline 10.7.0.3255 10.7.0.3299
R700.x/R701.x/R702.x ENS Security Threat
ePO 5.10 U12 SEP 14.3 MP1
Common Prevention client
and Agent 5.7.5 (Refresh)
10.7.0.3199 10.7.0.3210
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U11
Common Prevention client SEP 14.3 MP1
and Agent 5.7.4
10.7.0.3012 10.7.0.3113
ENS Security Threat ePO_5.10.0_Serv SEP 14.3 RU 8
Common Prevention client icepack1update (14.3.10148.8000)
10.7.0.6149 10.7.0.6177 2 and Agent
5.8.0
QCS SE R120.x NA NA NA NA
NA NA NA NA
NA NA NA NA
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
icepack1Update SEP 14.3 RU 7
Dynamo M&R R220.x Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
SEP 14.3 RU 6
ENS Security Threat
ePO 5.10 U15 (14.3.9203.6000)
Common Prevention client
and Agent 5.7.9
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
Dynamo M&R R120.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
Dynamo M&R ENS Security Threat
icepack1Update SEP 14.3 RU 7
R20X.x\R21X.x Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
Alarm Manager MoC and Agent 5.8.0
R306 ePO_5.10.0_Serv
ENS Security Threat
icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
CPA R610.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
CPM R603.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
CPM R602.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
APCSuite and Agent 5.8.0
R513.x ePO_5.10.0_Serv
ENS Security Threat
icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
Anti-Virus Quick Reference Guide 24
ANTI-VIRUS CERTIFICATION
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
Profit Suite R502.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ePO_5.10.0_Serv
ENS Security Threat
icepack1update SEP 14.3 RU 8
Common Prevention client
2 (14.3.10148.8000)
10.7.0.6149 10.7.0.6177
and Agent 5.8.0
ePO_5.10.0_Serv
ENS Security Threat
Profit Suite R442.x icepack1Update SEP 14.3 RU 7
Common Prevention client
1 (14.3.9681.7000)
10.7.0.5828 10.7.0.5786
and Agent 5.7.9
ENS Security Threat
ePO 5.10 U15 SEP 14.3 RU 6
Common Prevention client
and Agent 5.7.9 (14.3.9203.6000)
10.7.0.5828 10.7.0.5786
ENS Security Threat
ePO 5.10 U15
Common Prevention client SEP 14.3 RU 6
and Agent 5.7.9
10.7.0.5828 10.7.0.5786
ENS Security Threat
PMD ePO 5.10 U13
Common Prevention client NA
R920.x and Agent 5.7.6
10.7.0.3255 10.7.0.3299
NA NA NA NA
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U13 SEP 14.3 RU1
Common Prevention client
and Agent 5.7.6 (Refresh)
10.7.0.3255 10.7.0.3299
SEP 14.2 RU2
NA NA NA
MP1
PMD
SEP14.2.1.1 (14.2
R900.1x
RU1 MP1)
NA NA NA
FBM520.1/EPKS 511.5 NA NA NA NA
NA NA NA NA
PBM R511.x NA NA NA NA
NA NA NA NA
NA NA NA SEP 12 .1 RU2
PBM R510.x
SEP 12 .1 RU1
NA NA NA
Certified Versions
Trellix Components
HPS Product Releases ENS 10.7.0 Symantec Broadcom
ePO and Agent
Security Platform Threat Prevention
ENS Security Threat
ePO 5.10 U11 SEP 14.3 RU1
Common Prevention client
and Agent 5.7.4 (Refresh)
10.7.0.3012 10.7.0.3113
PBM
NA NA NA SEP 12 .1 RU2
R501.3/EPKS501.6
NA NA NA SEP 12 .1 RU1
https://kcm.trellix.com/corporate/index?page=content&id=KB93773
https://kcm.trellix.com/corporate/index?page=content&id=KB95905
https://kc.mcafee.com/corporate/index?page=content&id=KB87096
Do not install VSE + ASE 8.8 Patch5 & above and ePO Agent 5.0.0 & above
prior to RAE R612.4 & R614.3 point release, RAE application will not work.
CAUTION
For details, Refer QCS Compatibility matrix.
1. Use the Windows key + R keyboard shortcut to open the Run command.
Quick Tip: You can now copy and paste the path in the new Registry's address bar to
quickly jump to the key destination.
4. If you don't see the DisableAntiSpyware DWORD, right-click the Windows Defender
(folder) key, select New, and click on DWORD (32-bit) Value. C
6. Double-click the newly created DWORD and set the value from 0 to 1.
7. Click OK.
After completing the steps, restart your device to apply the settings.
Disabling windows defender can also be enforced using Domain Controller policies.
NOTE
To fully disable submissions and prevent data accumulation follow the below procedure:
1. In the Symantec Endpoint Protection Manager, go to Admin > Servers > Local Site >
Edit Site Properties > Data Collection.
This setting leaves Tamper Protection enabled. However, Tamper Protection will no
longer block attempts to modify SEP files, folders, processes, or Registry values.
NOTE
7. Click OK. Tamper Protection is disabled for clients within this client-group, and for
clients within client-groups that inherit policies from this group. This occurs as
soon as the clients receive the updated policy from the SEPM.
This setting leaves Tamper Protection enabled. However, Tamper Protection will no
longer block attempts to modify SEP files, folders, processes, or Registry values.
NOTE
5. Click OK. Tamper Protection is now disabled for this SEP client.
4. In the Windows Registry Editor, create a backup, and then navigate to the following key:
5. HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error
Reporting\LocalDumps\.
Reference Links:
https://support.symantec.com/us/en/article.tech192023.html
NOTE
https://support.symantec.com/us/en/article.TECH239771.html
6 Troubleshooting
3. In the Internet Explorer Enhanced Security Configuration window, disable the IE ESC
for Administrators and Users, and click OK.
2. In the Properties section, scroll to the right until you see this option: IE Enhanced
Security Configuration, and toggle the setting to Off.
3. In the Internet Explorer Enhanced Security Configuration window, disable the IE ESC
for Administrators and Users, and click OK.
In the Server Manager, you will notice that the setting has not changed. Press F5 to
refresh the screen to see that the setting has turned off.
NOTE
2. In the Server Manager dashboard, click on Local Server on the left-side. In the right
pane, click the On link next to IE Enhanced Security Configuration.
3. Select Off for both Administrators and Users and click OK.
4. Restart your Internet Explorer and you can now visit all websites without being
prompted to add them to IE trusted sites zone.
5.1 3/11/10 Removed ‘VSE 8.0i’ Since EOL by March 2010 and
removed ‘ePO 3.6’ Since EOL by Dec 2009 from
“Anti-Virus Certification Matrix” Table.
5.9 5/26/11 Added ‘ePO 4.6 and VSE 8.8’ Qualification details to
“Anti-Virus Certification Matrix”.
6.1 8/18/11 Added ‘VSE 8.8 and SEP11 RU6’ Certification Details
for EPKS R400.2, HS R400, HS R311,
FSC, SM and SOE to “Anti-Virus Certification Matrix”.
Added ‘VSE 8.8’ Certification Details to AM Products.
Removed ‘i’ from ‘VSE8.8’ in “Anti-Virus Certification
Matrix”.
Included Format changes.
8.3 10/1/2015 Added Exclusions List for EPKS R431 Corrected typo
errors - Replaced ‘N\A’ with ‘N/A’
8.9 10/12/2016 Added ‘ePO 5.3.1, McAfee Agent 5.0.4 and VSE+
AntiSpyware Enterprise 8.8 Patch 8 ‘Engine
5800’Certification details to “Anti-Virus Certification
Matrix”.
Added PA 430.1, SM 153.3, USO R450 and OV
R54X certification details to “Anti-Virus Certification
Matrix”.
Added SM 153.X with latest point release in product
family table.
Updated Bunch of Hot fixes (EPO5xHF1151890
EPO5xHF1147158) for Notation Hf*c.
Updated the Note and Caution for the RAE R612.4 &
R614.3 releases under section 2.2
8.15 06/27/2017 Added ‘ePO 5.9, McAfee Agent 5.0.5 and VSE+
AntiSpyware Enterprise 8.8 Patch 9 ‘Engine
5900’Certification details to “Anti-Virus Certification
Matrix”.
Added UCS R452 and HSR500 certification details to
“Anti-Virus Certification Matrix”.
Symantec
Added ’SEP 14.2.0.1 (14.2 MP1)
(14.2.1015.0100)’ Certification details to “Anti- Virus
Certification Matrix”.
Added PBM R501, Profit Suite R500,
CPM601.3\CPM601.4 certification details to “Anti-
Virus Certification Matrix”.
Removed CPM 563.1 from the certification matrix.
Updated Trace 120.1/121 (SEP 12.1 RU6 MP7)
Qualification details to “Anti-Virus Certification
Matrix”.
Added Exclusions For BMA-PBM.
8.35 4/04/2020 Added ’SEP 14.2.2 (14.2 RU2 MP1) build 5569.
(14.2.5569.2100)’ Certification details to “Anti-virus
Certification Matrix”
Notices
Trademarks
Other trademarks
Microsoft and SQL Server are either registered trademarks or trademarks of Microsoft
Corporation in the United States and/or other countries.
Trademarks that appear in this document are used only to the benefit of the trademark
owner, with no intention of trademark infringement.
Third-party licenses
This product may contain or be derived from materials, including software, of third parties.
The third party materials may be subject to licenses, notices, restrictions and obligations
imposed by the licensor.
The licenses, notices, restrictions and obligations, if any, may be found in the materials
accompanying the product, in the documents or files accompanying such third party
materials, in a file named third_party_licenses on the media containing the product.
Documentation feedback
You can find the most up-to-date documents on the Honeywell Process Solutions support
website at:
https://process.honeywell.com/us/en/support/
If you have comments about Honeywell Process Solutions documentation, send your
feedback to: [email protected]
Use this email address to provide feedback, or to report errors and omissions in the
documentation. For immediate help with a technical problem, contact your local
Honeywell Process Solutions Customer Contact Center (CCC) or Honeywell Technical
Assistance Center (TAC).
To report a potential security vulnerability against any Honeywell product, please follow the
instructions at:
https://honeywell.com/pages/vulnerabilityreporting.aspx
Submit the requested information to Honeywell using one of the following methods:
• Contact your local Honeywell Process Solutions Customer Contact Center (CCC) or
Honeywell Technical Assistance Center (TAC).
Support
For support, contact your local Honeywell Process Solutions Customer Contact Center
(CCC). To find your local CCC visit the website,
https://process.honeywell.com/us/en/support/customer-care-request-form.
Training classes
Honeywell holds technical training classes that are taught by process control systems
experts. For more information about these classes, contact your Honeywell representative,
or see http://www.automationcollege.com.