MetaDefender Anti-Malware Engine Name Updates: What You Need to Know
Multiscanning by anti-malware engines is a critical component of OPSWAT’s advanced cyber security solutions. To be consistent with the latest vendor terminology, we will make modifications to the names of the anti-malware engines in MetaDefender. This change will be effective starting December 1, 2021.
The adjustment applies to MetaDefender Cloud, and any Windows or Linux version of the MetaDefender suite: MetaDefender Core, MetaDefender ICAP Server, MetaDefender Email Gateway Security, MetaDefender Core AMI, MetaDefender for Secure Storage, and MetaDefender Kiosk.
The name updates will affect these areas:
- Module page
- Scan results page
- REST API results
- Log content
The engine ID data expressed in JSON will remain the same. For example:
Old:
"Zillya": { "def_time": "2021-07-01T04:02:53.000Z", "eng_id": "zillya_1_windows", "location": "local", "scan_result_i": 0, "scan_time": 81, "threat_found": "", "wait_time": 6 }
New:
"Zillya!": { "def_time": "2021-07-01T04:02:53.000Z", "eng_id": "zillya_1_windows", "location": "local", "scan_result_i": 0, "scan_time": 81, "threat_found": "", "wait_time": 6 }
Action to Take
If you don’t have any custom integrations in your MetaDefender implementation, no action is needed.
If you already have custom integrations (for example, you have scraped logs for the engine names or called the REST API of MetaDefender Core and hard-coded the engine names), follow these steps:
- Prepare to change the hard-coded strings
- Pin the engines 1 to 2 days in advance
Note: Pinning engines will avoid them being overwritten when you allow automatic product updates. - After December 1, 2021, change your hard-coded strings and unpin the engines
- Check to make sure everything works as expected

Explore MetaDefender and other comprehensive cyber security platforms for advanced threat prevention by visiting the OPSWAT Products page Please contact us to schedule a demo or talk to a critical infrastructure cyber security expert.

- ファイルアップロードの保護 – 10 のベストプラクティスで サイバー攻撃を防御
- MetaDefenderによる世界で最も危険なマルウェアEmotetの防御
- OPSWAT Expands Global Availability of Critical Infrastructure Protection
- OPSWAT Announces Expansion of Cybersecurity Training Program
- Avoiding storage data leaks and PII regulation noncompliance
- How OPSWAT Can Help Detect and Prevent the VMware WorkSpace ONE Access exploit (CVE-2020-4006)
- Protecting Critical Infrastructure from Advanced Cyberattacks
- MetaDefender Cloud Hash Reputation Database Now Exceeds 40 Billion
- OPSWAT Continues to Expand OESIS Framework with New Partners
- 6 Potential Security Gaps in File Transfer Process for Critical Infrastructure