Overview MetaDefender Sandbox API Reference Release Notes
Getting Started
Deployment & Usage
Support
Release Notes
2.1.0
Search this version
Release Notes
Release Notes
Title
Message
Create new category
What is the title of your new category?
Edit page index title
What is the title of the page index?
Edit category
What is the new title of your category?
Edit link
What is the new title and URL of your link?
Release Notes for v2.0.0
Copy Markdown
Open in ChatGPT
Open in Claude
Date: 18 July, 2024
This version is not suitable for a clean Sandbox installation. Please use version 2.1.0 or later for clean installations!
Added:
- New Streamlined Design for the User Interface


- Support for the installation of MetaDefender Sandbox on offline systems: Offline Installation
- Audit Logger framework for admin settings and user authentication events: Audit Logging for Admin Settings and User Authentication


- Support for AutoIT script files, including compiled AutoIT Portable Executables


- Parsing of MSI metadata and actions, including implementation for filtered file extraction
- Parsing of ODF files and macro extraction
- Parsing of Python pickle files, including implementation for malicious Threat Indicators
- Capability to identify potential obfuscation for extracted macro code
- New Threat Indicator for deceptive filenames commonly used for phishing files
- New Threat Indicator for undetected Equation Editor RTF exploit
- New single configuration option for offline mode
- Introduced a Machine Learning model to identify suspicious URLs even in offline mode (this experimental feature is only enabled by default in offline mode): Offline URL Reputation Overview

Changed:
- Potentially Breaking API change: The INFORMATIONAL verdict was renamed to NO_THREAT in the API results to be consistent with the “No Threat” verdict shown on the UI
- Changed the required operating system to Ubuntu 22.04 LTS. Existing Sandbox installations on Ubuntu 20.04 must be upgraded to 22.04 before installing Sandbox 2.0.0: Operating System Upgrade
- Modified the system architecture to run all Sandbox components in Docker containers. This change improves application security and reduces the overall installation time to about 20 minutes
- Upgraded to Java 17 and Python 3.10 for all relevant Sandbox components
- Renamed the
fsiologcommand tosblog(used to watch Sandbox logs in real time) - Enhanced parsing of LNK metadata and actions, including new Threat Indicators
- Improved Python-specific Threat Indicators
- Added context info to strings originating from extracted files
- Include proper tags for Golang, Rust and compiled-Python Portable Executables
- Improved processing for nested extracted files
- Enhanced Threat Indicators for imported APIs and emulation respectively
- Improved OSINT lookup workflow
- Changed the default verdict to NO_THREAT if no Threat Indicators are found
- Disabled the ClamAV task by default for improved performance
- Improved URL analysis performance and stability
- Reduced the scan time overhead associated with the webservice component
Fixed:
- Fixed minor bugs and misdetections
- Improved application security
- Improved emulation efficacy
- Improved application performance and stability
- Resolved file upload issue in the MetaDefender Core MultiScanning integration
- Fixed an issue causing the remaining daily scan count decreasing without actual scans
- Scan reports are marked as finished if a non-essential subtask reaches a timeout
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard
Last updated on
Was this page helpful?
Next to read:
Release Notes for v1.9.3See the "Technical Datasheet" for a complete list of features: https://docs.opswat.com/filescan/datasheet/technical-datasheet
Discard Changes
Do you want to discard your current changes and overwrite with the template?
Archive Synced Block
Message
Create new Template
What is this template's title?
Delete Template
Message
