Browser Cookies

Because the cookies store non-volatile information (License_Key and Device_ID), the cookies are given a far-future expiration date. Unlike the registry and p-list APIs, MetaDefender IT Access does not provide policy compliance information in the cookie itself. The intention is for the cookie to be used for identifying the device and securely calling the MetaDefender IT Access APIs to fetch device compliance status.

The injection works only for Windows devices. If the Persistent MetaDefender Endpoint is uninstalled, the cookies will be removed with it. If the on-demand MetaDefender Endpoint is stopped, the cookies will be deleted as the agent shuts down.

Because of XSS protections, cookies are not visible from one domain to another. For this reason, the MetaDefender IT Access provides a form to specify the domains that require cookie injection.

Whenever a cookie injection is scheduled, actually two separate cookies are injected. This allows for either secure or insecure integration types. Format of the two cookies:

Cookie NameDevice_IDLicense_Key
Content{Unique Device ID}{MetaDefender IT Access license key}

Each cookie is also set as follows:

Host{hostname configured on your MetaDefender IT Access account}
Path/
Send ForAny connection type
ExpiresFar-future
TypePersistent

Cookie: License_Key

The License_Key cookie provides the account license key to which the MetaDefender IT Access account is associated.

Cookie: Device_ID

The Device_ID cookie is provided so the web service can access the richest and most secure information directly from the MetaDefender IT Access. MetaDefender IT Access has APIs which documented at How to work with MetaDefender IT Access APIs. Calling these APIs to get device information requires either a MAC address or a Device_ID. Since most web services (without the use of Java) cannot query the device’s MAC address, the Device_ID is made available in this cookie.

The MetaDefender IT Access APIs are secured with OAuth 2.0. A client_key and client_ secret for calling the APIs can be obtained by registering at https://gears.opswat.com/o/app/register. This registration is tied to each MetaDefender IT Access account.

Notes

  • Because the cookies are cleaned-up when MetaDefender Endpoint is uninstalled (persistent) or stopped (on-demand), the presence of the cookie can be used as an indicator that MetaDefender Endpoint is running on the endpoint. This is not deterministic though as special cases can arise where MetaDefender Endpoint is stopped or removed without the cookies being cleaned up, and vice-e-versa a user may delete their cookies without removing MetaDefender Endpoint (though in this case MetaDefender Endpoint will try to recreate the cookies from time to time). Cookie injection is automatic as long as MetaDefender Endpoint is running on the endpoint. It is not configurable.
  • The cookie is injected into all detected and supported browsers on the endpoint. Even if one fails, the remaining browsers will still be tried.
  • This cookie injection has little to no impact on system resources (CPU, memory, disk IO, etc.)

Supported browsers

As of November 10th, 2016, the cookie integration is only supported on Windows 7+

BrowserPersistent agentOn-demand agent with adminOn-demand agent with non-admin
Chrome 34+ (ID: 41)YesYesYes
Firefox 28+ (ID: 46)YesYesYes
Internet Explorer 8+NoYesPartial

Notes:

  • The cookie couldn't be injected if there is at least 1 instance of chrome.exe running
  • On Firefox, you need to set baseDomain different with Hostname. If not, the cookie will not be injected
  • MetaDefender Endpoint can inject cookie to IE database but IE couldn't transmit the cookie to servers if IE runs protected mode.
  • Windows On-demand MetaDefender Endpoint is available with and without UAC. When using the non-UAC version as a user without local administrator rights, the cookie injection will not work with Internet Explorer
Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard