OPSWAT Media Validation Agent
The OPSWAT Media Validation Agent (OMVA) is a lightweight tool that is deployed on Windows endpoints ensuring that no media can be mounted that has not been first processed by MetaDefender Kiosk. With the media manifest feature enabled, after media is processed by MetaDefender Kiosk, it will contain a media manifest that is digitally signed and hashes of all the clean and approved files. When an endpoint has the OMVA installed, any media that is inserted is first checked for a valid digital signature from the Kiosk and then a hash check is performed verifying that the contents of the media have not been altered. Limitations: encrypted devices supported by Kiosk are not supported by OMVA.
Supported Operating Systems
OMVA is supported on the following operating systems (32\64 bit):
Windows XP SP3
Windows Vista
Windows 7
- Requires Service Pack 1 and Microsoft updates KB2533623 and KB3033929
Windows 8
Windows 8.1
Windows 10
Windows Server Small Business Server standard FE (version: 2011 Standard)
- Requires KB2533623 installed (http://go.microsoft.com/fwlink/p/?linkid=217865)
Windows Server 2008 R2*
Windows Server 2012*
Windows Server 2012 R2*
Windows Server 2016*
*Any server OS requires KB4474419 installed (https://support.microsoft.com/en-us/help/4474419/sha-2-code-signing-support-update)
Installing the Agent
Run the .msi obtained from the Kiosk Resources page on the Windows endpoint.

Note: The Agent must be provided with the certificates it should consider trusted. The Agent will look in %ALLUSERSPROFILE%\OPSWAT\.ssh\ to locate all trusted certificates.
If the trusted certificate is not in the directory, the Agent can also verify certificate trust if the root Certificate Authority certificate is installed. OPSWAT recommends automating the deployment and installation of trusted certificates to the client using an AD Push or similar technique. A Certificate Authority certificate can also be installed for an individual end-point by copying the .crt file over, right clicking on it, and selecting "Install Certificate."
Usage / Verification of the Media
Insert the media to the endpoint, automatically, the Validation Agent will begin checking the media, it performs the following steps:
- Looks for an OPSWAT Media Manifest file on the media
- Checks to make sure the Certificate that signed the media manifest is trusted
- Checks each file on the removable media against the media manifest to make sure it has not been modified

Result
If the manifest if found to have all files on the media recorded and unmodified, the media will be allowed to be accessed on the endpoint.

If the manifest is found to be invalid or files on the media are found to be missing/modified from the manifest, the media will be blocked from being accessed on the endpoint.


The Validation Agent takes an "all-or-nothing" approach. Any invalid file or manifest will result in the entire media being blocked. There is no access to a subset of valid files.
Logging
OMVA logs JSON formatted messages of its operation. This can be used to determine the validation ran on the system and identify any media that was blocked. Logging can be found in the OMVA install directory: %PROGRAMFILES(X86)%\OPSWAT\OPSWAT OMVA\LOG\omva_logs.json
When extracting logs from the file, the JSON objects must be wrapped within square brackets "[ ]" to allow for proper parsing.
The logging consists of a JSON object structure:
{
"date": utc formatted string
"event_code": event code integer
"level": log level string
"message": message string
"hostname": system hostname string
"username": username of logged-in user string
}
Event Code | Description | Notes |
---|---|---|
0 | Validation begin - USB inserted | contains additional user_data string field in the json message |
1 | File result error | |
2 | Validation end - Media validation result | |
3 | Signature Result |
Sample logging:
{
"date": "2021-04-22T17:28:11Z",
"event_code": 0,
"level": "info",
"message": "USB inserted - Volume{0f1895d7-d714-4030-9b2c-3aeacb631d1b}",
"hostname": "Workstation3186",
"username": "company/userA",
"user_data": "[Kiosk] SessionID: 81E60795-67D8-4A34-8792-90D6E403D039 || User: abc || System: Kiosk1 || Device ID: SCSI\\DISK&VEN_MSFT&DISK\\2&1F4FFE&0&0001 || Start Time: 2021-07-08 16:10:01"
},
{
"date": "2021-04-22T17:28:15Z",
"event_code": 1,
"level": "info",
"message": "G:\\files\\spreadsheet.xlsx - File not found in Media Manifest",
"hostname": "Workstation3186",
"username": "company/userA"
},
{
"date": "2021-04-22T17:28:20Z",
"event_code": 2,
"level": "info",
"message": "Unable to mount drive, please rescan with MetaDefender Kiosk",
"hostname": "Workstation3186",
"username": "company/userA"
}
Configuration of the Agent
Registry configuration: HKLM\SOFTWARE\OPSWAT\OPSWAT-OMVA
Key | Type | Description |
---|---|---|
days_trusted | REG_SZ or REG_DWORD | The maximum days to use a media manifest result If blank or omitted, the manifest is trusted forever |
Uninstalling the Agent
Uninstalling the agent requires the password: " Opswat1234! " to successfully complete.
Modifying the uninstall password
Run OPSWAT-OMVA-Tool.exe obtained from the Kiosk Resources page before installing OMVA on endpoints.

Enter in the new password to configure. Click "Generate" to create a new filename for the OMVA installer. Download the new OMVA installer from the Resources page. Copy the "New File Name" and rename the installer. Installing this renamed file on all endpoints will ensure the uninstall password adheres to what was configured in the tool.
To update existing installations, the previous OMVA must be uninstalled with the default password. Then install the newly renamed OMVA installer.