Views:

To resolve the issue:

  1. In /etc/iscan/intscan.ini, ensure that the parameters are correct as shown in the following:

    • Solution 1: If the hostname is http, set “use_ssl=no” and ssl_level=0.
    • Solution 2: If the hostname starts with https, set “use_ssl=yes” and ssl_level=1

    Solution 1

    Edit /etc/iscan/intscan.ini and set the following:

    # company's server where the up-to-date virus pattern file is maintained   hostname=http://iwsva65-p.activeupdate.trendmicro.com/activeupdate/   #when use_ssl is yes. above download url must be a url using ssl.   use_ssl=no  #0 ---No checking at all, just use HTTPS to encrypt transfer   #1 ---The CA (Certificate Authority) of the server certificate must be one of the trusted CAs of the   #local client.   #2 ---Checking as above, also CommonName in the server certificate must match the   # domain name in the update URL   #3 --- checked as above, also checking signature files   ssl_level=0  download_path=/var/iwss/actupdate   

    Solution 2

    Edit /etc/iscan/intscan.ini and set the following:

    # company's server where the up-to-date virus pattern file is maintained  hostname=https://iwsva65-p.activeupdate.trendmicro.com/activeupdate/  #when use_ssl is yes. above download url must be a url using ssl.  use_ssl=yes  #0 ---No checking at all, just use HTTPS to encrypt transfer  #1 ---The CA (Certificate Authority) of the server certificate must be one of the trusted CAs of the  #local client.  #2 ---Checking as above, also CommonName in the server certificate must match the  # domain name in the update URL  #3 --- checked as above, also checking signature files  ssl_level=1  download_path=/var/iwss/actupdate  

    https

    Click image to enlarge

  2. Perform another update and the patterns will then be updated.

    Perform another update

    Click image to enlarge