Views:

For this VSAPIX pattern change, VSAPIX ML detection will be in enable mode for all VSAPI Smart Scan and Conventional pattern branches.

The VSAPIX ML Detection name will be Trojan.Win32.VSX.PE04XXX and the activeaction set for this detection is Pass (GenMajorType activeaction).

Example: Current model detection is Trojan.Win32.VSX.PE04C9h, the last letter of the variant changes after every model update.

 

AU Scope:

  • Products using Global Smart Scan (GSS) and VSAPI Conventional Pattern via AU
    • Apex Central GB and JP
    • Cloud 1 Anti Malware GB
    • Cloud Edge GB
    • DCC GB
    • DDEC GB
    • DDWI GB
    • Housecall JP
    • InterScan Messaging Security Suite 9.1 GB & JP
    • InterScan Messaging Security Virtual Appliance 9.1 GB & JP
    • InterScan Web Security Suite 5.6 & 6.5 JP
    • InterScan Web Security Virtual Appliance 6.5 GB & JP
    • Apex One/OSCE
    • Portal Protect 2.6 GB
    • SafeSync
    • Smart Surfing 11 JP (NTT, Universal, Universal-ICESSP, Universal-iVB)
    • Smart Surfing 11.51 JP NTT
    • Smart Surfing 11.81 JP NTT
    • Smart Surfing 11.8 JP (ICESSP, iVB)
    • Smart Surfing 11.9 JP (ICESSP, iVB)
    • Smex 14 GB & JP
    • SS FE 2.1
    • TM AWS (VSAPI)
    • Deep Security for SG G-Cloud 7.5
    • TM Enterprise Smart Scan
    • TM Security for Mac GB & JP (3, 3.5)
    • TM Threat Mitigator GB (2, 2.5, 2.6)
    • V1 Endpoint Sensor
    • V1 File Security
    • WFBS GB & JP (10, 9.5, 9)
  • Products using Global Smart Scan (GSS) and VSAPI Conventional via iAU
    • ROOTKIT BUSTER 5.0
    • Cloud One Workload Security
    • FILE STORAGE SECURITY 1.0
    • SENTRY 1.0
    • TITANIUM 17.0 JP
    • TITANIUM 17.7 JP
    • TITANIUM 17.8 JP

 

Affected Patterns and Deployment Dates:

  • VSAPI Global Smart Scan (September 17, 2025)
  • VSAPI Conventional (September 25, 2025)