To resolve the issue:
-
In /etc/iscan/intscan.ini, ensure that the parameters are correct as shown in the following:
- Solution 1: If the hostname is http, set “use_ssl=no” and ssl_level=0.
- Solution 2: If the hostname starts with https, set “use_ssl=yes” and ssl_level=1
Solution 1
Edit /etc/iscan/intscan.ini and set the following:
# company's server where the up-to-date virus pattern file is maintained hostname=http://iwsva65-p.activeupdate.trendmicro.com/activeupdate/ #when use_ssl is yes. above download url must be a url using ssl. use_ssl=no #0 ---No checking at all, just use HTTPS to encrypt transfer #1 ---The CA (Certificate Authority) of the server certificate must be one of the trusted CAs of the #local client. #2 ---Checking as above, also CommonName in the server certificate must match the # domain name in the update URL #3 --- checked as above, also checking signature files ssl_level=0 download_path=/var/iwss/actupdate
Solution 2
Edit /etc/iscan/intscan.ini and set the following:
# company's server where the up-to-date virus pattern file is maintained hostname=https://iwsva65-p.activeupdate.trendmicro.com/activeupdate/ #when use_ssl is yes. above download url must be a url using ssl. use_ssl=yes #0 ---No checking at all, just use HTTPS to encrypt transfer #1 ---The CA (Certificate Authority) of the server certificate must be one of the trusted CAs of the #local client. #2 ---Checking as above, also CommonName in the server certificate must match the # domain name in the update URL #3 --- checked as above, also checking signature files ssl_level=1 download_path=/var/iwss/actupdate
Click image to enlarge
-
Perform another update and the patterns will then be updated.
Click image to enlarge