{"id":10127,"date":"2023-05-22T20:43:18","date_gmt":"2023-05-22T18:43:18","guid":{"rendered":"https:\/\/www.bowbridge.net\/?page_id=10127"},"modified":"2023-09-17T15:53:11","modified_gmt":"2023-09-17T13:53:11","slug":"anti-virus-4-x-user-guide-configuration-guide","status":"publish","type":"page","link":"https:\/\/www.bowbridge.net\/en\/anti-virus-4-x-user-guide-configuration-guide\/","title":{"rendered":"Anti-Virus 4.x User Guide &#8211; Configuration Guide"},"content":{"rendered":"<pre> \n \n<\/pre>\n<table id=\"datatable\" class=\"widefat display no-wrap dataTable table\" role=\"grid\" aria-describedby=\"datatable_info\">\n<tbody>\n<tr class=\"odd\" role=\"row\">\n<td style=\"text-align: left;\"><link rel='stylesheet' href='https:\/\/www.bowbridge.net\/wp-content\/plugins\/documentor\/skins\/default\/style.css' type='text\/css' media='all' \/><div id=\"documentor-3\" class=\"documentor-default documentor-wrap\" data-docid = \"3\" data-epid = \"10127\" ><div class=\"documentor-topicons doc-noprint\"><span class=\"doc-topiconswrap\"><span><form method=\"post\" class=\"save_docpdf\"><span class=\"save_secpdf\"> <img height=\"15\" width=\"15\" src=https:\/\/www.bowbridge.net\/wp-content\/plugins\/documentor\/skins\/default\/images\/pdf.png > <\/span><input type=\"hidden\" name=\"doc_pdf\" value=\"document_pdf\" \/><input type=\"hidden\" name=\"doc_id\" value=\"3\"><\/form><\/span><\/span><div class=\"cleardiv\"><\/div><div class=\"clrright\"><\/div><\/div><div class=\"doc-guidetitle\"><h2 class=\"doc-title\" >bowbridge Anti-Virus 4.x - Configuration Guide<\/h2><\/div><div class=\"document-wrapper\"><div class=\"doc-menu doc-noprint\"><div class=\"doc-menurelated\"><ol class=\"doc-list-front\"><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#sap-level-configuration\"   data-href=\"#sap-level-configuration\" data-sec-counter=\"1\" data-section-id=\"41\">SAP VSI Architecture<\/a><\/li><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#sap-as-abap\"   data-href=\"#sap-as-abap\" data-sec-counter=\"2\" data-section-id=\"42\">Configuration in SAP AS ABAP<\/a><span class=\"doc-mtoggle expand\"><\/span><ol><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#defining-virus-scanner-groups\"   data-href=\"#defining-virus-scanner-groups\" data-sec-counter=\"2.1\" data-section-id=\"43\">Maintaining Virus Scanner Groups<\/a><\/li><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#defining-virus-scan-providers\"   data-href=\"#defining-virus-scan-providers\" data-sec-counter=\"2.2\" data-section-id=\"44\">Maintaining Virus Scan Providers<\/a><\/li><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#maintaining-virus-scan-profiles\"   data-href=\"#maintaining-virus-scan-profiles\" data-sec-counter=\"2.3\" data-section-id=\"45\">Maintaining Virus Scan Profiles<\/a><\/li><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#odata-virus-scan\"   data-href=\"#odata-virus-scan\" data-sec-counter=\"2.4\" data-section-id=\"46\">ODATA Virus Scan<\/a><\/li><\/ol><\/li><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#configuration-in-as-java\"   data-href=\"#configuration-in-as-java\" data-sec-counter=\"3\" data-section-id=\"47\">Configuration in AS Java<\/a><span class=\"doc-mtoggle expand\"><\/span><ol><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#maintaining-virus-scanner-groups\"   data-href=\"#maintaining-virus-scanner-groups\" data-sec-counter=\"3.1\" data-section-id=\"48\">Maintaining Virus Scanner Groups<\/a><\/li><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#maintaining-virus-scan-adapters\"   data-href=\"#maintaining-virus-scan-adapters\" data-sec-counter=\"3.2\" data-section-id=\"49\">Maintaining Virus Scan Adapters<\/a><\/li><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#maintaining-virus-scan-profiles-2\"   data-href=\"#maintaining-virus-scan-profiles-2\" data-sec-counter=\"3.3\" data-section-id=\"50\">Maintaining Virus Scan Profiles<\/a><\/li><\/ol><\/li><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#parameters-reference\"   data-href=\"#parameters-reference\" data-sec-counter=\"4\" data-section-id=\"71\">Parameters Reference<\/a><span class=\"doc-mtoggle expand\"><\/span><ol><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#init-parameters\"   data-href=\"#init-parameters\" data-sec-counter=\"4.1\" data-section-id=\"72\">INIT parameters<\/a><\/li><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#scan-parameters\"   data-href=\"#scan-parameters\" data-sec-counter=\"4.2\" data-section-id=\"73\">SCAN parameters<\/a><\/li><li class=\"doc-actli\"><a class=\"documentor-menu\" href=\"#active-content-parameters\"   data-href=\"#active-content-parameters\" data-sec-counter=\"4.3\" data-section-id=\"74\">Active-Content Parameters<\/a><\/li><\/ol><\/li><\/ol><\/div><\/div><div class=\"doc-sec-container\" id=\"documentor_seccontainer\"><div class=\"doc-sectionwrap\" id=\"sap-level-configuration_wrap\"><div class=\"documentor-section  section-41\" id=\"sap-level-configuration\" data-section-id=\"41\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">1.<\/span><span class=\"title-text\">SAP VSI Architecture<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p>SAP VSI introduces three abstraction layers:<\/p>\n<ol>\n<li><span class=\"s1\"><strong>Virus Scan Provider<\/strong>:<\/span><span class=\"s2\"> describes the access to a virus scanner<\/span>\n<ul>\n<li><span class=\"s1\">Virus Scan Adapter:<\/span><span class=\"s2\"> extends the SAP kernel functionality and enables the SAP kernel to access the malware scanner directly. The virus scan adapter is loaded as a dynamic library (DLL on Woindows). It is executed within the address space of the the J2EE or ABAP engine and is, therefore, the variant offering the highest performance.<\/span><\/li>\n<li><span class=\"s1\">Virus Scan Server:<\/span><span class=\"s2\"> defines a (logical or physical) server that gets scan-objects via SAP RFC. This variant delivers significantly lower scan throughput and might fail when scanning large files. Its use is discouraged.<\/span><\/li>\n<\/ul>\n<\/li>\n<li>\n<p class=\"p1\"><strong><span class=\"s1\">Virus Scan Group:<\/span><\/strong><span class=\"s2\"> A Virus Scan Group may contain several Virus Scan Providers with identical configurations<\/span><\/p>\n<\/li>\n<li>\n<p class=\"p1\"><strong><span class=\"s1\">Virus Scan Profile:<\/span><\/strong><span class=\"s2\"> allows administrators to combine the unique functionalities of multiple Virus Scan Groups and combine them using logical AND\/OR relationships. Creating configurations where <\/span><span class=\"s2\">files will be checked by multiple virus scan engines is possible. Also, Virus Scan Profiles may be created to maintain granular, application-specific scanning configurations.<\/span><\/p>\n<\/li>\n<\/ol>\n<p><a href=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/VSI-Layers.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10295\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/VSI-Layers-241x300.png\" alt=\"Layers of the SAP Virus Scanning Architecture\" width=\"400\" height=\"498\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/VSI-Layers-241x300.png 241w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/VSI-Layers-823x1024.png 823w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/VSI-Layers-768x956.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/VSI-Layers.png 900w\" sizes=\"auto, (max-width: 400px) 100vw, 400px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"sap-as-abap_wrap\"><div class=\"documentor-section  section-42\" id=\"sap-as-abap\" data-section-id=\"42\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">2.<\/span><span class=\"title-text\">Configuration in SAP AS ABAP<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p class=\"p1\"><span class=\"s1\">Once installed, the bowbridge Anti-Virus basic configuration is performed entirely from the SAP customization tools. Additional options, such as activating debug tracing, specifying<br \/>\nalternative update sources or fine-tuning of active-content types, can be achieved via configuration files in an on-premises deployment or via the bowbridge customer portal in Hybrid- and Cloud-deployments.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Setting up virus protection for ABAP-based SAP applications requires the following major steps:<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">1. Definition of Virus Scanner Groups<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">2. Definition of Virus Scan Providers<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">3. Definition and activation of Virus Scan Profiles<\/span><\/p>\n<p>4. On SAP gateway systems, activation of Virus Scanning at the SAP gateway.<\/p>\n<p>&nbsp;<\/p>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"defining-virus-scanner-groups_wrap\"><div class=\"documentor-section  section-43\" id=\"defining-virus-scanner-groups\" data-section-id=\"43\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">2.1.<\/span><span class=\"title-text\">Maintaining Virus Scanner Groups<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p class=\"p3\"><span class=\"s1\">A scanner group combines multiple virus scanners of the same type. As users will select the Virus Scan Provider using the scanner group when maintaining the virus scan profile, they must assign each Virus Scan Provider to at least one scanner group.<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">We recommend setting up multiple scanner groups in order to maintain multiple scan configurations on the system.<\/span><\/p>\n<p>To set up and maintain Scanner Groups, access transaction VSCANGROUP. A list of key-value pairs may be specified as<em> Configuration Parameters<\/em> for every group.<br \/>\nUpon completing the OS-level installation, the <em>bowbridge-installation-summary.txt<\/em> file contains the required parameters and their values.<\/p>\n<p><a href=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP-config_1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10303\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP-config_1-300x225.png\" alt=\"VSCANGROUP\" width=\"800\" height=\"601\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP-config_1-300x225.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP-config_1-1024x769.png 1024w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP-config_1-768x577.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP-config_1-1536x1154.png 1536w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP-config_1-800x600.png 800w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP-config_1.png 1920w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<hr \/>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9973 alignleft\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/05\/AV4_userguide_icon_important_300pxpng.png\" alt=\"\" width=\"30\" height=\"30\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/05\/AV4_userguide_icon_important_300pxpng.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/05\/AV4_userguide_icon_important_300pxpng-150x150.png 150w\" sizes=\"auto, (max-width: 30px) 100vw, 30px\" \/>NOTE:<\/p>\n<p>Not all parameters displayed in the parameter selection are valid in Virus Scanner Groups. Only the INIT*-parameters are relevant. And of those, only the ones below are required\/supported by bowbridge Anti-Virus 4.<\/p>\n<hr \/>\n<p>The options supported by bowbridge Anti-Virus 4 are:<\/p>\n<table width=\"585\">\n<tbody>\n<tr>\n<td width=\"200\"><strong>Parameter Name<\/strong><\/td>\n<td width=\"100\"><strong>Required?<\/strong><\/td>\n<td width=\"500\"><strong>Notes<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITDIRECTORY<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">bowbridge program base-path<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITDRIVERS<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">URL of the message broker<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITDEXTRADRIVERS<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Encryption key for events (optional)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITENGINES<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">List and order of scan workers to use<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITLICENSE_PATH<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">API key and authentication to the broker<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITSERVERS<\/td>\n<td style=\"text-align: center;\">Only for ICAP and ClamAV<\/td>\n<td style=\"text-align: left;\">ICAP-URLs or ClamAV connection URL<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITTIMEOUT<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Initialization timeout for the Virus Scan Provider<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITTEMP_PATH<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Temporary directory to use. If not specified, the OS-level default is used<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Because the initialization parameters defined in the Virus Scanner Group will apply to all hosts and are usually transported to all systems of a system line, one should use paths that exist on all affected instances. If\u00a0 SID-specific paths have to be used,\u00a0 using environment variables, such as $SAPSYSTEMNAME or $HOSTNAME is supported for path and file names. The values will be expanded\/resolved to respective values on each system.<\/p>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"defining-virus-scan-providers_wrap\"><div class=\"documentor-section  section-44\" id=\"defining-virus-scan-providers\" data-section-id=\"44\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">2.2.<\/span><span class=\"title-text\">Maintaining Virus Scan Providers<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p>To set up and maintain Scanner Groups, access transaction VSCANGROUP.<\/p>\n<p>&nbsp;<\/p>\n<hr \/>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-9979 alignleft\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/05\/AV4_userguide_icon_recommendation_300px.png\" alt=\"\" width=\"30\" height=\"30\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/05\/AV4_userguide_icon_recommendation_300px.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/05\/AV4_userguide_icon_recommendation_300px-150x150.png 150w\" sizes=\"auto, (max-width: 30px) 100vw, 30px\" \/><\/p>\n<p>NOTE:<\/p>\n<p>SAP VSI <span class=\"s1\">supports two types of Virus Scan Providers: <\/span><\/p>\n<ul>\n<li><span class=\"s1\"><i>Virus Scan <strong>Adapter<\/strong><\/i><\/span><\/li>\n<li><span class=\"s1\"><i>Virus Scan <strong>Server<\/strong><\/i><\/span><\/li>\n<\/ul>\n<p class=\"p1\"><span class=\"s1\">While both options are fully supported with Anti-Virus bowbridge and SAP recommend using the Virus Scan <strong>Adapter<\/strong> configuration whenever possible because it is more stable, delivers much better performance, and overcomes other limitations of the Virus Scan Server deployment mode. See <\/span><span class=\"s1\">SAP Note 782963 for details.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">If you have to deploy bowbridge Anti-Virus in the Virus Scan Server model, please contact bowbridge technical support for additional documentation on implementing that configuration. We also encourage looking at the &#8220;Scan-Server&#8221; deployment model of bowbridge Anti-Virus 4. It combines the advantages of a central scanning server with those of not using RFC to transfer files to be scanned.<\/span><\/p>\n<hr \/>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10308\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_2-300x225.png\" alt=\"Virus Scan Provider\" width=\"800\" height=\"601\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_2-300x225.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_2-1024x769.png 1024w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_2-768x577.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_2-1536x1154.png 1536w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_2-800x600.png 800w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_2.png 1920w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>Upon creating\/maintaining a Virus Scan Provider, the following parameters must be provided:<\/p>\n<table width=\"585\">\n<tbody>\n<tr>\n<td width=\"200\"><strong>Parameter Name<\/strong><\/td>\n<td width=\"600\"><strong>Notes<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Provider Type<\/td>\n<td style=\"text-align: left;\">Use &#8220;Adapter&#8221; whenever possible<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Provider Name<\/td>\n<td style=\"text-align: left;\">Must begin with &#8220;VSA_&#8221;. Using the default works fine.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Scanner Group<\/td>\n<td style=\"text-align: left;\">The scanner group this provider is part of<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Status<\/td>\n<td style=\"text-align: left;\">Controls how the Provider is started. CCMS will periodically check the Provider&#8217;s status and attempt to bring\/restore it to the defined status. In most cases, this should be &#8220;Active Application-Server&#8221;<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Server<\/td>\n<td style=\"text-align: left;\">The application server this particular VSA runs on. In SAP systems with multiple instances, one Virus Scan Provider must be maintained for each instance.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Interval Reinit<\/td>\n<td style=\"text-align: left;\">Specifies the interval in which CCMS will attempt to re-initialize the Virus Scan Provider. While not technically needed, a Re-Init refreshes the data displayed in VSCAN. A re-initialization can also be triggered manually by clicking the &#8220;Load&#8221; button<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Adapter Path<\/td>\n<td style=\"text-align: left;\">Fully qualified path to the libbbAV.so.4 file. Environment variables, such as $SAPSYSTEMNAME or $HOSTNAME are supported in the path parameter and will expand\/resolve to the local value on each instance.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"maintaining-virus-scan-profiles_wrap\"><div class=\"documentor-section  section-45\" id=\"maintaining-virus-scan-profiles\" data-section-id=\"45\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">2.3.<\/span><span class=\"title-text\">Maintaining Virus Scan Profiles<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p>Virus Scan Profiles are a set of parameters specifying how a scan will be performed. Their names reference ABAP function modules in which the Virus Scan Profile name is hard-coded. During the execution of such function modules, scans are automatically performed with the profile settings if the respective virus scan profile is marked as &#8220;active&#8221;. Each profile defines one or more &#8220;Steps,&#8221; invoking a virus scan provider from a Virus Scanner Group or referencing another Virus Scan Profile.<\/p>\n<p>Since SAP BASIS 757 inactive virus scan profile will result in warning messages (event type &#8220;FU0)\u00a0 in the SAP Security Audit Log.<\/p>\n<p>For example, if the SCET\/GUI_UPLOAD profile is active, then any file upload via SAP GUI will be scanned with the settings of the SCET\/GUI_UPLOAD profile. This is fully transparent to the application using the function module and works without any application changes.<\/p>\n<p>SAP delivers several virus scan profiles, which are mostly empty. In their default configuration, they reference the so-called &#8220;Default Profile.&#8221;<\/p>\n<p><a href=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10314\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_4-300x225.png\" alt=\"SAP-delivered Virus Scan Profiles \" width=\"800\" height=\"601\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_4-300x225.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_4-1024x769.png 1024w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_4-768x577.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_4-1536x1154.png 1536w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_4-800x600.png 800w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_config_4.png 1920w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>There are, therefore, two ways to manage Virus Scan Profiles effectively:<\/p>\n<ul>\n<li>Maintain the Scan Settings in each relevant profile individually. This approach makes sense for maintaining specific scan settings that vary by function module; for example, if GUI uploads need to be scanned with settings other than HTTP uploads.<br \/>\nIn this case, uncheck the &#8220;Use Reference&#8221; checkbox in the Virus Scan Profile and maintain steps, MIME-types, and profile configuration parameters in the Virus Scan Profile<\/li>\n<li>Create one or a few &#8220;reference profiles&#8221; with common scan settings and use those as references in the other profiles that need to be activated.<br \/>\nFor this approach, create new profiles in the Z or Y namespace and maintain the required parameters. For example, administrators could create a Z_BASIC profile for pure virus scanning and a Z_ADVANCED profile containing more advanced filtering, like MIME-type filters and active content detection.<br \/>\nIf, additionally, one of the reference profiles is marked as &#8220;Default,&#8221; it would be sufficient to activate any other SAP-delivered profile for it to reference the Default Profile and perform scans with the settings of the Default Profile<\/li>\n<\/ul>\n<p>In either case, the profiles contain the following parameters:<\/p>\n<p>&nbsp;<\/p>\n<table width=\"85%\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" colspan=\"4\">Dialog Structure Folder &#8220;Virus Scan Profile&#8221;<\/td>\n<\/tr>\n<tr>\n<td width=\"250\"><strong>Parameter Name<\/strong><\/td>\n<td width=\"100\"><strong>Type<\/strong><\/td>\n<td width=\"100\"><strong>Required?<\/strong><\/td>\n<td width=\"500\"><strong>Notes<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Scan Profile Name<\/td>\n<td style=\"text-align: left;\">Text<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">Custom profiles must be in Y or Z namespaces<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Profile Text<\/td>\n<td style=\"text-align: left;\">Text<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">A free-form descriptive text<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Active<\/td>\n<td style=\"text-align: left;\">Checkbox<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Marks the profile as active<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Default Profile<\/td>\n<td style=\"text-align: left;\">Checkbox<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Marks this profile as Default. Note only ONE profile can be marked as Default<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Evaluate Profile Configuration Parameters<\/td>\n<td style=\"text-align: left;\">Checkbox<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Activates the parameters defined in the &#8220;Profile Configuration Parameters folder. If parameters are maintained in the Profile Configuration Parameters, and this checkbox is inactive, a warning will be displayed upon saving virus scan profile changes. For example, the SCET\/DP_VS_ENABLED causes this warning in its default, SAP-delivered configuration.<\/p>\n<p><a href=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_SCET_DP_VS_ENABLED.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10316 size-full\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_SCET_DP_VS_ENABLED.png\" alt=\"\" width=\"1720\" height=\"220\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_SCET_DP_VS_ENABLED.png 1720w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_SCET_DP_VS_ENABLED-300x38.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_SCET_DP_VS_ENABLED-1024x131.png 1024w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_SCET_DP_VS_ENABLED-768x98.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_SCET_DP_VS_ENABLED-1536x196.png 1536w\" sizes=\"auto, (max-width: 1720px) 100vw, 1720px\" \/><\/a><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Not relevant for Security Audit Log<\/td>\n<td style=\"text-align: left;\">Checkbox<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Sincef SAP BASIS 757, warning messages are written to the security audit log when a file transfer would have been scanned if this profile was active. This checkbox disables the Security Audit Log Messages for this profile.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Use reference<\/td>\n<td style=\"text-align: left;\">Checkbox<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">If checked, the settings maintained in the profile are ignored, and those maintained in the referenced profile specified are used. If, in turn, no reference profile is specified, the Default Profile is used.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<table width=\"85%\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" colspan=\"4\">Dialog Structure Folder &#8220;Steps&#8221;<\/td>\n<\/tr>\n<tr>\n<td width=\"250\"><strong>Parameter Name<\/strong><\/td>\n<td width=\"100\"><strong>Type<\/strong><\/td>\n<td width=\"100\"><strong>Required?<\/strong><\/td>\n<td width=\"500\"><strong>Notes<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Position<\/td>\n<td style=\"text-align: left;\">Text<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">Numerical value. Only used to order the steps<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Type<\/td>\n<td style=\"text-align: left;\">Selector<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">The type of the reference, Group, or Profile.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Scanner Group<\/td>\n<td style=\"text-align: left;\">Selector<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">Scanner Group to use in this step (if &#8220;Group&#8221; is selected for Type)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Virus Scan Profile<\/td>\n<td style=\"text-align: left;\">Selector<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">Virus Scan Profile to use in this step (if &#8220;Profile&#8221; is selected for Type)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Step Configuration Parameters apply only to the selected step of the Virus Scan Profile.<\/p>\n<table width=\"85%\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" colspan=\"3\">Dialog Structure Folder &#8220;Step Configuration Parameters&#8221;<\/td>\n<\/tr>\n<tr>\n<td width=\"250\"><strong>Parameter Name<\/strong><\/td>\n<td width=\"100\"><strong>Default value<\/strong><\/td>\n<td width=\"500\"><strong>Notes<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">BLOCKEXTENSIONS<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">A semicolon-separated list of file extensions to block (aka &#8220;Blocklist&#8221;)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">BLOCKMIMETYPES<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">A semicolon-separated list of MIME-types to block (aka &#8220;Blocklist&#8221;). Technically identical to specifying a list of MIME-types and setting the Profile Configuration parameter CUST_MIMETYPES_ARE_BLACKLIST<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CLEANQUARANTINE<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">Key of the quarantine worker to receive infected objects in a cryptographically protected quarantine ZIP archive<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANALLEMBEDDED<\/td>\n<td style=\"text-align: center;\">1<\/td>\n<td style=\"text-align: left;\">Recursively scan embedded items, like base64, uuencoded, data-URLs<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANALLFILES<\/td>\n<td style=\"text-align: center;\">1<\/td>\n<td style=\"text-align: left;\">Scan all files, regardless of their type<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANBESTEFFORT<\/td>\n<td style=\"text-align: center;\">1<\/td>\n<td style=\"text-align: left;\">Apply all available scan techniques<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTENSIONS<\/td>\n<td style=\"text-align: center;\"><\/td>\n<td style=\"text-align: left;\">A semicolon-separated list of file extensions to continue processing. Files with extensions NOT on this list will be blocked (&#8220;Allowlist&#8221;)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTRACT<\/td>\n<td style=\"text-align: center;\">1<\/td>\n<td style=\"text-align: left;\">Extract Archives and compressed data files and scan the content (recursively)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTRACT_DEPTH<\/td>\n<td style=\"text-align: center;\">20<\/td>\n<td style=\"text-align: left;\">Maximum nesting depth for archives<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANLOGPATH<\/td>\n<td style=\"text-align: center;\"><\/td>\n<td style=\"text-align: left;\">Name of the file to log all scan operations to. Note a SCANLOG_BASEPATH must be configured in <em>\/config\/bb-av-control.cfg<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANMIMETYPES<\/td>\n<td style=\"text-align: center;\"><\/td>\n<td style=\"text-align: left;\">A semicolon-separated list of MIME-types to continue processing. Files with MIME-types NOT on this list will be blocked (aka &#8220;Allowlist&#8221;). Technically identical to specifying a list of MIME-types. Because of the length limit of the field, it is better to provide the list line-by-line in the MIME-types folder of the Dialog Structure.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Profile Configuration Parameters apply to any step of the profile.<\/p>\n<p>&nbsp;<\/p>\n<table width=\"85%\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" colspan=\"3\">Dialog Structure Folder &#8220;Profile Configuration Parameters&#8221;<\/td>\n<\/tr>\n<tr>\n<td width=\"250\"><strong>Parameter Name<\/strong><\/td>\n<td width=\"100\"><strong>Default value<\/strong><\/td>\n<td width=\"500\"><strong>Notes<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_ACTIVE_CONTENT<\/td>\n<td style=\"text-align: center;\">0<\/td>\n<td style=\"text-align: left;\">Detect and block files containing active-content elements. Check the &#8220;Hierarchical Configurations&#8221; section for details on how to fine-tune what type of content is detected and blocked as active content.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_ALL_SCANERR_AS_WARNING<\/td>\n<td style=\"text-align: center;\">0<\/td>\n<td style=\"text-align: left;\">Override any scan error returned by the VSA and treat it as a warning, therefore accepting the file. Effectively, this equals switching the Virus Scan Profile to a &#8220;fail-open&#8221; configuration. <strong>Use with caution!<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_CHECK_MIME_TYPE<\/td>\n<td style=\"text-align: center;\">0<\/td>\n<td style=\"text-align: left;\">Activate the filtering of files based on MIME types (if provided) and activate the enforcement MIME-type to extension matching.<br \/>\nOverride with the SCAN-parameter ENFORCE_MIME_EXTENSION_MATCH. Check the &#8220;Hierarchical Configurations&#8221; section for details on how to fine-tune and layered scan configurations.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_CLEAN<\/td>\n<td style=\"text-align: center;\">0<\/td>\n<td style=\"text-align: left;\">Attempt to clean infected files. This may MODIFY the file and the original content may be lost. <strong>Use with caution!<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_MIME_TYPES_ARE_BLACKLIST<\/td>\n<td style=\"text-align: center;\">0<\/td>\n<td style=\"text-align: left;\">Toggles the list of MIME-types in the &#8220;MIME-types&#8221; folder from &#8220;Allowlist&#8221; to &#8220;Blocklist&#8221;<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_NO_SCANINFO<\/td>\n<td style=\"text-align: center;\">0<\/td>\n<td style=\"text-align: left;\">Instruct the VSA only to return the blocking verdict, but no details on the scan.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_NOT_SCANNED_AS_WARNING<\/td>\n<td style=\"text-align: center;\">0<\/td>\n<td style=\"text-align: left;\">In situations where a file cannot be scanned, i.e., due to encryption or password protection, accept the file with a warning instead of blocking it.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"odata-virus-scan_wrap\"><div class=\"documentor-section  section-46\" id=\"odata-virus-scan\" data-section-id=\"46\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">2.4.<\/span><span class=\"title-text\">ODATA Virus Scan<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p>When file transfers are embedded in ODATA, AS ABAP can scan these at the gateway level.<\/p>\n<p>Access transaction <em>\/n\/IWFND\/VIRUS_SCAN<\/em> to maintain virus scan at the gateway level:<\/p>\n<p><a href=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10318\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN-300x117.png\" alt=\"\" width=\"800\" height=\"313\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN-300x117.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN-1024x401.png 1024w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN-768x301.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN-1536x601.png 1536w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN.png 1778w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>To enable virus scanning at the gateway, ensure the &#8220;Disable Virus Scanning&#8221; checkbox is <strong>not<\/strong> checked.<\/p>\n<p>In the Virus Scan Profile field, specify a Virus Scan Profile explicitly or leave the field empty (remove any &#8220;-&#8221; that may be there by default), then execute the transaction.<\/p>\n<p><a href=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN_EXECUTED.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10320\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN_EXECUTED-300x19.png\" alt=\"\" width=\"800\" height=\"52\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN_EXECUTED-300x19.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN_EXECUTED-1024x66.png 1024w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN_EXECUTED-768x50.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/ABAP_IWFND_VIRUS_SCAN_EXECUTED.png 1516w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>\u00a0<\/p>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"configuration-in-as-java_wrap\"><div class=\"documentor-section  section-47\" id=\"configuration-in-as-java\" data-section-id=\"47\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">3.<\/span><span class=\"title-text\">Configuration in AS Java<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p class=\"p1\"><span class=\"s1\">Once installed, the bowbridge Anti-Virus basic configuration is performed entirely in NetWeaver Administrator (NWA). \u00a0Additional options, such as activating debug tracing and<br \/>\nalternative update sources or granular deactivation of active-content types can be configured via configuration files in an on-premises deployment or via the bowbridge customer portal in Hybrid- and Cloud-deployments.<\/span><\/p>\n<p class=\"p1\"><span class=\"s1\">Setting up virus protection for Java-based SAP applications requires the following major steps:<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">1. Definition of Virus Scanner Groups<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">2. Definition of Virus Scan Providers<\/span><\/p>\n<p class=\"p3\"><span class=\"s1\">3. Definition and activation of Virus Scan Profiles<\/span><\/p>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"maintaining-virus-scanner-groups_wrap\"><div class=\"documentor-section  section-48\" id=\"maintaining-virus-scanner-groups\" data-section-id=\"48\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">3.1.<\/span><span class=\"title-text\">Maintaining Virus Scanner Groups<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p class=\"p1\"><span class=\"s1\">Virus Scan Providers with identical configurations are grouped in a Virus Scanner Group. However, even with only one Virus Scan Provider, a Scanner Group containing just this element must be created.<\/span><\/p>\n<p>Virus Scanner Groups are maintained from the Virus Scan Provider section in the Netweaver Administrator&#8217;s Configuration Tab.<\/p>\n<p><a href=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10324\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA1-300x198.png\" alt=\"Virus Scan Provider in NWA\" width=\"800\" height=\"529\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA1-300x198.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA1-1024x677.png 1024w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA1-768x508.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA1-1536x1016.png 1536w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA1.png 1920w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>In the Group Tab of the Virus Scan Provider management, Edit, then add\/change a Virus Scan Group.<br \/>\nWhen creating a new group, administrators may decide to mark it as the default group.<br \/>\nSpecifying INIT Parameters, as with an ABAP stack, is <strong>not<\/strong> required on a Java Stack.<\/p>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"maintaining-virus-scan-adapters_wrap\"><div class=\"documentor-section  section-49\" id=\"maintaining-virus-scan-adapters\" data-section-id=\"49\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">3.2.<\/span><span class=\"title-text\">Maintaining Virus Scan Adapters<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p>Virus Scan Adapters are the preferred option to set up a Virus Scan Provider on SAP AS JAVA. The Virus Scan Server option is also supported, but its use is discouraged.<\/p>\n<p>Virus Scan Adapters are configured in the &#8220;Adapters&#8221; Tab of the Virus Scan Provider setup.<\/p>\n<p>All Virus Scan Adapter Names must be prefixed with VSA_<\/p>\n<p><a href=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10328\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA2-300x113.png\" alt=\"Virus Scan Adapter in NWA \" width=\"799\" height=\"301\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA2-300x113.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA2-1024x386.png 1024w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA2-768x289.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA2-1536x578.png 1536w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA2.png 1920w\" sizes=\"auto, (max-width: 799px) 100vw, 799px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>Virus Scan Adapter parameter details:<\/p>\n<p>&nbsp;<\/p>\n<table width=\"85%\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" colspan=\"4\">&#8220;Settings&#8221; Tab<\/td>\n<\/tr>\n<tr>\n<td width=\"250\"><strong>Parameter Name<\/strong><\/td>\n<td width=\"100\"><strong>Type<\/strong><\/td>\n<td width=\"100\"><strong>Required?<\/strong><\/td>\n<td width=\"500\"><strong>Notes<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Default Scan Provider<\/td>\n<td style=\"text-align: left;\">Checkbox<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Marks this provider as the default<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Adapter Name<\/td>\n<td style=\"text-align: left;\">Text<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">Name of the Provider. Must be prefixed with &#8220;VSA_&#8221;<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Adapter Description<\/td>\n<td style=\"text-align: left;\">Text<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Free-form descriptive text<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Scan Group<\/td>\n<td style=\"text-align: left;\">Selector<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">Maps the provider to a Scan Group<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Init Interval (Hours)<\/td>\n<td style=\"text-align: left;\">Text<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">Interval in hours after which the J2EE Kernel re-initializes the Virus Scan Adapter<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Maximum Instances<\/td>\n<td style=\"text-align: left;\">Text<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">Maximum number of VSA instances. IMPORTANT: This number must be equal or higher than the number of threads in the start server. The default number of threads is 140. Hence the value of this parameter should be 140 or higher.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">VSA Library Path<\/td>\n<td style=\"text-align: left;\">Text<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">Full path to the libbbAV.so.4 library. Please note that due to a GUI error, the path can only be entered when clicking on the left end of the field, and is not displayed properly.<\/p>\n<p><a href=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10332\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA3-300x179.png\" alt=\"Adapter Path Display Error\" width=\"600\" height=\"358\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA3-300x179.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA3-768x458.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA3.png 1016w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"maintaining-virus-scan-profiles-2_wrap\"><div class=\"documentor-section  section-50\" id=\"maintaining-virus-scan-profiles-2\" data-section-id=\"50\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">3.3.<\/span><span class=\"title-text\">Maintaining Virus Scan Profiles<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p class=\"p1\">Virus Scan Profiles are a set of parameters specifying how a scan will be performed. Their names reference Java methods in which the Virus Scan Profile name is hard-coded. During the execution of such methods, scans are automatically performed with the profile settings if the profile is marked as active. The profile defines one or more &#8220;Steps,&#8221; invoking a virus scan provider from a Virus Scanner Group or referencing another Virus Scan Profile.<\/p>\n<p>For example, if the htmlb_FileUpload profile is active, then any file upload via HTTP will be scanned with the settings of the htmlb_FileUploadprofile profile. This is fully transparent to the application using the function module and works without any application changes.<\/p>\n<p>SAP delivers several virus scan profiles, which are mostly empty. In their default configuration, they reference the so-called &#8220;Default Profile.&#8221;<\/p>\n<p><a href=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-10336\" src=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA4-300x198.png\" alt=\"Virus Scan Profiles \" width=\"800\" height=\"529\" srcset=\"https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA4-300x198.png 300w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA4-1024x677.png 1024w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA4-768x508.png 768w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA4-1536x1016.png 1536w, https:\/\/www.bowbridge.net\/wp-content\/uploads\/2023\/09\/NWA4.png 1920w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>There are, therefore, two ways to manage Virus Scan Profiles effectively:<\/p>\n<ul>\n<li>Maintain the Scan Settings in each relevant profile individually. This approach makes sense if you maintain specific scan settings that vary by function module. For example, if you want HTTP uploads to be scanned with different settings than pi_Messaging uploads.<br \/>\nIn this case, uncheck the &#8220;Use Reference&#8221; checkbox in the virus scan profile and maintain steps, MIME-types, and profile configuration parameters in the virus scan profile<\/li>\n<li>Create one or few &#8220;reference profiles&#8221; with common scan settings and use those as references in the other profiles you need to activate.<br \/>\nFor this approach, create new profiles in the Z or Y namespace and maintain the required parameters. For example, administrators could create a Z_BASIC profile for pure virus scanning and a Z_ADVANCED profile containing more advanced filtering, like MIME-type filters and active content detection.<br \/>\nIf, additionally, one of the reference profiles is marked as &#8220;Default,&#8221; it would be sufficient to activate any other SAP-delivered profile for it to reference the Default profile and perform scans with the settings of the Default Profile<\/li>\n<\/ul>\n<p>In either case, the profiles contain the following parameters:<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<table width=\"85%\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" colspan=\"4\">Virus Scan Profile Settings &#8211; Settings Tab<\/td>\n<\/tr>\n<tr>\n<td width=\"250\"><strong>Parameter Name<\/strong><\/td>\n<td width=\"100\"><strong>Type<\/strong><\/td>\n<td width=\"100\"><strong>Required?<\/strong><\/td>\n<td width=\"500\"><strong>Notes<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Default Scan Profile<\/td>\n<td style=\"text-align: left;\">Checkbox<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Marks this profile as Default. Note only ONE profile can be marked as Default<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Scan Profile Name<\/td>\n<td style=\"text-align: left;\">Text<\/td>\n<td style=\"text-align: center;\">Yes<\/td>\n<td style=\"text-align: left;\">Custom profiles must be in Y or Z namespaces<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Profile Description<\/td>\n<td style=\"text-align: left;\">Text<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">A free-form descriptive text<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Reference Profile<\/td>\n<td style=\"text-align: left;\">Selector<\/td>\n<td style=\"text-align: center;\">No<\/td>\n<td style=\"text-align: left;\">Points to the profile to reference.<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">Profile Steps<\/td>\n<td style=\"text-align: left;\">List<\/td>\n<td style=\"text-align: center;\">Yes (unless using a reference)<\/td>\n<td style=\"text-align: left;\">Ordered list of Groups or Profiles to run through.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<p>Use the Parameters tab to fine-tune the scan settings of the virus scan profile:<\/p>\n<table width=\"85%\">\n<tbody>\n<tr>\n<td style=\"text-align: center;\" colspan=\"3\">Virus Scan Profile Settings &#8211; Parameters Tab<\/td>\n<\/tr>\n<tr>\n<td width=\"250\"><strong>Parameter Name<\/strong><\/td>\n<td width=\"100\"><strong>Type<\/strong><\/td>\n<td width=\"500\"><strong>Notes<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">BLOCKEXTENSIONS<\/td>\n<td style=\"text-align: center;\">CHAR<\/td>\n<td style=\"text-align: left;\">A semicolon-separated list of file extensions to block (aka &#8220;Blocklist&#8221;)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">BLOCKMIMETYPES<\/td>\n<td style=\"text-align: center;\">CHAR<\/td>\n<td style=\"text-align: left;\">A semicolon-separated list of MIME-types to block (aka &#8220;Blocklist&#8221;).<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CLEANQUARANTINE<\/td>\n<td style=\"text-align: center;\">CHAR<\/td>\n<td style=\"text-align: left;\">Key of the quarantine worker to receive infected objects in a cryptographically protected quarantine ZIP archive<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANALLEMBEDDED<\/td>\n<td style=\"text-align: center;\">BOOL<\/td>\n<td style=\"text-align: left;\">Recursively scan embedded items, like base64, uuencoded, data-URLs (default: 1)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANALLFILES<\/td>\n<td style=\"text-align: center;\">BOOL<\/td>\n<td style=\"text-align: left;\">Scan all files, regardless of their type (default: 1)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANBESTEFFORT<\/td>\n<td style=\"text-align: center;\">BOOL<\/td>\n<td style=\"text-align: left;\">Apply all available scan techniques (default: 1)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTENSIONS<\/td>\n<td style=\"text-align: center;\">CHAR<\/td>\n<td style=\"text-align: left;\">A semicolon-separated list of file extensions to continue processing. Files with extensions NOT on this list will be blocked (&#8220;Allowlist&#8221;)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTRACT<\/td>\n<td style=\"text-align: center;\">BOOL<\/td>\n<td style=\"text-align: left;\">Extract Archives and compressed data files and scan the content (recursively) (default: 1)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTRACT_DEPTH<\/td>\n<td style=\"text-align: center;\">INT<\/td>\n<td style=\"text-align: left;\">Maximum nesting depth for archives (default: 20)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANLOGPATH<\/td>\n<td style=\"text-align: center;\">CHAR<\/td>\n<td style=\"text-align: left;\">Name of the file to log all scan operations to. Note a SCANLOG_BASEPATH must be configured in <em>\/config\/bb-av-control.cfg<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANMIMETYPES<\/td>\n<td style=\"text-align: center;\">CHAR<\/td>\n<td style=\"text-align: left;\">A semicolon-separated list of MIME-types to continue processing. Files with MIME-types NOT on this list will be blocked (aka &#8220;Allowlist&#8221;).<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_ACTIVE_CONTENT<\/td>\n<td style=\"text-align: center;\">BOOL<\/td>\n<td style=\"text-align: left;\">Detect and block files containing active-content elements. Check the &#8220;Hierarchical Configurations&#8221; section for details on how to fine-tune what type of content is detected and blocked as active content. (default: 0)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_ALL_SCANERR_AS_WARNING<\/td>\n<td style=\"text-align: center;\">BOOL<\/td>\n<td style=\"text-align: left;\">Override any scan error returned by the VSA and treat it as a warning, therefore accepting the file. Basically, this is switching the Virus Scan Profile to a &#8220;fail-open&#8221; configuration. <strong>Use with caution! <\/strong>(default: 0)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_CHECK_MIME_TYPE<\/td>\n<td style=\"text-align: center;\">BOOL<\/td>\n<td style=\"text-align: left;\">Activate the filtering of files based on MIME-types (if provided) and activate the enforcement MIME-type to extension matching.<br \/>\nOverride with the SCAN-parameter ENFORCE_MIME_EXTENSION_MATCH. Check the &#8220;Hierarchical Configurations&#8221; section for details on how to fine-tune and layer scan configurations. (default: 0)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_CLEAN<\/td>\n<td style=\"text-align: center;\">BOOL<\/td>\n<td style=\"text-align: left;\">Attempt to clean infected files. This may MODIFY the file and the original content may be lost. <strong>Use with caution!\u00a0<\/strong>(default: 0)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_NO_SCANINFO<\/td>\n<td style=\"text-align: center;\">BOOL<\/td>\n<td style=\"text-align: left;\">Instruct the VSA only to return the blocking verdict, but no details on the scan. (default: 0)<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_NOT_SCANNED_AS_WARNING<\/td>\n<td style=\"text-align: center;\">BOOL<\/td>\n<td style=\"text-align: left;\">In situations where a file cannot be scanned, i.e., due to encryption or password protection, accept the file with a warning instead of blocking it. (default: 0)<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"parameters-reference_wrap\"><div class=\"documentor-section  section-71\" id=\"parameters-reference\" data-section-id=\"71\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">4.<\/span><span class=\"title-text\">Parameters Reference<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"init-parameters_wrap\"><div class=\"documentor-section  section-72\" id=\"init-parameters\" data-section-id=\"72\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">4.1.<\/span><span class=\"title-text\">INIT parameters<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p>INIT parameters are defined in the Virus Scan Group.<br \/>\nThese parameters are used to initialize the VSA. Hence, for changes to any INIT parameter to go into effect, the virus scan adapter must be re-initialized.<\/p>\n<p>This may happen automatically, if a Re-Init Interval is defined, or it can be triggered manually by clicking the &#8220;Load&#8221; button in transaction VSCAN (on ABAP-stacks only)<\/p>\n<table width=\"589\">\n<tbody>\n<tr>\n<td style=\"text-align: left;\" width=\"127\"><strong>Parameter<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"313\"><strong>Description<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"149\"><strong>Mandatory<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITEXTRADRIVERS<\/td>\n<td style=\"text-align: left;\" width=\"313\">Encryption key for events (optional)<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITEXTRADRIVERDIRECTORY<\/td>\n<td style=\"text-align: left;\" width=\"313\">Set the VSA client trace file and trace level. Format: &lt;trace file [path\/] name&gt;;&lt;trace level [0-6]&gt;<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITTEMP_PATH<\/td>\n<td style=\"text-align: left;\" width=\"313\">Temporary directory to use. If not specified, the OS-level default is used<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITTIMEOUT<\/td>\n<td style=\"text-align: left;\" width=\"313\">Initialization timeout for the Virus Scan Provider<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITSERVERS<\/td>\n<td style=\"text-align: left;\" width=\"313\">ICAP-URLs or ClamAV connection URL<\/td>\n<td style=\"text-align: left;\">Only for ICAP and ClamAV<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITDIRECTORY<\/td>\n<td style=\"text-align: left;\" width=\"313\">bowbridge program base-path<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITDRIVERS<\/td>\n<td style=\"text-align: left;\" width=\"313\">URL of the message broker<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITENGINES<\/td>\n<td style=\"text-align: left;\" width=\"313\">List and order of scan workers to use<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INITLICENSE_PATH<\/td>\n<td style=\"text-align: left;\" width=\"313\">API key and authentication to the broker<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"scan-parameters_wrap\"><div class=\"documentor-section  section-73\" id=\"scan-parameters\" data-section-id=\"73\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">4.2.<\/span><span class=\"title-text\">SCAN parameters<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p>Scan parameters are passed to the VSA with every scan request. They are typically set in the virus scan profile, allowing for fine-tuning of scanning policies by file transfer vector.<\/p>\n<p>bowbridge Anti-Virus adds numerous &#8220;overlay&#8221; parameters that can enrich the limited configuration options provided by the virus scan profiles. These parameters may be configured at the realm-level or at the SID level.<\/p>\n<table width=\"738\">\n<tbody>\n<tr>\n<td style=\"text-align: left;\" width=\"189\"><strong>Parameter<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"313\"><strong>Description<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"149\"><strong>Default value<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"87\"><strong>Set in virus scan profile<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">BLOCKENCRYPTED<\/td>\n<td style=\"text-align: left;\" width=\"313\">Blocks files that are encrypted or password-protected (i.e., password-protected ZIP archives or PDF files)<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">BLOCKEXTENSIONS<\/td>\n<td style=\"text-align: left;\" width=\"313\">Semi-colon-separated list of forbidden filename extensions<br \/>\nOverwritten if a list of extensions is passed via the BLOCKEXTENSIONS parameter in the virus scan profile.<\/td>\n<td><\/td>\n<td>Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">BLOCKHTML_IN_PDF<\/td>\n<td style=\"text-align: left;\" width=\"313\">Blocks PDF files containing dictionary elements that may be interpreted as HTML<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">BLOCKMIMETYPES<\/td>\n<td style=\"text-align: left;\" width=\"313\">Semi-colon-separated list of MIME types to block from being processed.<br \/>\nOverwritten if set in the virus scan profile and the profile configuration<br \/>\nParameter CUST_MIMETYPES_ARE_BLACKLIST is active<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CLEANQUARANTINE<\/td>\n<td style=\"text-align: left;\" width=\"313\">Specifies the authentication and transfer encryption settings for files sent to quarantine<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_CHECK_MIME_TYPE<\/td>\n<td style=\"text-align: left;\" width=\"313\">Activates the MIME-type related checks (Whitelist, blacklist, MIME-extension match)<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CUST_CLEAN<\/td>\n<td style=\"text-align: left;\" width=\"313\">Attempt to clean infected files<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">ENFORCE_ACTIVECONTENT_POLICY_IN_ARCHIVES<\/td>\n<td style=\"text-align: left;\" width=\"313\">Enforce the detection of active content in files inside archives or compressed files<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">ENFORCE_MIME_POLICY_IN_ARCHIVES<\/td>\n<td style=\"text-align: left;\" width=\"313\">Enforce MIME-type to extension mappings and MIME filters on files inside archives and compressed files<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">EVENT_ID_DELIMITER<\/td>\n<td style=\"text-align: left;\" width=\"313\">Delimiter to set apart the bowbridge EventID included in messages to users and stored in the SAP security audit log for easier correlation<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">HTMLDETECTION<\/td>\n<td style=\"text-align: left;\" width=\"313\">specifies what HTML tags to look for when determining whether a file is HTML<br \/>\noptions are:<br \/>\nSAFE:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 flag the file only if HTML elements are present that may be used for XSS (default)<br \/>\nRESTRICTIVE:\u00a0 flag the file if ANY valid HTML element is present<br \/>\nOFF:\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 No detection of HTML elements<\/td>\n<td style=\"text-align: left;\">SAFE<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">INCLUDE_EVENT_ID_IN_MESSAGE<\/td>\n<td style=\"text-align: left;\" width=\"313\">Toggles whether the unique ID of every log message should be included in VSA error\/blocking messages and logs for easier correlation<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">LONGMIMETYPES<\/td>\n<td style=\"text-align: left;\" width=\"313\">Return the original long mime types rather than shortened versions.<br \/>\nLong mime-types may be too long to enter in the MIME table in transaction VSCANPROFILE as the length of each element in the list is limited (by SAP) to 64\/128 characters<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANALLEMBEDDED<\/td>\n<td style=\"text-align: left;\" width=\"313\">Scan all files embedded in a document. Activates SCANBASE64 and SCANUUENCODED, unless deactivated specifically<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANALLFILES<\/td>\n<td style=\"text-align: left;\" width=\"313\">Virus scan engines may skip certain files (e.g. plain text) from scans in order to improve performance.<br \/>\nThis setting instructs the scan engine to scan all files, regardless of the file type<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANBANDWIDTH<\/td>\n<td style=\"text-align: left;\" width=\"313\">Minimum connection bandwidth between the SAP system and the virus scan server in Mbps (Megabits per second).<br \/>\nThis setting is used in combination with the file size and type to add an additional timeout to the scan requests<\/td>\n<td style=\"text-align: left;\">10000<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANBASE64<\/td>\n<td style=\"text-align: left;\" width=\"313\">attempt to base64-decode and scan any text that may be base64-encoded data<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANBESTEFFORT<\/td>\n<td style=\"text-align: left;\" width=\"313\">Instructs the scan engine to use all available options for the scan.<br \/>\nOverwritten if set in the virus scan profile<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTENSIONS<\/td>\n<td style=\"text-align: left;\" width=\"313\">Semi-colon-separated list of allowed filename extensions allowed, meaning the file will continue to be processed and not blocked at that stage<br \/>\nOverwritten if a list of extensions is passed via the SCANEXTENSIONS parameter in the virus scan profile.<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTRACT<\/td>\n<td style=\"text-align: left;\" width=\"313\">Extract archives and scan their content recursively<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTRACT_DEPTH<\/td>\n<td style=\"text-align: left;\" width=\"313\">Maximum depth to which nested archives are extracted<\/td>\n<td style=\"text-align: left;\">20<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTRACT_MAX_FILE<\/td>\n<td style=\"text-align: left;\" width=\"313\">Maximum number of elements in an archive.<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTRACT_NO_VIRUSSCAN<\/td>\n<td style=\"text-align: left;\" width=\"313\">Skip the VIRUS-SCAN step of archive-extraction.<br \/>\nThe archive will be extracted, and MIME-policy and active-content policy will be applied to every element, but the VIRUS scan will only be performed on the archive as a whole<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTRACT_RATIO<\/td>\n<td style=\"text-align: left;\" width=\"313\">Maximum ratio of the extracted archive size to the original archive size<\/td>\n<td style=\"text-align: left;\">128<\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANEXTRACT_SIZE<\/td>\n<td style=\"text-align: left;\" width=\"313\">Maximum size of an extracted archive in bytes<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANLOGPATH<\/td>\n<td style=\"text-align: left;\" width=\"313\">Full path, including filename for the file to which any scan activity will be logged.<br \/>\nOverwritten if set in the virus scan profile.<br \/>\nAlways active in with cloud-based scans<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">Yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANMIMETYPES<\/td>\n<td style=\"text-align: left;\" width=\"313\">Semi-colon-separated list of allowed MIME-types allowed.<br \/>\nFiles matching this list will continue to be processed and not blocked at this scanning stage.<\/td>\n<td style=\"text-align: left;\"><\/td>\n<td style=\"text-align: left;\">yes<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANTIMEOUT<\/td>\n<td style=\"text-align: left;\" width=\"313\">Maximum duration (in milliseconds) before a scan operation fails<\/td>\n<td style=\"text-align: left;\">30000<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANUUENCODED<\/td>\n<td style=\"text-align: left;\" width=\"313\">uudecodes any buffer containing a UU-encoding header<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SCANXMLCONTENT<\/td>\n<td style=\"text-align: left;\" width=\"313\">Scan every element in a passed XML file<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SVG_MODE<\/td>\n<td style=\"text-align: left;\" width=\"313\">specifies what MIME-type to return for HTML files containing SVG [SVG\/HTML]<\/td>\n<td style=\"text-align: left;\">SVG<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">XML_MODE<\/td>\n<td style=\"text-align: left;\" width=\"313\">specifies what MIME type to return for HTML files containing XML [HTML\/XML]<\/td>\n<td style=\"text-align: left;\">XML<\/td>\n<td style=\"text-align: left;\">No<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><div class=\"doc-sectionwrap\" id=\"active-content-parameters_wrap\"><div class=\"documentor-section  section-74\" id=\"active-content-parameters\" data-section-id=\"74\"><h3 class=\"doc-sec-title\" > <span class=\"doc-sec-count\" style=\"display:inline-block\">4.3.<\/span><span class=\"title-text\">Active-Content Parameters<\/span>  <div class=\"documentor-social doc-noprint\"><\/div><\/h3><div class=\"doc-sec-content\" ><p>In Virus Scan Profiles, SAP only implemented a generic on\/off switch for active content detection with the Profile Configuration Parameter CUST_CHECK_ACTIVECONTENT. However, in order to maintain a good security posture and not disrupt business processes, a more granular configuration of what exactly needs to be blocked as active content is required. The following parameters provide this granularity. They may be implemented at the realm level or for individual SIDs.<\/p>\n<table style=\"height: 1147px;\" width=\"100%\">\n<tbody>\n<tr>\n<td style=\"text-align: left;\" width=\"189\"><strong>Parameter<\/strong><\/td>\n<td style=\"text-align: left;\"><strong>Description<\/strong><\/td>\n<td style=\"text-align: left;\" width=\"75\"><strong>Global Default<\/strong><\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">CSV_INJECTION<\/td>\n<td style=\"text-align: left;\">Invocation of external applications from a CSV file<br \/>\nSee https:\/\/owasp.org\/www-community\/attacks\/CSV_Injection<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">EXECUTABLE<\/td>\n<td style=\"text-align: left;\">Any file executable by the OS, such as binary executables, shared libraries, Windows screen savers, MSI-files, Java, shell-scripts, batch- or command files.<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">FLASH<\/td>\n<td style=\"text-align: left;\">Macromadia Flash<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">GIFAR<\/td>\n<td style=\"text-align: left;\">GIFAR (or similar) files that may be opened as more than one format (aka Chameleon files)<br \/>\nSee https:\/\/en.wikipedia.org\/wiki\/Gifar<br \/>\nSee https:\/\/userapps.support.sap.com\/sap\/support\/knowledge\/en\/3033584<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">HTML_EVENTHANDLER<\/td>\n<td style=\"text-align: left;\">Event-handler registrations in HTML.<br \/>\nSee https:\/\/owasp.org\/www-community\/xss-filter-evasion-cheatsheet<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">HTML_SCRIPT<\/td>\n<td style=\"text-align: left;\">HTML with SCRIPT tags<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">MSOFFICE_DDE<\/td>\n<td style=\"text-align: left;\">Dynamic Data Embedding in Microsoft Office Documents.<br \/>\nSee https:\/\/pentestlab.blog\/2018\/01\/16\/microsoft-office-dde-attacks\/<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">MSOFFICE_JAVA<\/td>\n<td style=\"text-align: left;\">Java Classes embedded in MS Office OOXML files<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">MSOFFICE_MACRO<\/td>\n<td style=\"text-align: left;\">Generic dectection for macros in CDFv2 and OOXML Office Documents<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">MSOFFICE_MACRO_SIGNED<\/td>\n<td style=\"text-align: left;\">Exception option for signed macros.<br \/>\nNote: This checks only IF the macro is signed. The signature is not validated<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">MSOFFICE_OLE<\/td>\n<td style=\"text-align: left;\">Files embedded in MS Office documents via Object Linking and Embedding (OLE)<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">PDF_ACROFORM<\/td>\n<td style=\"text-align: left;\">Acrobat Forms in PDF documents<br \/>\nDeactivated by default as Adobe Document Services for SAP uses AcroForms<br \/>\nSee SAP note 2413268<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">PDF_ACTIVEACTION<\/td>\n<td style=\"text-align: left;\">ActiveAction dictionary element can be used to trigger actions and\/or JavaScript<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">PDF_JAVASCRIPT<\/td>\n<td style=\"text-align: left;\">JavaScript Elements in PDF<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">PDF_LAUNCH<\/td>\n<td style=\"text-align: left;\">The ability to launch external executables from within a PDF document<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">PDF_METADATA_PERL<\/td>\n<td style=\"text-align: left;\">detects perl within the meta-data of a PDF file<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">PDF_METADATA_PHP<\/td>\n<td style=\"text-align: left;\">detects php within the meta-data of a PDF file<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">PDF_OPENACTION<\/td>\n<td style=\"text-align: left;\">Trigger to run when the document is opened.<br \/>\nDeactivated as benign use is very common (i.e. scanners)<br \/>\nImportant not to deactivate when PDF_JAVASCRIPT is also deactivated<\/td>\n<td style=\"text-align: left;\">0<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">PDF_RICHMEDIA<\/td>\n<td style=\"text-align: left;\">Embedding of Rich Media content in PDF files<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">SILVERLIGHT<\/td>\n<td style=\"text-align: left;\">detects Microsoft Silverlight<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">XML_JAVASCRIPT<\/td>\n<td style=\"text-align: left;\">detects JavaScript in an XML document<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">XML_XSLT<\/td>\n<td style=\"text-align: left;\">detects XSLT transformation sheets which can be used to translate any XML into HTML + JS<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: left;\">ZIP_JAVA_ARCHIVE<\/td>\n<td style=\"text-align: left;\">Checks for Java classes in ZIP files (basically JAR files without the .jar extension)<\/td>\n<td style=\"text-align: left;\">1<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div><div class=\"documentor-help\"><div class=\"negative-feedbackform doc-noprint\">\n\t\t\t\t\t<\/div><div class=\"feedback-msg doc-noprint\"><\/div><\/div><\/div><\/div><!--.\/doc-sectionwrap--><\/div><!--.doc-sec-container--><div id=\"sugestedit_popup3\" class=\"sugestedit_popup\">\n\t\t\t\t<a class=\"modal_close\"><\/a>\n\t\t\t\t<form name=\"documentor-suggestform\" method=\"post\" class=\"documentor-suggestform\">\n\t\t\t\t\t<div class=\"doc-frmdiv\" style=\"font-weight: bold;\">Suggest Edit\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div class=\"doc-frmdiv\">\n\t\t\t\t\t\t<input type=\"text\" name=\"sec_title\" class=\"sedit-sectitle txtinput\" value=\"\" \/>\n\t\t\t\t\t<\/div><div class=\"doc-frmdiv\">\n\t\t\t\t\t\t\t<input type=\"text\" name=\"name\" class=\"txtinput\" placeholder=\"Name\" required \/>\n\t\t\t\t\t\t<\/div><div class=\"doc-frmdiv\">\n\t\t\t\t\t\t\t<input type=\"email\" class=\"emailinput\" placeholder=\"Email\" name=\"email\" required \/> \n\t\t\t\t\t\t<\/div><div class=\"doc-frmdiv\">\n\t\t\t\t\t\t\t<textarea name=\"content\" class=\"textareainput\" placeholder=\"Post your suggestion...\" required><\/textarea>\n\t\t\t\t\t\t<\/div><div class=\"doc-frmdiv\"><label> Captcha :&nbsp; <\/label><span class=\"doc-sedit-captcha\"><\/span><\/div><input type=\"hidden\" class=\"sedit-secid\" name=\"secid\" value=\"\" \/>\n\t\t\t\t\t<input type=\"hidden\" class=\"sedit-postid\" name=\"sedit_postid\" value=\"\" \/>\n\t\t\t\t\t<input type=\"hidden\" class=\"sedit-docid\" name=\"docid\" value=\"3\" \/>\n\t\t\t\t\t<button class=\"docsubmit-suggestform\"> Submit <\/button>\n\t\t\t\t<\/form>\n\t\t\t<\/div><script type=\"text\/javascript\">\n\t\t\tjQuery(document).ready(function(){\n\t\t\t\tjQuery(\"#documentor-3\").documentor({\n\t\t\t\t\tdocumentid\t: 3,\n\t\t\t\t\tdocid\t\t: \"documentor-3\",\n\t\t\t\t\tanimation\t: \"\",\n\t\t\t\t\tindexformat\t: \"1\",\n\t\t\t\t\tpformat\t\t: \"decimal\",\n\t\t\t\t\tcformat\t\t: \"decimal\",\t\t\t\t\t\n\t\t\t\t\tsecstyle\t: \"\",\n\t\t\t\t\tsecelement  : \"3\",\n\t\t\t\t\tactnavbg_default: \"1\",\n\t\t\t\t\tactnavbg_color\t: \"#0093bf\",\n\t\t\t\t\tenable_ajax\t: \"0\",\n\t\t\t\t\tload\t\t: \"0\",\n\t\t\t\t\tscrolling\t: \"1\",\n\t\t\t\t\tfixmenu\t\t: \"1\",\n\t\t\t\t\tskin\t\t: \"default\",\n\t\t\t\t\tscrollBarSize\t: \"3\",\n\t\t\t\t\tscrollBarColor\t: \"#F45349\",\n\t\t\t\t\tscrollBarOpacity: \"0.4\",\n\t\t\t\t\twindowprint\t: \"1\",\n\t\t\t\t\tmenuTop: \"0\",\n\t\t\t\t\tsocialshare\t: 0,\n\t\t\t\t\tsharecount\t: 1,\n\t\t\t\t\tfbshare\t\t: 1,\n\t\t\t\t\ttwittershare\t: 1,\n\t\t\t\t\tpinshare\t: 1,\n\t\t\t\t\ttogglechild\t: 0,\n\t\t\t\t\tnoResultsStr: \"No results found!\",\n\t\t\t\t});\t\n\t\t\t});<\/script><div class=\"cleardiv cleardiv-rtl\"><\/div><\/div><!--\/.document-wrapper--><div class=\"cleardiv cleardiv-rtl\"><\/div><a class=\"scrollup doc-noprint\" style=\"display: block;\"><span class=\"icon-angle-up\"><\/span><\/a><\/div><div class=\"cleardiv\"> <\/div><div id=\"documentor-3-end\"><\/div><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"excerpt":{"rendered":"bowbridge Anti-Virus 4.x - Configuration GuideSAP VSI ArchitectureConfiguration in SAP AS ABAPMaintaining Virus Scanner GroupsMaintaining Virus Scan ProvidersMaintaining Virus Scan ProfilesODATA...","protected":false},"author":2,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"content-type":"","footnotes":""},"class_list":["post-10127","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/10127","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/comments?post=10127"}],"version-history":[{"count":2,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/10127\/revisions"}],"predecessor-version":[{"id":10300,"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/pages\/10127\/revisions\/10300"}],"wp:attachment":[{"href":"https:\/\/www.bowbridge.net\/en\/wp-json\/wp\/v2\/media?parent=10127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}