Citrix Endpoint Analysis Download Mac



MyWorkSpace If the myWorkSpace Plug-in is installed and not running, click 'Start > All Programs > Citrix > myWorkSpace ' to start the application. If the myWorkSpace Plug-in is not installed, click Download to install the software and connect automatically.

  1. Our antivirus check shows that this download is safe. This free software is a product of Citrix Systems, Inc. The software is sometimes distributed under different names, such as 'Citrix online plug-in', 'Citrix online plug-in - web', 'Citrix Online Plug-in PNA'. The most popular versions among Citrix Online Plug-in Web users are 12.3, 12.1.
  2. 1) WebGUI Note: Set Packet Size to 0, and add expression filer if necessary, click ok. 2) CLI Start nstrace: Stop nstrace: If filtering the IP address of 192.168.1.1.
  3. Dec 11, 2020 When users log on to Citrix Gateway, they download and install the Citrix Gateway plug-in on the user device. To install the plug-in, users must be a local administrator or a member of the Administrators group. This restriction applies for first-time installation only. Plug-in upgrades do not require administrator level access.
  4. When using End Point Analysis (EPA), the plug-in fails to start or fails to scan after starting on MAC. Using a web browser does not initiate the scan, even when using ICA-Proxy for EPA. The following errors are displayed: Cannot connect to NetScaler Gateway. Contact your help desk with following information: Endpoint analysis process failed.

Govern and secure data or device transfer for your segmented and air-gapped network environments.

MetaDefender KioskMetaDefender VaultMetaDefender DriveMetaDefender USB FirewallSecure Access

Secure local or remote access to your cloud applications, internal networks and resources.

MetaAccess PlatformMetaAccess SDPCloud Security for Salesforce File Upload Security

Prevent malicious file uploads that can compromise your networks.

MetaDefender ICAP ServerMetaDefender CoreMetaDefender Core AMIFile Upload Security AssessmentMetaDefender CloudMalware Analysis

Analyze suspicious files or devices with our platform on-prem or in the cloud.

MetaDefender CoreMetaDefender DriveMetaDefender CloudEmail Security

The majority of malware continues to be initiated via email. OPSWAT Protects Your Organization Against Advanced Email Attacks.

MetaDefender Email Gateway SecurityNetwork Access Control

Prevent risky devices including BYOD and IoT from accessing your networks with full endpoint visibility.

MetaAccess NACStorage Security

Protect your on-prem or cloud storage services and maintain regulatory compliance.

MetaDefender for Secure StorageMetaDefender VaultFor Developers

Join hundreds of security vendors benefiting from OPSWAT’s industry-leading device and data security technologies.

MetaDefender CloudMetaDefender CoreMetaAccessOESIS FrameworkTrust no file. Trust no device.AcademyAcademyCIP Cybersecurity Training

Use our on-demand courses to get trained and certified on cyber security concepts and best practices, critical infrastructure protection, and OPSWAT products and solution. Both introductory and advanced courses are available.

Courses and Certifications

The OPSWAT Academy consists of subject matter courses designed for the learner to build up their expertise using a phased approach.

For current OPSWAT customers, the Academy also includes advanced training courses for greater ease-of-use efficiency when operating and maintaining all OPSWAT products and services.

Available Certifications

Certified Cyber-security AssociateCertified MetaDefender AssociateCertified MetaAccess AssociateCertified Secure Data Workflow AssociateCritical Infrastructure Protection AssociateCertification Renewal

Each discipline certification is awarded for one year upon passing the exams on that discipline's courses in OPSWAT Academy.

In order to maintain active OCIPA Certification, make sure you stay current on all OPSWAT's individual discipline certifications.

OCIPA Certification RenewalTrust no file. Trust no device.PartnersPartnersAccess Control Certification Program

A Service that verified compatibility and effectiveness of endpoint next-gen antimalware, antimalware and disk encryption products.

Platinum Level ProductsGold Level ProductsAll ProductsTechnology Partners

Enhance threat prevention by integrating OPSWAT technologies. OPSWAT partners with technology leaders offering best-of-breed solutions with the goal of building an ecosystem dedicated to data security and compliance using integrated solutions.

Categories

Technology Alliance PartnerMalware Sharing ProgramMetaDefender Core Engine SupplierMetaDefender Cloud Engine SupplierChannel Partners

Our partner program is aimed at providing the most effective and innovative products and tools to help accelerate your business.

Channel Partner ProgramChannel Program ApplicationPartner Portal Channel Partner DirectoryTrust no file. Trust no device.ServicesServicesProfessional ServicesSecurity AssessmentsSolution ImplementationsCustom IntegrationsOngoing MaintenanceManaged ServicesSupport

The OPSWAT’s support team can provide you 24x7x365 coverage via phone, chat, or cases that you log with you.

Support PlansSupport Contact InfoOPSWAT Portal Create a Case Knowledge Center Online Documentation Training Services

Take advantage of our instructor led training (ILT) courses or onsite “walk the floor” coaching to augment and expand on the training received through OPSWAT Academy courses.

Training Courses“Floor Walking” Q&AOPSWAT Academy

Use our on-demand courses to get trained and certified on cyber security concepts and best practices, critical infrastructure protection, and OPSWAT products and solution. Both introductory and advanced courses are available.

About AcademySignup / Log inRenewCommunity

Join the conversation, and learn from others in our Community Forum. Our customers drive us forward, contribute product ideas, and get their questions answered.

Community ForumsJoin the CommunitySign in to ForumsTrust no file. Trust no device.CompanyCompanyAbout

OPSWAT provides Critical Infrastructure Protection solutions to protect against cyberattacks.

Management TeamContact UsCompliance and CertificationsCustomers

Over 1,000 customers worldwide trust OPSWAT to protect their digital assets and keep their data flows secure.

CustomersCase StudiesCareers

OPSWAT teams are filled with smart, curious and innovative people who are passionate about keeping the world safer. Join us, unleash your talent and help protect worldwide Critical Infrastructure.

Build your Career with OPSWATOpen PositionsEvents and Webinars

Learn how OPSWAT cybersecurity solutions can protect your organization against cyberattacks by visiting with us at conferences and attending webinars

EventsWebinarsNews & Media Center

OPSWAT news, media coverage, and brand resources.

BlogPress ReleasesBrand ResourcesResources

Resources to learn about critical infrastructure protection and OPSWAT products.

DatasheetsFree ToolsMarket Share ReportsResearch CenterVideosWhite Papers / eBookTrust no file. Trust no device.OPSWAT PortalTrust no file.
Trust no device.EN
  • EN
  • JP
  • DE
  • Advanced Cybersecurity Threat ProtectionProtecting the World’s Critical InfrastructureWatch videoSCHEDULE A DEMOREAD CYBERSECURITY NEWSWHAT IS CRITICAL INFRASTRUCTURE?DOWNLOAD CRITICAL INFRASTRUCTURE PROTECTION EBOOK
    We believe every file and every device poses a threat.

    Comprehensive Platforms to Power Critical Infrastructure Protection

    A comprehensive cybersecurity platform for preventing and detecting advanced cybersecurity threats across multiple data channels.

    VIEW DETAILS

    Confirm devices comply with security policies before accessing any cloud applications or local resources, while delivering cross-enterprise visibility on a single pane of glass.

    VIEW DETAILS

    Comprehensive Suite of Critical Infrastructure Protection Solutions

    Cross-Domain Solutions

    What Is Endpoint Analysis

    Critical infrastructure needs to move data and devices across isolated network domains safely.

    Citrix Endpoint Analysis Download Mac Operating System

    OPSWAT helps govern and secure data or device transfer for segmented and air-gapped network environments.

    Learn More

    Users working remotely and accessing cloud or internal services must comply with security policies, regardless of the device.

    OPSWAT secures local or remote access to cloud applications, internal networks and resources.

    Learn More

    Cybercriminals frequently use file uploads through web applications to spread malicious content and breach critical infrastructures.

    OPSWAT prevents malicious file uploads that can compromise your networks.

    Learn More

    Building environments and assembling tools for malware research is complex and costly.

    OPSWAT offers a single platform to analyze suspicious files or devices whether on-prem or in the cloud.

    Learn More

    The majority of malware continues to be initiated via email, particularly in targeted attacks.

    OPSWAT protects organizations against Advanced Email Zero-day Attacks via attachments, URLs, or spam.

    Learn More

    Device visibility, security compliance, and reporting are critical to effectively manage network access.

    OPSWAT prevents risky devices, including BYOD and IoT, from accessing networks with full endpoint visibility.

    Learn More

    Data storage creates malicious content risks and accidental leakage of sensitive data.

    OPSWAT protects on-prem or cloud storage services against malware and helps maintain regulatory compliance.

    Learn More

    Developers need access to a collection of APIs and tools to make it easier to develop and integrate advanced malware and endpoint protection capabilities into their solutions.

    OPSWAT offers access to industry-leading technologies in use by hundreds of security vendors around the world.


    CitrixLearn More

    The

    Learn how we deploy Deep CDR, Multiscanning, Proactive DLP, Endpoint Compliance, and other proven, industry leading cybersecurity technologies to provide a higher level of critical infrastructure protection.

    Deep CDR

    Content Disarm and Reconstruction (CDR) is an advanced threat prevention technology that does not rely on detection and is highly effective for preventing known and unknown threats, including zero-day targeted attacks.

    LEARN MORE

    Proactive DLP

    Proactive Data Loss Prevention (DLP) technology helps prevent data breaches and regulatory compliance violations by detecting and redacting sensitive and confidential data such as Personally Identifiable Information (PII) in files and emails.

    LEARN MORE

    Multiscanning

    Multiscanning is an advanced threat detection and prevention technology that increases threat detection rates approaching 100%, reduces outbreak detection to hours, and provides resiliency to anti-malware issues. OPSWAT Metascan® pioneered the concept of multiscanning files with over 30 anti-malware engines delivered on-premises or in the cloud.

    LEARN MORE

    Endpoint Compliance

    Endpoint Compliance technology detects and classifies over 5,000 applications on any endpoint. It enables monitoring and management of these applications, proactively assesses, and in many cases remediates application-specific settings to help organizations stay in control of compliance responsibilities.

    LEARN MORE

    Anti-keylogger

    Prevents malware and keyloggers from accessing keyboard communications by intercepting and encrypting keystrokes to ensure sensitive information is not spied on when unexpected software applications run in the background with malicious intent.

    LEARN MORE

    Screen Capture Protection

    Prevents unauthorized or accidental screenshots and recording by users, VDI, web collaboration tools, and malicious applications. It also prevents data breaches or sensitive information leakage when unsanctioned actions are taken without IT governance, particularly due to the explosive usage of video communication software.

    LEARN MORE

    Cybersecurity that works.
    Trusted by thousands of business worldwide.

    1000

    Global Customers

    Customers worldwide trust OPSWAT Solutions to protect their critical infrastructure.

    ↳ MORE

    70

    Technology Partners

    Cybersecurity partners trust OPSWAT to enhance their product capabilities.

    ↳ MORE

    90

    Certification Members

    Companies trust Access Control Certification to verify application compatibility.

    ↳ MORE

    Learn how OPSWAT can protect your critical infrastructure

    get started

    This website stores cookies on your computer. These cookies are used to improve the usability of this website and provide more personalized experience for you, both on this website and through other websites. To find out more about the cookies we use, see our Cookie Notice Policy.

    X
    downloadWhy can't I download this file?1.Basic Information Collection
    1. For ADC MPX/SDX, confirm serial number, for ADC VPX, confirm the ORG ID.
    2. ADC detail version, such as NS 13.0 build 47.24.
    3. ADC deployment, standalone or HA.
    4. Network topology with IP address, interface as detail as possible. (Note: if there is nstrace for information collection, provide the IP address as supplementary information.)
    5. Is there change on ADC and environment before the issue takes place?
    6. When does the issue happen first? (Attach the screenshot/video of error message if possible.)
    7. Does the issue happen consistently? Is it reproducible? If yes, provide detailed steps to reproduce the issue.
    2.Information Collection for Typical Scenario2.1 ADC crash - ADC show techsupport. - ADC kernel crashdump/NSPPE crashdump
    Note: Check whether there are dumps in /var/core or /var/crash folder
    2.2 ADC stops- If ADC is not manually rebooted, press NMI button to generate dump file and collection the dump as in 2.1. Refer the following KB article for NMI button:
    http://support.citrix.com/article/CTX120660- If ADC is already rebooted, collect show techsupport as in 3.3 . (Point out the timestamp of hang)2.3 ADC Hardware Error(MPX/SDX)1) ADC Fail to Boot:
    - Check whether there is display on LCD, take a picture of the LCD.
    - Connect ADC with console cable, check whether there is any output and save it as txt. Follow the steps when the cable connects:
    Refer the following docs for cable connections:
    For MPX click here
    For SDX click here2) ADC Power Supply:
    - Check whether ADC power supply red light is on, take a picture.
    - ADC show techsupport3) NetScaler Hard Disk:
    - ADC show techsupport
    - Run the following script:
    4) ADC LCD:
    - Take a picture of LCD2.4 Citrix Gateway (ICA proxy)
    1) Citrix Gateway Authentication Fail
    Information Collection:
    - ADC show techsupport
    - Citrix Gateway aaad.debug. Run the following command and save the output:
    More information:
    http://support.citrix.com/article/CTX1149992) Citrix Gateway Cannot Enumerate Application List, Error ”Cannot complete request.” or Redirecting to Blank Page:
    Information Collection:
    • Test to login directly via StoreFront, if there is any issue, resort to StoreFront Team.
    • ADC show techsupport
    • Citrix Gateway private key/session key
    • Capture on client, ADC, and Storefront, reproduce the issue, and stop the capture.
    • StoreFront event viewer logsPoint out the following information
    • Timestamp of reproduction
    • Client IP,Citrix Gateway VIP,Storefront IP
    • Error message screenshot
    More information:
    https://support.citrix.com/article/CTX2071623) App/Desktop cannot open via Citrix Gateway, error 1110, 1030 etc.
    Information Collection:
    - Test to open directly via StoreFront, if there is any issue, resort to XenApp/XenDesktop Team.
    - ADC show techsupport.
    - Change the default program of ica to notepad, save launch.ica
    Or save Launch.ica to client referring the following KB:
    http://support.citrix.com/article/CTX134993
    - Capture on client, ADC, and Storefront, reproduce the issue, and stop the capture.
    - Point out the following information
    • Timestamp of reproduction
    • Client IP,Citrix Gateway VIP, Storefront IP, VDA IP
    • Error message screenshot
    4) Citrix Gateway EPA Failure
    Information Collection:
    - Collect EPA log:
    https://support.citrix.com/article/CTX209148
    For more information: https://docs.citrix.com/en-us/citrix-gateway/current-release/vpn-user-config/advanced-endpoint-analysis-policies.html2.4 Citrix Gateway (SSLVPN)
    - ADC show techsupport.
    - Citrix Gateway private key/session key.
    - ADC network topology
    - For client issue, collect client log:
    https://support.citrix.com/article/CTX1381553.Information Collection Procedure3.1 ADC Serial Number1) Web GUI
    Access http://NSIP, check Serial no in Harware information, it’s 10 bits strings with number and alphabet.
    2) CLI
    SSH to ADC with putty, execute “show hardware”:
    3) Stamp on ADC Hardware backplane
    3.2 ADC Version/HA
    1) Web GUI
    Access http://NSIP, check version and node HA status
    2) CLI
    SSH to ADC with putty, execute ”show version”
    execute ”show ha node”
    3.3 ADC MPX/VPX show techsupport1) Web GUI
    2) CLI
    More information:
    http://support.citrix.com/article/CTX1279003.4 ADC ns.conf1) WebGUI
    2) WinSCP
    Save config first:
    Get ns.conf with WinSCP:
    3.5 ADC SDX1) For VPX on SDX show techsupport, refer 3.3
    2) For SVM and XenServer bundle:
    Choose Management Service and XenServer:
    3) CLI
    Logs locate at /var/mps/tech_support.
    More information click here3.6 ADM1) ADC show techsupport
    2) ADM support bundle
    System > Diagnostic > Technical Support:
    3.8 ADC Nstrace
    1) WebGUI
    Note: Set Packet Size to 0, and add expression filer if necessary, click ok.
    2) CLI
    Start nstrace:
    Stop nstrace:
    If filtering the IP address of 192.168.1.1:
    Nstrace locates at /var/nstrace/<timestamp>, download via WebGUI or with WinSCP
    3.9 iOS/Android/Windows/Mac receiver Log Collection
    1) iOS Receiver
    2) Android Receiver
    3) Windows Receiver
    http://support.citrix.com/article/CTX132883
    http://support.citrix.com/article/CTX141067
    4) Mac Receiver
    More information:
    https://www.citrix.com/blogs/2014/10/10/citrix-receivers-include-valuable-logging-for-troubleshooting/
    3.10 TAAS/CIS
    Upload the logs and trace to http://cis.citrix.com:
    - Login with Citrix account:
    - Click Diagnosis
    - Upload data
    - Input case number and upload file
    4.Appendix4.1 Remote Helpdesk Tool Download Link1) AnyDesk
    http://anydesk.com/download
    2) Teamviewer
    http://www.teamviewer.com/zhcn/download/windows/
    3) GoToMeeting
    http://support.citrixonline.com/en_US/Meeting/help_files/G2M0100024.2 Remote Troubleshooting Tool Download Link1) Putty
    http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
    2) WinSCP
    https://winscp.net/eng/download.php
    3) WireShark
    https://www.wireshark.org/download.html