MyWorkSpace If the myWorkSpace Plug-in is installed and not running, click 'Start > All Programs > Citrix > myWorkSpace ' to start the application. If the myWorkSpace Plug-in is not installed, click Download to install the software and connect automatically.
- Our antivirus check shows that this download is safe. This free software is a product of Citrix Systems, Inc. The software is sometimes distributed under different names, such as 'Citrix online plug-in', 'Citrix online plug-in - web', 'Citrix Online Plug-in PNA'. The most popular versions among Citrix Online Plug-in Web users are 12.3, 12.1.
- 1) WebGUI Note: Set Packet Size to 0, and add expression filer if necessary, click ok. 2) CLI Start nstrace: Stop nstrace: If filtering the IP address of 192.168.1.1.
- Dec 11, 2020 When users log on to Citrix Gateway, they download and install the Citrix Gateway plug-in on the user device. To install the plug-in, users must be a local administrator or a member of the Administrators group. This restriction applies for first-time installation only. Plug-in upgrades do not require administrator level access.
- When using End Point Analysis (EPA), the plug-in fails to start or fails to scan after starting on MAC. Using a web browser does not initiate the scan, even when using ICA-Proxy for EPA. The following errors are displayed: Cannot connect to NetScaler Gateway. Contact your help desk with following information: Endpoint analysis process failed.
Govern and secure data or device transfer for your segmented and air-gapped network environments.
MetaDefender KioskMetaDefender VaultMetaDefender DriveMetaDefender USB FirewallSecure AccessSecure local or remote access to your cloud applications, internal networks and resources.
MetaAccess PlatformMetaAccess SDPCloud Security for Salesforce File Upload SecurityPrevent malicious file uploads that can compromise your networks.
MetaDefender ICAP ServerMetaDefender CoreMetaDefender Core AMIFile Upload Security AssessmentMetaDefender CloudMalware AnalysisAnalyze suspicious files or devices with our platform on-prem or in the cloud.
The majority of malware continues to be initiated via email. OPSWAT Protects Your Organization Against Advanced Email Attacks.
MetaDefender Email Gateway SecurityNetwork Access ControlPrevent risky devices including BYOD and IoT from accessing your networks with full endpoint visibility.
Protect your on-prem or cloud storage services and maintain regulatory compliance.
Join hundreds of security vendors benefiting from OPSWAT’s industry-leading device and data security technologies.
Use our on-demand courses to get trained and certified on cyber security concepts and best practices, critical infrastructure protection, and OPSWAT products and solution. Both introductory and advanced courses are available.
Courses and CertificationsThe OPSWAT Academy consists of subject matter courses designed for the learner to build up their expertise using a phased approach.
For current OPSWAT customers, the Academy also includes advanced training courses for greater ease-of-use efficiency when operating and maintaining all OPSWAT products and services.
Available Certifications
Certified Cyber-security AssociateCertified MetaDefender AssociateCertified MetaAccess AssociateCertified Secure Data Workflow AssociateCritical Infrastructure Protection AssociateCertification RenewalEach discipline certification is awarded for one year upon passing the exams on that discipline's courses in OPSWAT Academy.
In order to maintain active OCIPA Certification, make sure you stay current on all OPSWAT's individual discipline certifications.
OCIPA Certification RenewalTrust no file. Trust no device.PartnersPartnersAccess Control Certification ProgramA Service that verified compatibility and effectiveness of endpoint next-gen antimalware, antimalware and disk encryption products.
Platinum Level ProductsGold Level ProductsAll ProductsTechnology PartnersEnhance threat prevention by integrating OPSWAT technologies. OPSWAT partners with technology leaders offering best-of-breed solutions with the goal of building an ecosystem dedicated to data security and compliance using integrated solutions.
Categories
Technology Alliance PartnerMalware Sharing ProgramMetaDefender Core Engine SupplierMetaDefender Cloud Engine SupplierChannel PartnersOur partner program is aimed at providing the most effective and innovative products and tools to help accelerate your business.
Channel Partner ProgramChannel Program ApplicationPartner Portal Channel Partner DirectoryTrust no file. Trust no device.ServicesServicesProfessional ServicesSecurity AssessmentsSolution ImplementationsCustom IntegrationsOngoing MaintenanceManaged ServicesSupportThe OPSWAT’s support team can provide you 24x7x365 coverage via phone, chat, or cases that you log with you.
Support PlansSupport Contact InfoOPSWAT Portal Create a Case Knowledge Center Online Documentation Training ServicesTake advantage of our instructor led training (ILT) courses or onsite “walk the floor” coaching to augment and expand on the training received through OPSWAT Academy courses.
Training Courses“Floor Walking” Q&AOPSWAT AcademyUse our on-demand courses to get trained and certified on cyber security concepts and best practices, critical infrastructure protection, and OPSWAT products and solution. Both introductory and advanced courses are available.
About AcademySignup / Log inRenewCommunityJoin the conversation, and learn from others in our Community Forum. Our customers drive us forward, contribute product ideas, and get their questions answered.
Community ForumsJoin the CommunitySign in to ForumsTrust no file. Trust no device.CompanyCompanyAboutOPSWAT provides Critical Infrastructure Protection solutions to protect against cyberattacks.
Management TeamContact UsCompliance and CertificationsCustomersOver 1,000 customers worldwide trust OPSWAT to protect their digital assets and keep their data flows secure.
CustomersCase StudiesCareersOPSWAT teams are filled with smart, curious and innovative people who are passionate about keeping the world safer. Join us, unleash your talent and help protect worldwide Critical Infrastructure.
Build your Career with OPSWATOpen PositionsEvents and WebinarsLearn how OPSWAT cybersecurity solutions can protect your organization against cyberattacks by visiting with us at conferences and attending webinars
EventsWebinarsNews & Media CenterOPSWAT news, media coverage, and brand resources.
BlogPress ReleasesBrand ResourcesResourcesResources to learn about critical infrastructure protection and OPSWAT products.
Trust no device.EN
We believe every file and every device poses a threat. OPSWAT Critical Infrastructure Protection Solutions are engineered to support our zero-trust philosophy and powered by a comprehensive, modular suite of products to address a wide range of cybersecurity use cases.
Comprehensive Platforms to Power Critical Infrastructure Protection
MetaDefender
A comprehensive cybersecurity platform for preventing and detecting advanced cybersecurity threats across multiple data channels.
VIEW DETAILSMetaAccess
Confirm devices comply with security policies before accessing any cloud applications or local resources, while delivering cross-enterprise visibility on a single pane of glass.
VIEW DETAILSComprehensive Suite of Critical Infrastructure Protection Solutions
Cross-Domain SolutionsWhat Is Endpoint Analysis
Critical infrastructure needs to move data and devices across isolated network domains safely.
Citrix Endpoint Analysis Download Mac Operating System
OPSWAT helps govern and secure data or device transfer for segmented and air-gapped network environments.
Learn MoreUsers working remotely and accessing cloud or internal services must comply with security policies, regardless of the device.
OPSWAT secures local or remote access to cloud applications, internal networks and resources.
Cybercriminals frequently use file uploads through web applications to spread malicious content and breach critical infrastructures.
OPSWAT prevents malicious file uploads that can compromise your networks.
Learn MoreBuilding environments and assembling tools for malware research is complex and costly.
OPSWAT offers a single platform to analyze suspicious files or devices whether on-prem or in the cloud.
Learn MoreThe majority of malware continues to be initiated via email, particularly in targeted attacks.
OPSWAT protects organizations against Advanced Email Zero-day Attacks via attachments, URLs, or spam.
Learn MoreDevice visibility, security compliance, and reporting are critical to effectively manage network access.
OPSWAT prevents risky devices, including BYOD and IoT, from accessing networks with full endpoint visibility.
Data storage creates malicious content risks and accidental leakage of sensitive data.
OPSWAT protects on-prem or cloud storage services against malware and helps maintain regulatory compliance.
Learn MoreDevelopers need access to a collection of APIs and tools to make it easier to develop and integrate advanced malware and endpoint protection capabilities into their solutions.
OPSWAT offers access to industry-leading technologies in use by hundreds of security vendors around the world.
The OPSWAT Difference
Learn how we deploy Deep CDR, Multiscanning, Proactive DLP, Endpoint Compliance, and other proven, industry leading cybersecurity technologies to provide a higher level of critical infrastructure protection.Deep CDR
Content Disarm and Reconstruction (CDR) is an advanced threat prevention technology that does not rely on detection and is highly effective for preventing known and unknown threats, including zero-day targeted attacks.
LEARN MORE
Proactive DLP
Proactive Data Loss Prevention (DLP) technology helps prevent data breaches and regulatory compliance violations by detecting and redacting sensitive and confidential data such as Personally Identifiable Information (PII) in files and emails.
LEARN MORE
Multiscanning
Multiscanning is an advanced threat detection and prevention technology that increases threat detection rates approaching 100%, reduces outbreak detection to hours, and provides resiliency to anti-malware issues. OPSWAT Metascan® pioneered the concept of multiscanning files with over 30 anti-malware engines delivered on-premises or in the cloud.
LEARN MORE
Endpoint Compliance
Endpoint Compliance technology detects and classifies over 5,000 applications on any endpoint. It enables monitoring and management of these applications, proactively assesses, and in many cases remediates application-specific settings to help organizations stay in control of compliance responsibilities.
LEARN MORE
Anti-keylogger
Prevents malware and keyloggers from accessing keyboard communications by intercepting and encrypting keystrokes to ensure sensitive information is not spied on when unexpected software applications run in the background with malicious intent.
LEARN MORE
Screen Capture Protection
Prevents unauthorized or accidental screenshots and recording by users, VDI, web collaboration tools, and malicious applications. It also prevents data breaches or sensitive information leakage when unsanctioned actions are taken without IT governance, particularly due to the explosive usage of video communication software.
LEARN MORE
Cybersecurity that works.
Trusted by thousands of business worldwide.
1000Global Customers
Customers worldwide trust OPSWAT Solutions to protect their critical infrastructure.
↳ MORE
70Technology Partners
Cybersecurity partners trust OPSWAT to enhance their product capabilities.
↳ MORE
90Certification Members
Companies trust Access Control Certification to verify application compatibility.
↳ MORE
Learn how OPSWAT can protect your critical infrastructureget started
This website stores cookies on your computer. These cookies are used to improve the usability of this website and provide more personalized experience for you, both on this website and through other websites. To find out more about the cookies we use, see our Cookie Notice Policy.
- For ADC MPX/SDX, confirm serial number, for ADC VPX, confirm the ORG ID.
- ADC detail version, such as NS 13.0 build 47.24.
- ADC deployment, standalone or HA.
- Network topology with IP address, interface as detail as possible. (Note: if there is nstrace for information collection, provide the IP address as supplementary information.)
- Is there change on ADC and environment before the issue takes place?
- When does the issue happen first? (Attach the screenshot/video of error message if possible.)
- Does the issue happen consistently? Is it reproducible? If yes, provide detailed steps to reproduce the issue.
Note: Check whether there are dumps in /var/core or /var/crash folder
http://support.citrix.com/article/CTX120660
- Check whether there is display on LCD, take a picture of the LCD.
- Connect ADC with console cable, check whether there is any output and save it as txt. Follow the steps when the cable connects:
Refer the following docs for cable connections:
For MPX click here
For SDX click here
- Check whether ADC power supply red light is on, take a picture.
- ADC show techsupport
- ADC show techsupport
- Run the following script:
- Take a picture of LCD
1) Citrix Gateway Authentication Fail
Information Collection:
- ADC show techsupport
- Citrix Gateway aaad.debug. Run the following command and save the output:
More information:
http://support.citrix.com/article/CTX114999
Information Collection:
- Test to login directly via StoreFront, if there is any issue, resort to StoreFront Team.
- ADC show techsupport
- Citrix Gateway private key/session key
- Capture on client, ADC, and Storefront, reproduce the issue, and stop the capture.
- StoreFront event viewer logsPoint out the following information
- Timestamp of reproduction
- Client IP,Citrix Gateway VIP,Storefront IP
- Error message screenshot
https://support.citrix.com/article/CTX207162
Information Collection:
- Test to open directly via StoreFront, if there is any issue, resort to XenApp/XenDesktop Team.
- ADC show techsupport.
- Change the default program of ica to notepad, save launch.ica
Or save Launch.ica to client referring the following KB:
http://support.citrix.com/article/CTX134993
- Capture on client, ADC, and Storefront, reproduce the issue, and stop the capture.
- Point out the following information
- Timestamp of reproduction
- Client IP,Citrix Gateway VIP, Storefront IP, VDA IP
- Error message screenshot
Information Collection:
- Collect EPA log:
https://support.citrix.com/article/CTX209148
For more information: https://docs.citrix.com/en-us/citrix-gateway/current-release/vpn-user-config/advanced-endpoint-analysis-policies.html
- ADC show techsupport.
- Citrix Gateway private key/session key.
- ADC network topology
- For client issue, collect client log:
https://support.citrix.com/article/CTX138155
Access http://NSIP, check Serial no in Harware information, it’s 10 bits strings with number and alphabet.
2) CLI
SSH to ADC with putty, execute “show hardware”:
3) Stamp on ADC Hardware backplane
3.2 ADC Version/HA |
Access http://NSIP, check version and node HA status
2) CLI
SSH to ADC with putty, execute ”show version”
execute ”show ha node”
2) CLI
More information:
http://support.citrix.com/article/CTX127900
2) WinSCP
Save config first:
Get ns.conf with WinSCP:
2) For SVM and XenServer bundle:
Choose Management Service and XenServer:
3) CLI
Logs locate at /var/mps/tech_support.
More information click here
2) ADM support bundle
System > Diagnostic > Technical Support:
3.8 ADC Nstrace |
Note: Set Packet Size to 0, and add expression filer if necessary, click ok.
2) CLI
Start nstrace:
Stop nstrace:
If filtering the IP address of 192.168.1.1:
Nstrace locates at /var/nstrace/<timestamp>, download via WebGUI or with WinSCP
3.9 iOS/Android/Windows/Mac receiver Log Collection |
2) Android Receiver
3) Windows Receiver
http://support.citrix.com/article/CTX132883
http://support.citrix.com/article/CTX141067
4) Mac Receiver
More information:
https://www.citrix.com/blogs/2014/10/10/citrix-receivers-include-valuable-logging-for-troubleshooting/
3.10 TAAS/CIS |
- Login with Citrix account:
- Click Diagnosis
- Upload data
- Input case number and upload file
http://anydesk.com/download
2) Teamviewer
http://www.teamviewer.com/zhcn/download/windows/
3) GoToMeeting
http://support.citrixonline.com/en_US/Meeting/help_files/G2M010002
http://www.chiark.greenend.org.uk/~sgtatham/putty/download.html
2) WinSCP
https://winscp.net/eng/download.php
3) WireShark
https://www.wireshark.org/download.html