Audit Antivirus
Paquet d’installation silencieuse pour Audit Antivirus
11-2
Security
Security
tis-audit-antivirus
Le paquet tis-audit-antivirus est un paquet d'audit qui liste les antivirus détectés sur la machine, leur état (activé ou non), ainsi que leurs informations de version.
Les données d'audit peuvent être consultées dans l'onglet "Données d'audit" de chaque machine, cliquez simplement sur la ligne correspondant à "audit-antivirus" pour afficher les données en-dessous.
ATTENTION ce paquet ne fonctionne pas pour les versions Server de Windows
- package: tis-audit-antivirus
- name: Audit Antivirus
- version: 11-2
- categories: Security
- maintainer: WAPT Team,Tranquil IT,Simon Fonteneau
- licence: wapt_public
- target_os: windows
- architecture: all
- signature_date:
- size: 7.01 Ko
package : tis-audit-antivirus
version : 11-2
architecture : all
section : base
priority : optional
name : Audit Antivirus
categories : Security
maintainer : WAPT Team,Tranquil IT,Simon Fonteneau
description : Audit antivirus status
depends :
conflicts :
maturity : PROD
locale :
target_os : windows
min_wapt_version : 2.3
sources :
installed_size :
impacted_process :
description_fr :
description_pl :
description_de :
description_es :
description_pt :
description_it :
description_nl :
description_ru :
audit_schedule : 1d
editor :
keywords : antivirus,anti,virus,edr
licence : wapt_public
homepage :
package_uuid : 2186710a-3bf2-4883-80aa-42efd7945716
valid_from :
valid_until :
forced_install_on :
changelog :
min_os_version : 10
max_os_version :
icon_sha256sum : f87a212670887a0473cefbcfb6102392de93b44cf812ba8b9af33244ece1f6e2
signer : Tranquil IT
signer_fingerprint: 8c5127a75392be9cc9afd0dbae1222a673072c308c14d88ab246e23832e8c6bb
signature_date : 2026-03-13T11:00:26.000000
signed_attributes : package,version,architecture,section,priority,name,categories,maintainer,description,depends,conflicts,maturity,locale,target_os,min_wapt_version,sources,installed_size,impacted_process,description_fr,description_pl,description_de,description_es,description_pt,description_it,description_nl,description_ru,audit_schedule,editor,keywords,licence,homepage,package_uuid,valid_from,valid_until,forced_install_on,changelog,min_os_version,max_os_version,icon_sha256sum,signer,signer_fingerprint,signature_date,signed_attributes
signature : S1zgM8DPoMnIw0g5C/VGOCHKTMUwp8B6W1GHgTI8UdMu+picXztuHpawgc6kaqKHbtxYaOp/7whRAaD6Glvw0PhTzCF6YpP2u+bfuDiw4IoaIa/3jJf9V3RDOVAUmjwCX6WXG58C3HuRjNz7DiRXcL65/AcJMv2F7oZAIvwIY+4PZShqW/950MEMCc64xXnL80stNX1q6IRTQJiWmEs++kgg2WwcWXRcBFybDxcppirV2qmYlK6nHzTNTCmgaa9H7YZUJzQUBACf4chEBzD8K1rVHw+YdILS2dIpDNoodVAn5Nuj+YhsZs+4xvZp+GPmshwByFGMhLu8RkEsgCOUQg==
# -*- coding: utf-8 -*-
from setuphelpers import *
def install():
pass
def audit():
data = {u["name"].replace(" ", "-").strip(): u for u in get_antivirus_info2()}
WAPT.write_audit_data_if_changed("audit-antivirus", "audit-antivirus", data)
return "OK"
def get_antivirus_info2():
list_av = []
try:
objWMI = run_powershell('Get-CimInstance -Namespace "root/SecurityCenter2" -ClassName "AntiVirusProduct"')
for obj in objWMI:
dict_av_info = {}
dict_av_info["instanceGuid"] = str(objWMI.get("instanceGuid",""))
if not dict_av_info["instanceGuid"]:
continue
dict_av_info['name'] = objWMI.get('displayName',"")
dict_av_info["pathToSignedProductExe"] = str(objWMI.get("pathToSignedProductExe",""))
dict_av_info["pathToSignedReportingExe"] = str(objWMI.get("pathToSignedReportingExe",""))
dict_av_info["productState"] = str(objWMI.get("productState",""))
dict_av_info["timestamp"] = str(objWMI.get("timestamp",""))
if "Windows Defender" in dict_av_info['name'] :
objWMI = run_powershell('Get-CimInstance -Namespace "root/microsoft/windows/defender" -ClassName "MSFT_MpComputerStatus"')
dict_av_info["AMProductVersion"] = str(objWMI.get("AMProductVersion",""))
dict_av_info["AntivirusEnabled"] = str(objWMI.get("AntivirusEnabled",""))
dict_av_info["AntivirusSignatureVersion"] = str(objWMI.get("AntivirusSignatureVersion",""))
if not dict_av_info["AntivirusSignatureVersion"]:
dict_av_info["AntivirusSignatureVersion"] = registry_readstring(HKEY_LOCAL_MACHINE,"SOFTWARE/Microsoft/Windows Defender/Signature Updates","AVSignatureVersion")
#TODO https://github.com/fusioninventory/fusioninventory-agent/blob/df6e8e10e498ec4d7a8a883568a8474a329dbb16/lib/FusionInventory/Agent/Task/Inventory/Win32/AntiVirus.pm#L120
if "McAfee" in dict_av_info['name'] :
pass
if "Kaspersky" in dict_av_info['name'] :
pass
if "ESET" in dict_av_info['name'] :
pass
if "McAfee" in dict_av_info['name'] :
pass
if "Avira" in dict_av_info['name'] :
pass
if "Security Essentials" in dict_av_info['name'] :
pass
if "F-Secure" in dict_av_info['name'] :
pass
if "Bitdefender" in dict_av_info['name'] :
pass
if "Norton" in dict_av_info['name'] :
pass
list_av.append(dict_av_info)
except:
raise
return list_av
5a82af8a22d9363b299657aee320a0f55434438e553bd042681a8933290ee9aa : WAPT/README.md
8a7d67484ebb7a10bd8b6e1cec2c4ce7391b600c946fefbc4e8dc8cec1ac3f0c : WAPT/README_fr.md
38d056ab130f7bf7c481c12636a4e9959de36561d3dfcbe54c6e3571bc0c1dc3 : WAPT/certificate.crt
f9afb3b43d84587790653c3835bc13af1ac5b272f95cf108ff9ba9b55fa1c196 : WAPT/control
f87a212670887a0473cefbcfb6102392de93b44cf812ba8b9af33244ece1f6e2 : WAPT/icon.png
4eee1141ee0db203dfce8e5eccc1bd23bb62f83fa9ec21df96c4e7d5a4a11258 : luti.json
32e86e3727abebcc7189c13fa4f1e3d6923a3ef9cc85e8aa47d1076f0efd8a41 : setup.py