Thanks for the question - could you please let us know which version of FME you are experiencing difficulties with?
All of our installers and principle executables, such as fmeworkbench.exe and fmedatainspector.exe, should be digitally signed with signatures from the CA GlobalSign.
We do not currently sign individual dlls.
Some AV programs that rely on volume of installations across their user-base to verify software do occasionally have an issue with FME beta builds (due to their limited exposure).
Thank you so much for your early response.
We have "fme-desktop-b15253-win-x64" release.
In fact, this is something that happens to us in every new version, so it is not necessarily related with Beta versions.
We would really much appreciate if you can also sign every single executable file (including dll's). To my understanding, it is usually not big deal to do so during the compilation/build process but, of course, this is your process. Would it be possible for you to do so?
Thanks for all, best regards,
Would it be possible to let us know what anti-virus product you are working with? An offline ticket with support would be great if this is sensitive information (especially regarding the specific security policies).
This would help us test and explore options to better sign the product in future. I did install your build (FME 2015.0) to check signing and (on my installation) the msi and the major executables were signed via GlobalSign, though not the dlls, as you note, which would be quite a departure for our build process. Thanks!
HI,
We are using Panda Adaptive Defense 360 in "Lock" mode,
it’s means that any executable file that is unknown by Panda Cloud will be
blocked, that includes all Portable Executable extensions (.acm, .ax, .cpl,
.dll, .drv, .efi, .exe, .mui, .ocx, .scr, .sys, .tsp)
To avoid such blockages with legitimate programs, it is recommended that
al PE executables be digitally signed with certificates issued by a trusted
public CA.
Kind regards
HI,
We are using Panda Adaptive Defense 360 in "Lock" mode,
it’s means that any executable file that is unknown by Panda Cloud will be
blocked, that includes all Portable Executable extensions (.acm, .ax, .cpl,
.dll, .drv, .efi, .exe, .mui, .ocx, .scr, .sys, .tsp)
To avoid such blockages with legitimate programs, it is recommended that
al PE executables be digitally signed with certificates issued by a trusted
public CA.
Kind regards
Thanks for additional information, this has been added to the internal case that you have raised with support.
Please note that a Safe Software support ticket has been filed to investigate and address this question, and that if you experience the same issue or have the same concerns, please don't hesitate to contact our support team here.
I'm pleased to let you know that as of FME 2020.1.2.1 (build 20624) and newer, there are no longer any unsigned EXEs or DLLs in FME Desktop.