top of page
T500定制 (72) [轉換]-01.png

Ensuring Unprecedented Safety in a Connected World with Janus.

LATEST NEWS

SEMI E187 FAQ: Do equipment vendors need to pre-install antivirus software before shipment?

  • 4 hours ago
  • 2 min read
Conclusion: No. For “Endpoint Protection” in SEMI E187, the focus is on being able to deliver verifiable "clean evidence" at shipment, and ensuring your equipment/tool is compatible with mainstream commercial anti-malware solutions. The standard does not mandate that you must ship the tool with a specific anti-virus product pre-installed on the machine.


1) What the standard truly requires: "Perform malware scanning before shipment and deliver the scan report"

The core requirement of SEMI E187 regarding malware scanning is: you must complete a Malware Scan before shipment and provide the scan report as evidence. The report should clearly state:

  • The scanning tool used (name and version)

  • Scanning scope of coverage

  • Scanning configuration

  • Scanning date

  • Scanning results and remediation conclusion (the final report must show no malware)


In practice, auditors/customers care most about whether the evidence is traceable, repeatable, and time-valid. Verification checklists typically include a principle such as "the report must be completed within a reasonable validity period (commonly within one month, aligned with signature/database currency or scan validity)"—to prevent outdated scan results from being used as shipment evidence.


Key point: E187 requires "scan + report (evidence)," not "mandatory pre-installation of anti-virus at shipment."



2) Another key requirement: "Compatibility" — you must explain which mainstream anti-malware can be used and how

Another important part of SEMI E187's Anti-Malware requirement is that the equipment vendor should provide documentation specifying the mainstream commercial anti-malware solutions compatible with the tool/equipment, and (in a verification scenario) be able to demonstrate that they operate normally without impacting essential equipment functions.


The logic is practical:

  • Fabs/equipment owners typically already have standardized security tools (EPP/AV/EDR). They do not want every equipment vendor to bundle a different product, creating an operational nightmare.

  • Therefore, the standard cares more about whether your equipment is in a state that can be managed by the customer's existing anti-malware (compatible, installable, with clear recommended settings, and not destabilized by installation).


Key point: E187 asks you to "list compatibility + provide recommended configuration/operation guidance," not to "force bundling or pre-installation."



Why is it often misunderstood as "anti-virus must be pre-installed"?

Many people misread "Malware Scanning" as "the tool must have a resident anti-virus running on the machine."

In the E187 context, at least two things should be separated:

  1. Pre-shipment cleanliness verification (Proof of Cleanliness): you deliver a report proving the tool is clean at the time of shipment.

  2. Ongoing protection in the customer environment (Ongoing Protection): whether to run a resident agent and how to operate it is usually the fab's policy and responsibility. The equipment vendor's role is to provide compatibility + guidance so the fab can adopt their standard controls smoothly.



Want to confirm quickly how your tool/equipment can meet SEMI E187?

If you'd like our help interpreting the clauses and organizing deliverable templates for pre-shipment malware scanning evidence and anti-malware compatibility documentation, please contact us.

bottom of page