Thanks David for your suggestions.
We discussed with my client your first workaround proposal during last week (to change the ISE rules for some exceptions) but they are still evaluating the request.... I’m just a remote user, and a provider of the VPN’s owner. And by the moment (since Microsoft has stopped distributing this update) we have few machines affected by this problem.
Regarding your second suggestion, my AV is properly updated (by the daily automatic update).
My surprise was, following the steps indicated in the note, that Windows Defender (not my SCEP, but not sure) reported, (when running MpCmdRun.exe -removedefinitions -dynamicsignatures)
Service Version: 0.0.0.0
Engine Version: 0.0.0.0
Could it be related to the HotScan “confusion”?
My second workaround was to uninstall the 1809 update, but it could be done just in the first ten days after the update, so now is too late.
My third workaround was to install another antivirus protection, along with my SCEP. It will deactivate de AV features of SCEP and would be recognized as a valid AV product and definitions (provided it is in the Cisco’s list). I made a lab using Avira free, and it was Ok. I could see both AV/AS products, Avira with the right definition values. But again, is not an option for me, since I can’t install unauthorized software nor modify the security settings of my corporative machine.
Thanks again,
Fernando