Getting Started

OPSWAT MetaDefender IT Access is free up to 50 devices. You can check out our product price guideline here

This section walks you through steps to set up your account to start monitoring your devices.

Visit OPSWAT Accounts to sign up for an account. You will receive an email on how to activate your account.

You can use this account to log into OPSWAT Cloud services such as MetaDefender IT Access, MetaDefender Cloud, OPSWAT Portal to download on-premise products, and to access the Support portal.

Getting Set Up

  1. Log into MetaDefender IT Access console after setting up your account.
  2. When you are in the MetaDefender IT Access console, your account is set up with default settings. You can update them later.
  3. Click +Device to download an MetaDefender Endpoint installer.
  4. A new window will appear with the installer options available for your device's detected operating system.
  5. Once your installer is downloaded, run the installer to complete the installation process.
  6. On MetaDefender IT Access console, navigate to Inventory > Devices, you should see your device there. It takes the MetaDefender Endpoint up to a minute to collect compliance data on your device to report back to MetaDefender IT Access.

Now it’s time for you to explore MetaDefender IT Access offers.

  • To gather device information, navigate to Inventory > Devices . Click on your device to check your device details such as: compliance status, number of compliance issue, group assignment, policy assignment, system information, event logs, access status for protected applications, and device compliance information.

  • To gather information and create policies, navigate to Policies. You can view the default policy that is created with your account by selecting the policy. To create new policies, simply select the Create New Policy button on the Policies page.

  • MetaDefender IT Access offers deep endpoint compliance check based on your policy settings: a. Check your anti-malware protection and verify that it is configured properly. b. Ensure your hard disk is encrypted.

    c. Verify operating system is up-to-date and alert for missing patches.

    d. Confirm that device is not riddled with hidden malware.

    e. Report device's backup frequency.

  • MetaDefender IT Access also offers an overview about vulnerabilities on your endpoints. By navigating to Vulnerabilities, you can view detected CVE's and their level of severity.

  • You can also manage applications installed on endpoints at a global level. You can view this by navigating to Inventory > Applications.

  • MetaDefender IT Access offers a wideset of access control options You can protect your applications/resources. Learn more here.

  • You are able to integrate MetaDefender IT Access with your VMware Unified Access Gateway or other VPN/NAC solutions to empower your security with device compliance checks or your own solution.

Type to search, ESC to discard
Type to search, ESC to discard
Type to search, ESC to discard