The Metadefender Kiosk enables you to create unique workflows for individuals and groups and clearly specify how data from those users will be controlled in just a few simple steps.
Step 1: Properties & Management
When creating a new policy, Metadefender Kiosk allows you to choose which users the policy will apply to, making use of users listed through Active Directory or on the local machine. When users visit a Metadefender Kiosk station, they will be required to log in so that the correct workflow can be followed. In addition, Metadefender Kiosk allows you to define a custom authentication module so that you can authenticate users with other methods as well.
Step 2: User Questions Policy
You can define custom questions for users to answer after they have logged into the Metadefender Kiosk station. For example, you may want to ask employees for details about the media and files they will be scanning or ask guests for the purpose of their visit.
Step 3: Media Types
Metadefender allows you to specify which media types are allowed to be scanned. CDs, DVDs, and floppy discs can all be disabled if you are not expecting users to scan them.
Step 4: Scan with Metadefender Core
Metadefender Kiosk leverages the power of Metadefender Core’s multi-scanning and data sanitization technology. This enables you to check for known malware on data coming into your organization. You can select which Metadefender Core workflow you would like each Metadefender Kiosk workflow to use. Customers can configure the scanning and data sanitization options through the Metadefender Core console, including configuration of the following:
- Archive Handling: Extract files from archives to be scanned and block malicious archives and archive bombs.
- File Type Analysis: Filter files based on file type and size.
- Data Sanitization: Sanitize document and image files, removing potentially malicious embedded objects even if they are not detected by any of the antivirus engines.
Metadefender Core and the Metadefender Kiosk can be deployed in both connected and offline/air-gap environments. Option details are listed on the deployment options page.
Step 5: File Handling for Blocked Files
These steps explain how to configure the post-processing of files, which is done once your filters have been applied. First, you will configure handling of files that have been blocked (whether based on file type and size or Metadefender Core results) using the options in the screen below.
For any blocked file (whether converted or not), you can choose whether to take no action, to remove (quarantine or delete) the file from the media device, or to copy the file to a specified location (for example, a quarantine location where files can be accessed for further analysis). This can include user-provided media, secure network storage, or a Metadefender Secure File Transfer Server. You can also choose to run a custom command line script.
Step 6: File Handling for Allowed Files
Similar file handling options are available for allowed files. You can also choose to take no action on allowed files, move them to a specified location (for example, an internal location where files can be accessed for use inside the network), which can include user-provided media, secure network storage, or a Metadefender Secure File Transfer Server. You also have the option to run a custom command line script.
Step 7: Printing Policy
The final configuration step allows you to determine whether users will have the option to print a receipt summarizing the results of their Metadefender Kiosk session. This printed receipt can be used for logging or auditing purposes or as proof that the scanned media can be brought into the facility.