We utilize artificial intelligence for site translations, and while we strive for accuracy, they may not always be 100% precise. Your understanding is appreciated.
Visualization of MetaDefender Core adaptive sandbox analysis, showing malicious files

Adaptive Sandbox Module for MetaDefender Core

OPSWAT’s multi-layered adaptive sandbox solution is available as embedded and remote modules for rapid threat detection in MetaDefender Core.

Adaptive Threat Analysis in MetaDefender Core

Adaptive Sandbox dynamically detects complex and evasive malware threats. It’s integrated directly into MetaDefender Core for enhanced orchestration and rapid detection in larger security workflows.

  • Threat agnostic analysis of files and URLs
  • Emulation of all targeted applications (Microsoft Office, PDF readers, and more)
  • Indicator-of-Compromise (IOC) extraction
  • Dynamic analysis fast-pass engine for targeted attack detection
MetaDefender Core
Screenshot of MetaDefender Core, displaying file scan details, sandbox threat detection, and options for deeper content reconstruction
Detailed view of adaptive sandbox scan, highlighting malicious indicators and their severity

The Right Module Type for You 

Embedded Engine
Remote Engine
Best Use Case
Contains a bundled Adaptive Threat Analysis (ATA) engine, suitable for offline environments. Provides full sandbox functionality without external connectivity.
Recommended for most use cases where high-performance, cloud-based, or hybrid environments are involved.
Advantages
Focuses on detection at speed 
Focuses on IOC extraction, analysis depth and richness of reports
Implementation
Runs natively on MetaDefender Core; supports all OS types supported by MetaDefender Core
Utilizes a deployed standalone instance of MetaDefender Sandbox via API

Embedded and Remote Adaptive Sandbox Engine 

The following table outlines Adaptive Sandbox remote and embedded engine feature set. It doesn’t include platform features, such as the API coverage, configurable ACL (Access Control List), OAuth integration, CEF (Common Event Format) syslog feedback, etc. Please contact us to book a technical presentation and get a run-through of all platform features and capabilities.

MetaDefender Sandbox Integrations

ImplementationAppliance
IntegrationAPI & Web Interface Integration​
  • REST API (OpenAPI documented)
  • File and URL submissions via GUI
  • Threat hunting and reputation lookups
Email Integrations & Format Support​​
  • Automatic data ingestion (IMAP)
  • MBOX, MSG file support
Security Orchestration, Automation, and Response (SOAR) Integrations​​​
  • Palo Alto Cortex XSOAR
  • Splunk SOAR
  • AssemblyLine 4
SIEM Integrations​​​​ Common Event Format (CEF) Syslog Feedback
DeploymentOPSWAT Threat Detection & Prevention Platform
  • MetaDefender Core
  • MetaDefender Cloud
  • MetaDefender ICAP Server
  • MetaDefender Storage Security
  • MetaDefender Kiosk
  • Metascan
Report Format/ Data ExportReport Formats
  • MISP
  • STIX 2.1
  • HTML, PDF, JSON
Scripting & Automation ToolsPython
  • Python CLI
  • Pip package management
Industries

Purpose-Built for Every Sector

  • Energy & Utility

    Transfer critical infrastructure data between IT-OT securely.

  • Manufacturing

    Transfer operational updates into and operational data out of critical sites

  • Government

    Transfer classified documents, and sensitive government data.

  • Finance

    Transfer sensitive customer information and trade secrets.

  • Healthcare

    Transfer of patient and medical records between systems.

  • Media

    Transfer large video files across sites and external partners.

Filescan.io Community

Uncover hidden threats with insightful malware analysis powered by OPSWAT's MetaDefender Sandbox technology—try it free.
Resources

Learn More About MetaDefender Sandbox

  • Whitepaper

    Leverage Adaptive Threat Analysis to Detect Highly Evasive Malware

    Leverage Adaptive Threat Analysis to Detect Highly Evasive Malware

  • Datasheet

    MetaDefender Sandbox Datasheet

    See more stats and technical specifications in this datasheet

  • Documentation

    MetaDefender Sandbox Documentation

    See additional information and technical resources.

  • Blog

    Malware Analysis Blog

    The latest practical insights and best practices for managing cybersecurity operations from OPSWAT, including incident response, vulnerability management, and optimizing security posture.

Detect Advanced Threats with
Embedded or Remote Sandboxing

Fill out the form and we’ll be in touch within 1 business day.
Trusted by 1,900+ businesses worldwide.