Download OESIS Endpoint Assessment Tool
The Infection Detection module provides an additional layer of anti-malware infection detection capabilities which may catch malware that standalone anti-malware software on the device may have missed or could not remediate. Infection Detection enables the existing OEM solution to function beyond performing security compliance (e.g. answering the question"does the endpoint have the required antimalware product installed, is it up-to-date, and does it have real time protection enabled?", to determining whether the endpoint is compromised (i.e, “is this compliant device nonetheless infected with malware?").
OESIS partner solutions using Infection module empower end customers to send binaries of running processes on endpoints to a remote Metadefender Core server for signature and heuristic scanning by one or multiple anti-malware engines included in the Metadefender Core package licensed. Process scanning may identify threats missed by an anti-malware product installed on the device.
End customers can accelerate process scanning by implementing the scan results caching feature of Metadefender Core to only scan binaries that have not previously been analyzed.
Detect all remote IP addresses connected to a device and compare those IPs to results reported by 12 IP reputation sources integrated within Metadefender Cloud. Each IP reputation source compares and categorizes the addresses according to the confidence rating of the IP. Identifying suspect IPs, together with comparing confidence ratings of their sources, can enable solutions using the Infection Detection Module to better detect malicious connections.
Report Repeated Threats
Having information about repeated threats on endpoints is critical when responding to a serious security breach. By retrieving the threat detection log from the anti-malware application installed on the endpoint, it is easier to uncover persistent threats that the anti-malware application was not able to permanently remove. The threat detection logs and API can thereby help identify widespread threats that are spreading within your network.