User Guide

Metadefender Endpoint Management (MEM) is a network security management platform for IT and security professionals, that provides visibility over all types of endpoint applications from antivirus to hard disk encryption and public file sharing, as well as the ability to enforce compliance and detect threats.

Getting started with the Metadefender Endpoint Management platform is easy, and the available APIs allow you to efficiently integrate the Metadefender Endpoint Management features with your own solution. From the client to the cloud, we have you covered.



Sign Up For An Account

You will need to set up a Metadefender Endpoint Management account in order to begin your work. Go here to create an account on our Portal. Once your account is created, you can proceed to log into Metadefender Endpoint Management to set up your MEM account. You may monitor up to 25 devices for your development free of charge. If you would like to add more devices to your account, please contact our Sales at for pricing information.

Read Our Documents

Before you begin your implementation, you will need to identify your specific use case:

  • API based application: If you wish to create an application to fetch data (devices, device compliance status, reports,...) or do batch actions (delete devices, exempt devices, ...) on your account, you should go through our Metadefender Endpoint Management APIs documents

  • Integration: If you wish to integrate Metadefender Endpoint Management with your solution, Integrations document is here for your reference.

Start Implementation

You may now start implementing your application/solution. Be sure to refer to this user guide for detailed information on any issues you might wish to troubleshoot.

Test Your Solution

It's time for you to test your work. Before testing, you need to back to your Metadefender Endpoint Management console to download a proper agent and install it on your endpoints. Read our KB
"How do I deploy or distribute Metadefender Endpoint to my devices?" to know how to distribute Metadefender Endpoint to your devices.


Congratulations! You got there. You can celebrate a party to say cheers with your team.