4.1. Cloud console

MetaAccess 2.3.0: June 04, 2019

1. Enhanced threat detection to allow administrators to configure how a file is considered a threat. Criteria can be based on the number of engines and trusted engines when a device scans threats against MetaDefender Cloud. Admins can configure a policy to leverage MetaDefender Core for Threat Detection, when used this way, MetaAccess respects scan results from MetaDefender Core: only files with a BLOCKED status will be considered as threat.

Scan Source

Before The Release

After The Release

MetaDefender Cloud

Threat Scan

  • Filter threats based on trusted engines. A file is detected as threat if at least one trusted engine detects it as a threat

Device Issue

  • Considered an issue if a file is detected as threat by N engines if enabled

  • Considered a critical issue if a file is detected as threat by M engines if enabled

Threat Scan

  • Filter threats based on number of trust engines. A file is detected as threat if at least N trust engines detect it as threat

Device Issue

  • Considered an issue if a device reports any threats if enabled

  • Considered a critical issue if a threat detected by M engines if enabled

MetaDefender API (Core)

Threat Scan

  • Filter threats based on trusted engines. A file is detected as threat if at least one trust engine detects it as threat

Device Issue

  • Considered an issue if a file is detected as threat by N engines if enabled

  • Considered a critical issue if a file is detected as threat by M engines if enabled

Threat Scan

  • A file is detected as threat if MetaDefender API (Core) scan result is BLOCKED

Device Issue

  • Considered an issue if a device reports any threats if enabled

  • Considered an issue if a device reports any threats if enabled


2. Administrators can now enable OPSWAT Agent to auto-block mobile PTP/MTP devices when a user inserts a mobile PTP/MTP devices to an endpoint. This option is disabled by default. If you wish to enable it, please log into MetaAccess console and update policies.


3. If OPSWAT Agent reports free hard disk space as not supported, MetaAccess does not consider this as an issue. This affects macOS 10.13+ devices

MetaAccess 2.2.1: May 24, 2019

  • Fixed issues

    • couldn't download agents from the download pages

    • couldn't fetch agent log

MetaAccess 2.2.0: May 14, 2019

1. Administrators can now configure agents to upload allowed/blocked files to a MetaDefender Vault when a user unblocks or copies files from portable media drives. This setting is disabled by default.


2. Administrators now have an option to exclude CD/DVD from auto-blocking portable media drives. This setting is disabled by default.


3. Administrators can see a timestamp when a device is enrolled to an account


4. MetaAccess adds a Live Chat snippet on the console to help users reach out to our support for help in less time

5. Add new APIs, Get Devices v3.3 and Device Details v3.3, to return a timestamp, enrolled_at, when a device is enrolled to an account,

6. Minor changes:

  • Increased Nickname length limit to 100 characters

  • Re-organized the left navigation menu: moved the "Group" menu out of the "Inventory" menu

MetaAccess 2.1.1: April 17, 2019

1. Fixed: when a user downloads an installer from a download link that contains a tag name/group id, the Cloud does not generate the installer with the tag name/group id

2. Fixed: the link to go to the OPSWAT support portal on Help Center

MetaAccess 2.1.0: April 02, 2019

1. MetaAccess now enables administrators to detect advanced threats within file systems in addition to active running processes powered by MetaDefender technologies. Administrators can schedule scans with multiple options such as a Full System Scan or a Custom Scan (memory, system volume, additional volumes, a specific path).


2. Administrators can also perform an on-demand scan on selected devices and obtain a threat report remotely.


3. Added oAuth API Device Information v3.0 to return pre-processing data for a device

MetaAccess February 26, 2019

1. Enhanced dashboard to provide a consolidated view of your security and device landscape across your organization . Beside an overview dashboard, administrators now can access detailed security view for Secure Access, Vulnerabilities, Compliance, and Threat Detection.


2. Administrators can do localization and globalization for each device group by customizing the remediation page for groups. Administrators can add a customized package for remediation pages at Settings > Rebranding and assign it in Group details


MetaAccess January 22, 2019

1. MetaAccess now returns parameters in the response header to indicate API rate limits (X-RateLimit-Limit), how many calls left (X-RateLimit-Remaining), when the rate limit is reset (X-RateLimit-Reset-Time)

2. Added new OAuth APIs:

  • Account Details v3.1: return details about device status, device with vulnerabilities by severity, devices with issues by severity

  • Device Action v3.1: support more actions to allow administrators retrieve MetaAccess agent log on devices

  • Get Reports v3.0: support download MetaAccess agent log if available

3. Bugs fixed

  • A co-administrator could not invite another user to manage the co-admin account

MetaAccess December 26, 2018

Release Type: Major Release

1. Administrators can configure policies to grant users following actions for portable media devices:

  • Block all access

  • Allow one-way access

  • Allow bi-directional access


2. Administrators can enable Media Manifest validation to expedite portable media file processing


3. Administrators can monitor portable media activities on devices from the MetaAccess console management


4. Administrators can configure policies to scan files on Windows and macOS agent against their own MetaDefender API servers


MetaAccess November 27, 2018

Release Type: Minor Release

1. Added support to integrate with 3rd party SSO service: an account can provision users through their own SSO service


2. Enhanced user management with search/filter and update abilities


3. Enhanced the remediation page to show end-users an overview about the device’s issues.

4. Added number of vulnerabilities of a device into an Inventory report

5. Added a new OAuth API Account Details v3.0: added the license key to the API response

MetaAccess October 23, 2018

Release Type: Minor Release

1. Added the number of vulnerabilities of each device into an export result when a user exports device inventory

2. Removed options to download Infected Devices, Exempted Devices, Unknown Devices on Download Reports section on Reports and Notifications page. Now administrators can download these reports on the Devices page

3. Enhanced remediation guidelines to resolve vulnerability issues which were associated with missing patches

4. Added a new OAuth API Get Threats v3.0 to return detected threats on a device

5. Bug Fixed:
- On Android devices: The cloud showed the last time IP connections had scanned as the last report even when the agent had not scanned IP connections

MetaAccess September 25, 2018

Release Type: Minor Release

1. Enhance Linux policies

2. Vulnerabilities: add a policy to consider a device issue based on vulnerability severity

3. Enhanced operating system policy: allow administrators define approved OS versions

MetaAccess August 28, 2018

Release Type: Minor Release

1. Vulnerabilities enhancement

  • Detect vulnerabilities at operating system level

  • A central view for all vulnerabilities on an account

2. Added an option to automatically delete and uninstall the MetaAccess agent on devices which have not accessed to cloud applications in a certain amount of time.

Known issues

  • if an application is deleted, and a device only accessed to that application in last X days, the device will be automatically deleted and the agent will be uninstalled.

3. Added OAuth APIs:

  • Get Applications v3.0 API: support filter application installed on endpoints on an account

MetaAccess July 31, 2018

Release Type: Minor Release

1. Added support to enforce access rule for mobile devices to cloud applications

2. Introduced MetaAccess Client SDK for OEM customers

3. Vulnerabilities: enhanced dashboard to show vulnerable devices by severity level

4. Enhanced Privacy Settings to enforce agent not transfer configured privacy information to MetaAccess servers

5. Added OAuth APIs:

  • Get CVEs 3.0 API: support filter CVEs on an account

  • Get Devices 3.2 API: added filters to filter devices which install specific apps or have specific CVEs

  • Get Device Details v3.2 API: added last time a device scaned running processes against with MetaDefender Cloud and a field to indicate if a file still exists on the system for repeated threats

6. Enhanced Upgrade Account process on console to make it more convenience for customers

7. Lockscreen timeout is shown as "not supported" instead of "not set" on OS platforms MetaAccess doesn't have ability to check lock screen timeout

MetaAccess June 26, 2018

Release Type: Major Release

1. Application Inventory: provide visibility on applications installed on endpoints.

2. Vulnerability: scan for vulnerabilities on the endpoint system and installed applications to detect vulnerable applications installed organization-wide as well as per device

3. Compliance Assessment: use a scoring system based on OPSWAT and CVSS scores to consider an issue if a device has CVEs

4. Added OAuth APIs:

    • Device Details v3.2: support query device details with a custom ID

    • Get Applications v3.0: get applications install on endpoints

    • Application Details v3.0: get application details along with CVEs

    MetaAccess May 22, 2018

    Release Type: Minor Release

    1. Updated Terms and Conditions, Privacy Policy, and Cookie Policy

    2. Cloud Access Control: record a user who is using a device to access a SaaS application if requested

    MetaAccess May 08, 2018

    Release Type: Minor Release

    1. Added a new OAuth API, "Get Groups" v3.0, to return managed groups in an account

    2. Enhanced to show encryption state as “not supported” instead of “unencrypted” if a product is not supported to detect encryption state.

    3. Changed the text "antivirus" to "anti-malware" on console, not on API parameters/keywords

    4. Bugs fixed

    • Get Devices API v3.1, v3.0: Returns all devices in an account instead of devices assigned to a filtered group

    MetaAccess April 10, 2018

    Release Type: Minor Release

    1.Added an action to fetch agent's logs

    2. Added a setting to skip threats in local malware log if the file no longer exists
    on the system

    3. Added a OAuth APIs, Get Devices v3.1 and Device Details v3.1, to return the last timestamp a device is rebooted

    4. Enforced rate limit for OAuth APIs

    5. Changed the text "antivirus" to "anti-malware" on console, not on API parameters/keywords

    6. Bugs fixed

    • Get Devices API v3: Got HTTP 200 in response instead of 413 when the page parameter exceeds a page limit

    • Device Action API v3: Got HTTP 400 when group id doesn't exist on an account with assign to group action

    • Device Status Change API v3: Got HTTP 400 instead of 406 if the limit parameter is greater than 50

    MetaAccess March 12, 2018

    Release Type: Minor Release

    1.Enhanced the user interface with a fresh new look - new fonts, colors and icons

    2. Added a new policy to check device reboot cycle for Windows and macOS devices

    3. Introduced “suspended” encryption state for a volume

    4. Added ability to set a PIN to share with end-users for agent uninstallation enforcement

    MetaAccess January 30, 2018

    Release Type: Minor Release

    1. Deprecated “managed” and “guest” agent type. As a result, OAuth APIs will ignore agent type in the API’s input

    MetaAccess January 09, 2018

    Release Type: Minor Release

    1. Added ability to run a custom check on devices

    MetaAccess December 12, 2017

    Release Type: Minor Release

    1. Device details screen enhanced

    2. Enhanced messages on the remediation page

    3. Enhanced email notification triggers on Report and Notifications. Now all events will be triggered with both Managed and Guest devices if enabled.

    4. Added release date for each missing patch in the Device Details API v3.0

    MetaAccess 1.0.0: November 21, 2017

    Release Type: Minor Release

    1. Enhanced compliance policy (reorganized categories, added tolerance for missing patch rules)

    2. Enforce devices to resubmit hwid as serial number

    3. Device details screen enhanced

    4. Added a ‘last scanned’ timestamp when a user performs an IP scan for Android devices
    5. Enhanced messages on the remediation page
    6. Enhanced user interface on Global Settings
    7. Removed an option to hide Windows and macOS trayicon on endpoints
    8. Removed an action to batch exempt devices
    9. Added an option to automatically delete unknown devices

    MetaAccess 1.0.0: October 31, 2017

    Release Type: Minor Release

    1. Added ability to allow administrators to grant temporary access to an application

    2. Added ability to allow administrators decide which format they want to receive for email notification

    3. Device details view enhanced

    4. Added support to send email notification for Linux and mobile devices’ events (before we only support Wins and macOS)

    5. Added the ability for administrators to enforce PIN required when an end-user uninstalls an agent on endpoints

    6. Add the ability to set email notification triggers for access control events (when device is blocked or allowed access/granted or revoked temporary access)

    MetaAccess 1.0.0: October 2, 2017

    Release Type: Minor (Patch) Release

    Enhanced remediation page with some parts of the the rebranding package added

    MetaAccess 1.0.0: September 27, 2017

    Release Type: Major Release

    Metadefender Endpoint Management is now MetaAccess – an access control and endpoint compliance offering

    MetaAccess is OPSWAT’s new cloud access security and enterprise endpoint compliance offering. MetaAccess protects cloud applications from risky or compromised devices and significantly simplifies the security model for users and devices accessing critical corporate cloud applications.

    MetaAccess now integrates with your existing SAML based Single Sign on Identity providers (IdPs) such as Okta, and offers an extra layer of security by adding a device posture check or security check to the user authentication check provided by the IDP

    Key New Features

    • Enhanced dashboard showing details of cloud applications that are monitored, enforced or disabled

    • Administrators can now add or update identity providers for ease of integration with existing SAML SSO setups

    • Administrators can now add or update cloud applications such as Slack or Salesforce under the identity providers mentioned in the earlier step and monitor access for these applications

    • Administrators can create access rules for cloud applications and grant device access to individual applications based on application mode and access rules

    • An enhanced remediation page with a new look will now be displayed to end users with a button option for contacting helpdesk. Clicking this will trigger an email to all administrators. The email contains details of the device issues and details on how to remediate those issues

    Deprecated Features

    • The ‘Rebranding’ available under Settings will no longer be available in MetaAccess. It will be added in a future release

    • The device inventory email report will no longer be available

    MEM: August 08, 2017

    Release Type: Minor Release

    1. Enhanced Lost Device feature: do not delete unseen devices if this feature is not enabled. Previously unseen devices were deleted after data-retention length automatically. Now, they will be deleted only if the Lost devices feature is enabled in the console.

    2. Remediation action will be sent only for approved antivirus products

    3. Administrators now have the ability to clone a policy from an existing policy instead of creating a new policy from scratch

    4. The Device Issues by category chart now only shows the number of devices which have issues with a specific category and no longer shows the issue severity level. This was done to remove the ambiguity of the chart in terms of issue category vs device severity levels

    MEM: July 18, 2017

    Release Type: Minor Release


    1. Added the ability to allow admins to skip the user authentication check when there are no active users logged in

    2. Enhanced oAuth API v3: added support for verbose parameters to get information of a device

      1. Enhanced the device details of Event Log and added the reason/s for a device to change its final status

    3. Enhanced the policy creation and details pages to help users better understand policy creation and configuration

    4. Fixed bug in which mobile/Linux devices were not assigned to a proper group when they register with a group id/tag name

    5. Removed the rebranding tab for Metadefender Endpoint

    MEM: June 28, 2017

    Release Type: Major Release


    1. Enhanced device and policy management. Ability to now:

        1. Create device groups and assign devices to individual groups

        2. Create security policies specific to a device group

        3. Define device status rules more granularly

        2. Active Directory Integration

        Administrators now have the ability to download and install a OPSWAT domain controller agent on a domain controller that is running a version of the Windows Server® operating system and has Active Directory® Domain Services installed. This will expedite synchronizing devices information which joins to the domain with Metadefender Endpoint Management.

        Feature Deprecation

        1. Deprecated Download Inventory report on Settings > Reports and Notifications > Download Reports because the old csv format is incompatible with the current implementation.

        MEM: May 23, 2017

        Release Type: Minor Release

        Metadefender Endpoint Management (Cloud)


        1. Added 2 additional events that trigger an email notification:

          1. If a device becomes compliant

          2. If a device becomes non-compliant

        2. Admins can now capture additional custom information (such as email addresses and telephone numbers) from end users by enabling enabling custom information settings under Configuration > Global Settings> Advanced. They can now specify:

        1. how to validate the information a user enters (using a regular expression string)

        2. what message the end users will see

        3. Admins can also search for devices with custom identity specified and also preview custom user identity information for all reports related to devices as well as access this information in API response

        4. Admins can enforce the re-entry of custom information if needed

        5. Added information showing which antivirus engine detected a repeated threat

        6. Added information showing threats detected in last X days under each antivirus

        Bug fixes

        1. Fixed bug in which macOS family was identified as Other in infected inventory report

        2. Fixed the Next/Back button page on the Device details page

        MEM: April 25, 2017

        Release Type: Minor Release

        1. Developer document significantly enhanced and now available on Online Help : https://onlinehelp.opswat.com/metaaccess/

        2. Released the following oAuth APIs. Details of these APIs can be accessed here: https://onlinehelp.opswat.com/metaaccess/1.2._OAuth_APIs.html

          1. Device Action v3

          2. Device Detail v3

          3. Get Devices v3

          4. Logs v3

        3. OPSWAT has updated the number of available engines on Metadefender Cloud for daily malware scan. The updated engines list is as follows:

        • Ahnlab

        • Cyren

        • Emsisoft

        • K7

        • Nano

        • QuickHeal

        • VirIT

        • The updated list can be viewed under Configuration > Device Policy > Infections

        4. Admin email notification for infected devices now includes a list of all engines that detected a threat

        5. The "Infected" option on filter condition under the Cloud console UI and oAuth API v3 is split into 3 options for granular analysis

        1. Repeated threats

        2. Infected processes

        3. IP connections

        6. The ‘Infected Devices’ report now has two additional columns:

          1. Device Nickname

          2. Engine Name

          Bug Fixes:

          • Couldn't download devices report if number of devices was huge (more than 1000)

          • Couldn't export full event logs

          • Missing event log when a device switched from account A to account B

          • Not returning the correct status in the API when a mobile/linux device switched from account A to account B

          • Threat detected notification said Critical when it wasn’t

          • Couldn't detect system volume encryption status when volume had blank character

          • Weekly email report not sent

          • Better support for Internet Explorer/Safari (all versions) to address unexpected behavior when an admin used IE/Safari to access the Cloud Console