Can I use Active Directory to distribute, enforce or audit Metadefender Endpoint usage?

Microsoft Active Directory is a powerful directory service that can be used to distribute, enforce and audit Metadefender Endpoint usage on managed PCs.


Automatic Installation (one-time)

Because the persistent Metadefender Endpoint agent is packaged as an MSI, it is very easy to perform distribution to managed endpoints. A simple one-time installation can be performed by hosting your Metadefender Endpoint installer in a central location and then referencing it as a parameter to MSIEXEC, for example the following line would cause a silent installation of a Metadefender Endpoint installer hosted on a shared network drive mounted as drive Z:
MSIEXEC /a "Z:\Shared\Public\OPSWAT_GEARS_Client_3445-2e5e65e6b68ce141d-0.msi" /qn 


Automatic Installation (enforced)

Active Directory can used to not only distribute and install the software, but also to enforce that it remains installed. In Active Directory terms, this is called 'assigning software'. You have a choice to assign software to authenticated users or machines. Both are viable options and you should choose the one that aligns with your other corporate software installations. 

The official Microsoft guide can be found here:



Active Directory supports the creation of audit policies. These can be used to record events when processes are created and/or terminated on your managed devices. When combined with event log forwarding this can be an effective tool to get a centralized view of process changes across your organization. The downside is that filtering for a specific process (like GearsAgentService.exe) is not natively supported.

A third party guide is available on Tom's IT Pro here:,2-964.html 

This article applies to the Windows persistent Metadefender Endpoint client.
This article was last updated on 2015-10-31
(This article was changed to reflect the new name of Metadefender Endpoint on 2016-02-23)


Powered by Zendesk