General
Create an API token of Trend Micro Vision One
To collect data from Trend Micro Vision One APIs, the user must have an API Token. To create an API token, follow the below steps: Log on to the Trend Micro Vision One console. On the Trend Vision One console, go to Administration → API Keys. ...
Root user best practices for your AWS account
When you first create an AWS account, you begin with a default set of credentials with complete access to all AWS resources in your account. This identity is called the AWS account root user. We strongly recommend you don’t access the AWS account ...
Security best practices in IAM
To help secure your AWS resources, follow these best practices for AWS Identity and Access Management (IAM). Topics Require human users to use federation with an identity provider to access AWS using temporary credentials Require workloads to use ...
Onboard Microsoft 365 using the Microsoft API
How to onboard Microsoft 365 using the Microsoft API This onboarding procedure for a Microsoft 365 API integration includes: Specifying the connection method. Enabling the Perception Point app - that enables the required access to your Microsoft 365 ...
How to Get Email Headers
When reporting spam that slips past the filters, it is essential that we receive the full message headers from a message. Additionally, sometimes the Support department may request the full headers from an email message in order to troubleshoot mail ...
SentinelOne - Installing the macOS Agent
Installing the macOS Agent Make sure you have all the requirements before you start the installation. To install the macOS Agent Get the Site or Group Token Install the Agent using the command line or the Installation Wizard. Authorize Full Disk ...
Sentinel one - Installing the Windows Agent
Make sure you have all requirements before you start the installation. For Windows Agents: If there is a web proxy between the endpoints and the Console, we recommend you configure the proxy for the Windows Agent in the installation command. If you ...
Acronis - Advance Email Security - Gsuite
Create Gmail Group & Configure Host WHITELIST IP’S Configure “Perception Point Scanner” host (to which emails will be routed) Go to admin.google.com → apps → Google Workspace→ Gmail → hosts Click add route Name: Perception Point Scanner Host name: ...
Malwarebytes EDR for Mobile devices
Deployment overview for Mobile Security for Business Mobile Security secures and manages mobile devices from your Nebula console. Begin deployment by sending an email from Nebula or configuring a Mobile Device Management tool. Then, have your end ...
Acronis ADLP - Dataflow Policy
Creating the data flow policy and policy rules The key principle of data loss prevention demands that users of a corporate IT system should be allowed to handle sensitive data only to the extent necessary to perform their job duties. Any other ...
Acronis ADLP - Make custom sensitive categories
Custom sensitivity categories Custom sensitive data categories may help an organization to protect intellectual property and confidential data specific for that organization by expanding Advanced DLP built-in catalog of compliance regulatory-related ...
Guidelines for Establishing a Secure Corporate Email Account on G Suite
Administrator accounts Super admins control access to all business and employee data in the organization, hence it's especially important for their accounts to be protected. Protect administrator accounts Require 2-Step Verification for admin ...
Rsyslog Configuration
This article will provide you with detailed steps on how to configure rsyslog to send logs to another server. Step 1: Edit the rsyslog configuration file through the following command: sudo nano /etc/rsyslog.conf Step 2: Scroll down to the end of the ...
Preventing unauthorized uninstallation or modification of agents
You can protect Agent for Windows against unauthorized uninstallation or modification, by enabling the Password protection setting in a protection plan. This setting is available only when the Self-protection setting is enabled. To enable Password ...
Installing EDR Agent on MAC
Installing EDR Agent on MAC 1. Locate the downloaded file Setup.MBEndpointAgent.(CBT Mac).pkg. In most cases, downloaded files are saved in, Downloads folder. 2. Double click on Setup.MBEndpointAgent.(CBT Mac).pkg to start the setup wizard. 3. The ...