Getting started
This
The Management Console is the foundation for Endpoint Protection,
Management Console:
-
Step 1 – Register a trial or purchase your business product. You should have completed this step before receiving this guide.
-
Step 2 – Configure the Management Console by creating and activating your account, setting up two-factor authentication (if desired), and selecting your Management Console view.
Endpoint Protection:
-
Complete Steps 1 and 2 in the Management Console setup procedure to register and configure your console.
-
Deploy the Endpoint Protection agents to devices.
-
Install an agent on each computer that you want to protect. The agent then registers and reports endpoint activity through the Management Console.
Endpoint Detection and Response
-
Complete Steps 1 and 2 in the Management Console setup procedure to register and configure your console.
-
Enable and install Endpoint Detection and Response.
Managed Detection and Response
- Complete Steps 1 and 2 in the Management Console setup procedure to register and configure your console.
-
Enable and install Managed Detection and Response.
DNS Protection:
-
Complete Steps 1 and 2 in the Management Console setup procedure to register and configure your console.
-
Enable and install DNS Protection.
-
Install an agent on each computer that you want to protect. The agent then registers and reports DNS activity through the Management Console.
Security Awareness Training:
-
Complete Steps 1 and 2 in the Management Console setup procedure to register and configure your console.
-
Enable Security Awareness Training and target users.
After you have completed these steps, use the Management Console to work with all your products.