The Nebula console consists of several components that enhance the security of your network, endpoints, and users. This guide helps you make the most of your Nebula account. Click a link to view the topic.
Getting started
- Components
- Minimum requirements
- Network access requirements and firewall settings
- First login
- Add users
- Best practices
- Change user profile settings
Endpoints
- Manage endpoints
- Overview of groups
- Manage groups
- Edit or delete groups
- Perform actions on endpoints
- Add Windows endpoints
- Add Mac endpoints
- Add Linux endpoints
- Mobile device deployment overview
- Uninstall endpoints
Policies
- Manage policies
- Endpoint agent settings
- Tamper Protection settings
- Protection settings
- Scan settings
- Endpoint Detection and Response settings
- Brute Force Protection settings
- Software management settings
Scans
Monitoring activity
- Security Advisor
- Detections
- Quarantine
- Endpoint activity reports
- Events and Tasks
- Suspicious Activity Monitoring
Software Inventory
Device Control
Brute Force Protection
Flight Recorder
Sandbox Analysis
Support Tickets
Exclusions
Notifications
Account
Advanced
- Configure Syslog
- Enable debug logging
- Configure single sign-on
- Restore an Endpoint Agent configuration
- Use the Endpoint Agent Command-line tool