Все публикации

Introduction to CyberSana

User Experience Based on Permissions

Running User Activity Reports

Running Inventory Reports

Running Device Audit Reports

Running Backup Reports

Permissions Profiles

Password Change Reports for Auditors

Adding Custom Backup Files to Devices

Auditing Check Point Devices

Running Arbitrary Commands on Check Point Devices

Check Point R80 Upgrade Preparation

Update Check Point Passwords

Scheduling Auto Mitigated Baseline Audits

Nessus Scanner Integration

Infrastructure Wide Automated Backups

External Monitoring Setup

Measuring Cyber Security Health

CyberSana Device Dashboard

Creating Custom Device Groups

Central File Repository

Automatic File Transfer

Automate Scheduled Password Changes

Automate Device Discovery Scans