Vali Cyber Knowledge Base
Open/Manage Support Request
ZeroLock®
ZeroLock®
Agents
Alerts
Authentication
Configuration Profiles
Containers
Endpoints
Management Console - ZMC
Policy
Rules
Users
Product Support
Getting Started with ZeroLock
FAQs
Build and Release Notes
Previous Build & Release Notes
Contacting the Support Team
Back to home
Vali Cyber Knowledge Base
ZeroLock®
ZeroLock®
Agents
Alerts
Authentication
Configuration Profiles
Containers
Endpoints
Management Console - ZMC
Policy
Rules
Users
Product Support
Getting Started with ZeroLock
FAQs
Build and Release Notes
Previous Build & Release Notes
Contacting the Support Team
ZeroLock®
Contains articles on the various features of the ZeroLock Environment broken out by sub-category.
Agents
Agent Installation: Container Orchestrator
Log File Locations of the ZeroLock® Agent
Moving ZeroLock® Agents between ZeroLock® Management Consoles
Updating the Version of a ZeroLock® Agent
Uninstalling the ZeroLock® Agent: Deployed to a Server
Validating Agent Installation
Uninstalling a ZeroLock® Agent
Testing ZeroLock® Agent ESXi Protection
How to Configure Advanced Settings
ZeroLock® Agent Installation: Optional Switches
ZeroLock® Agent Installation: ESXi vSphere Installation Bundle
ZeroLock® Agent Installation: Download Installer
ZeroLock® Agent Installation: Air Gapped Environment
ZeroLock® Agent Installation: Curl/Wget Installer
See more
Alerts
Alerts Homepage on the ZeroLock® Management Console
Authentication
Disabling SSH Multifactor Authorization Alerts
Enforcing SSH-MFA Two-Factor Authentication
How to Stop SSH-MFA Alerts Generation
Activating Two-Factor Authentication on Your ZeroLock® Account
Creating an SSH-MFA Rule
Implementing SSH Multifactor Authentication Using Multiple, Layered Rules
Deactivating Two-Factor Authentication on a ZeroLock® Account
See more
Configuration Profiles
Applying a Configuration Profile to a ZeroLock® Endpoint
Configuration Profiles Homepage on the ZeroLock® Management Console
Response Type Settings and Alert Generation
Configuration Profile Creation
Containers
ZeroLock® Self-Protecting Agent Container
Uninstall the ZeroLock® Agent: Container
Endpoints
ZeroLock® Endpoint Configuration Process Flow
ZeroLock® Endpoint Protection
Network Quarantine an Endpoint
ZeroLock® Management Console: Endpoint Details Homepage
Endpoint Groups Homepage
Creating and Assigning a New ZeroLock® Endpoint Group
Modifying a ZeroLock® Endpoint Group
See more
Management Console - ZMC
The ZeroLock® Management Console - Dashboard
Updating a ZeroLock® Environment
Updating the ZeroLock® Management Console
Prerequisites for the ZeroLock® Management Console
ZeroLock® Management Console Startup
Management Console - Banner
Handling Threats using the ZeroLock® Management Console
Updating the ZeroLock® Agent on the ZeroLock Management Console
Reports Homepage on the ZeroLock® Management Console
ZeroLock® Management Console Set-Up
System Configuration Homepage
ZeroLock® Management Console: System Settings Homepage
See more
Policy
Creating a New Policy
Applying Policy to a Configuration Profile
Rules
Recommended Ruleset
Applying the Recommended Ruleset via Policy
Control Policy and Lockdown Rule Types
How to Create a Canary File Rule
How to Create a Hash Rule
How to Create a Network Access Rule
How to Create a Program Execution Rule
Updating the Default Lockdown Ruleset
How to Create a File Access Rule
Automatic Allow Rule Generation
See more
Users
User Role Settings Explained
Adding a ZeroLock® User
How to Assign User Roles
How to Create a User Role
How to Unlock a User
See more