ZeroLock®
Contains articles on the various features of the ZeroLock Environment broken out by sub-category.
Agents
- Log File Locations of the ZeroLock® Agent
- Moving Linux-Hosted ZeroLock® Agents between ZeroLock® Management Consoles
- Validating ZeroLock® Agent Installation
- How To Uninstall a ZeroLock® Agent using the ZeroLock Management Console
- ZeroLock® Agent Installation: Optional Switches
- ZeroLock® Agent Installation: Download Installer
- ZeroLock® Agent Installation: Air Gapped Environment
- ZeroLock® Agent Installation: Curl/Wget Installer
- How to Update the ZeroLock® Agent Version on an Endpoint
- How to Configure Advanced Settings
- How to Add a New ZeroLock® Agent Version to the ZeroLock Management Console
Alerts
Authentication
- How to Stop SSH-MFA Alerts Generation
- Forcing SSH-MFA Two-Factor Authentication
- Activating Two-Factor Authentication (MFA) on a ZeroLock® Account
- Creating an SSH-MFA Rule
- Implementing SSH Multifactor Authentication Using Multiple, Layered Rules
- Deactivating Two-Factor Authentication on a ZeroLock® Account
- Enabling SSO in the ZeroLock® Environment using Microsoft Entra ID
- Enabling SSO in the ZeroLock® Environment using Okta
Configuration Profiles
Endpoints
ZeroLock Management Console - ZMC
- Prerequisites for the ZeroLock® Management Console
- Handling Threats using the ZeroLock® Management Console
- ZeroLock® Management Console Startup
- Management Console - Banner
- ZeroLock® Management Console Set-Up
- System Configuration Homepage
- ZeroLock® Management Console: System Settings Homepage
- How to Configure ZeroLock® Management Console to Send Activity Data to Splunk Cloud, Sumo Logic, and Microsoft Sentinel
- ZeroLock® Management Console – The Dashboard
Policy
Rules
- Recommended Ruleset: Applying and Updating
- Control Policy and Lockdown Rule Types
- How to Create and Apply a Canary File Rule
- How to Create and Apply a Hash Rule
- How to Create and Apply a Network Access Rule
- How to Create and Apply a Program Execution Rule
- How to Create and Apply a File Access Rule
- Automatic Allow Rule Generation
- How To Modify Policy Rules
- Working with Ordered Rulesets