Vali Cyber Knowledge Base
Open/Manage Support Request
Sign in
ZeroLock®
ZeroLock®
Agents
Alerts
Authentication
Configuration Profiles
Endpoints
Management Console - ZMC
Policy
Rules
Users
Product Support
Getting Started with ZeroLock
FAQs
Support
Contacting the Support Team
Back to home
Vali Cyber Knowledge Base
ZeroLock®
ZeroLock®
Agents
Alerts
Authentication
Configuration Profiles
Endpoints
Management Console - ZMC
Policy
Rules
Users
Product Support
Getting Started with ZeroLock
FAQs
Support
Contacting the Support Team
ZeroLock®
Contains articles on the various features of the ZeroLock Environment broken out by sub-category.
Agents
Log File Locations of the ZeroLock® Agent
Moving ZeroLock® Agents between ZeroLock® Management Consoles
How To Update the ZeroLock® Agent Version on an Endpoint
Validating ZeroLock® Agent Installation
How To Uninstall a ZeroLock® Agent using the ZeroLock Management Console
How to Configure Advanced Settings
ZeroLock® Agent Installation: Optional Switches
ZeroLock® Agent Installation: Download Installer
ZeroLock® Agent Installation: Air Gapped Environment
ZeroLock® Agent Installation: Curl/Wget Installer
How To Add a New ZeroLock® Agent Version to the ZeroLock Management Console
How To Manually Add a New ZeroLock® Agent Version to the ZeroLock Management Console
See more
Alerts
Alerts Homepage on the ZeroLock® Management Console
Setting Alert Only Mode for a ZeroLock® Agent
Authentication
Forcing SSH-MFA Two-Factor Authentication
How to Stop SSH-MFA Alerts Generation
Activating Two-Factor Authentication (MFA) on a ZeroLock® Account
Creating an SSH-MFA Rule
Implementing SSH Multifactor Authentication Using Multiple, Layered Rules
Deactivating Two-Factor Authentication on a ZeroLock® Account
Enabling SSO in the ZeroLock® Environment using Microsoft Entra ID
Enabling SSO in the ZeroLock® Environment using Okta
See more
Configuration Profiles
Applying a Configuration Profile to a ZeroLock® Endpoint
Configuration Profiles Homepage on the ZeroLock® Management Console
Response Type Settings and Alert Generation
Configuration Profile Creation
Endpoints
ZeroLock® Endpoint Configuration Process Flow
Network Quarantine an Endpoint
ZeroLock® Management Console: Endpoint Details
Working with Endpoint Groups
ZeroLock® Management Console: Endpoints Homepage
Archiving an Endpoint
See more
Management Console - ZMC
Updating the ZeroLock® Management Console
The ZeroLock® Management Console - Dashboard
Prerequisites for the ZeroLock® Management Console
Handling Threats using the ZeroLock® Management Console
ZeroLock® Management Console Startup
Management Console - Banner
ZeroLock® Management Console Set-Up
System Configuration Homepage
ZeroLock® Management Console: System Settings Homepage
How to Configure ZeroLock® Management Console to Send Activity Data to Splunk Cloud and Sumo Logic
See more
Policy
Creating a New Policy
Applying Policy to a Configuration Profile
Rules
Recommended Ruleset: Applying and Updating
Control Policy and Lockdown Rule Types
How to Create and Apply a Canary File Rule
How to Create and Apply a Hash Rule
How to Create and Apply a Network Access Rule
How to Create and Apply a Program Execution Rule
Updating the Zerolock Management Console Default Lockdown Rules
How to Create and Apply a File Access Rule
Automatic Allow Rule Generation
How To Modify Policy Rules
Working with Ordered Rulesets
See more
Users
User Role Settings
Adding a ZeroLock® User
How to Assign User Roles
How to Unlock a User Account
How To Create, Configure, and Apply a User Role
See more