Follow these steps:
- Register to Cloud One.
- Go to Cloud One - Workload Security Portal.
- Click Create an Account.
- Fill out all required information.
- Verify the confirmation email and login with your account.
- Configure Policies.
- Log in to Cloud One - Workload Security then go to Policies.
- Duplicate the policy you want to configure by clicking on the policy then select Duplicate.
As best practice, always duplicate predefined policies so you can use them as reference for new policies. - Rename the duplicate policy
- Configure the features/module base on your requirements. For more information about the features: About the Workload Security protection modules.
- Deploy the Agent.
To avoid any issues, verify the following:
- Required network whitelist are in place. List of Cloud One Port numbers, URLs, and IP addresses.
- OS and kernel support
- System requirements: Sizing guidelines
Follow these steps:
- Login to Cloud One - Workload Security portal.
- On the top-right of the screen, click Support > Deployment Scripts.
- Configure the deployment script base on your requirements.
- Click Copy to Clipboard.
- Run the deployment script as shell (Linux) or powershell (Windows). More information about deployment script on Using deployment scripts to add and protect computers.
- Create Scheduled Malware and Recommendation Scan.
- Login to Cloud One - Workload Security portal.
- Go to Administration > Scheduled Tasks.
- Create schedules tasks:
- Scan Computers for Malware (Frequency: Once Weekly, or in accordance to company policy)
- Scan Computers for Recommendations (Frequency: Once Weekly)
For further reference, see Page 38 of Deep Security as a Service Best Practice Guide .