Setup overview

2024-07-09Last updated

Setting up Security Center SaaS involves planning, ordering, activating, and configuring the system.

  1. Learn about Security Center SaaS and how it works.
  2. Review the Security Center SaaS requirements:
    1. Presale checklist
    2. Network requirements
    3. Ports and protocols
    4. Supported devices
  3. Commission a new system:
    The Security Center SaaS system commissioning flow showing actions taken by the partner and the system owner.
    1. Review business requirements
    2. Build quote
    3. Place order
    4. Activate system
    Important: After activation, only designated users have immediate access to the system. To enable access for other users, the End-User System Admin specified on the order must sign in and accept our Terms of Service.
  4. Sign in to Security Center SaaS.
  5. Create your users and apply roles.
  6. Create groups to define inherited user permissions based on group membership.
  7. Add devices
    Note: The visibility of local devices depends on the location of your appliances. For devices to be discoverable, the appliance must be on the same local network as the device.
  8. (Optional) Configure federation through reverse tunneling.
  9. (Optional) Download desktop clients from the Security Center SaaS Welcome page.
  10. (Optional) Install mobile clients from the Apple App Store or Google Play.