Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Overview

With an ever-evolving threat of ransomware, the endpoint security suite offers cutting-edge protection to your network and connected devices. We at Seqrite focus on data security and provide businesses with the right tools to ensure data protection for a secured enterprise. From detection scans to asset management, Seqrite Endpoint Security solutions ensure complete network protection to address cyber threats.

...

  • Device: Select the name of the device 'eqrite seqrite Endpoint Security'.

  • Name: We can take anything here according to our interest.

  • CCE Host: Enter the CCE IP.

  • Enter the Access ID/user name :Required Username

  • Password/Secret Key: Required password from seqrite team

  • Now enter the valid JSON Format in the last field. Below is the JSON that you have to put.

 {"host": "x.x.x.x", "database_name": "db_name", "port_num": 423, "time_duration": 15, "procedure_call":{"dlp": "pro_dlp", "virus": "pro_virus", "web": "pro_web"}}

  • Click on the Save button.