Overview
With an ever-evolving threat of ransomware, the endpoint security suite offers cutting-edge protection to your network and connected devices. We at Seqrite focus on data security and provide businesses with the right tools to ensure data protection for a secured enterprise. From detection scans to asset management, Seqrite Endpoint Security solutions ensure complete network protection to address cyber threats.
...
Device: Select the name of the device 'eqrite seqrite Endpoint Security'.
Name: We can take anything here according to our interest.
CCE Host: Enter the CCE IP.
Enter the Access ID/user name :Required Username
Password/Secret Key: Required password from seqrite team
Now enter the valid JSON Format in the last field. Below is the JSON that you have to put.
{"host": "x.x.x.x", "database_name": "db_name", "port_num": 423, "time_duration": 15, "procedure_call":{"dlp": "pro_dlp", "virus": "pro_virus", "web": "pro_web"}}
Click on the Save button.