BYODAPP Advanced Security - Getting Started

Prerequisites

BYODAPP Advanced Security requires the following prerequisites.

  • Operating system: Microsoft Windows version 7, Service Pack 1 (build 6.1.7601) or Windows 2008 R2, Service Pack 1 (build 6.1.7601) or higher.

The following prerequisites will be automatically installed by the setup program if missing:

  • Runtime: .NET Framework 4.5.3 or higher

  • Microsoft Windows 7 SP1 and Windows 2008 R2 SP1 require an additional update to support SHA2 Cross Signing (KB4474419). This update allows BYODAPP Advanced Security built-in firewall and ransomware protection to run properly.

Please refer to the documentation for more details about prerequisites.

Step 1: Installation

The latest BYODAPP Advanced Security setup program is always available here: Latest BYODAPP Advanced Security setup program. Please download the setup program and follow the setup assitant wizard.

BYODAPP Advanced Security setup programe does not usually require to reboot your system to complete the installation.

Any new installation starts a fully featured trial period of 15 days. Please do not hesitate to contact us should you face any hurdle or if you face any issue will configuring BYODAPP Advanced Security.

Once the installation has completed, a new icon is displayed on your Desktop. Double-click on this icon to open BYODAPP Advanced Security and start configuring the security features.

Advanced Security Desktop Icon

Please refer to the documentation for full installation instructions.

Step 2: Configuring BYODAPP Advanced Security

You have launch BYODAPP Advanced Security and begun configuring features to protect your server from malicious activities and enforce strong security policies.

Lite mode homepage')}}

On the left column, the homepage allows a quick access to configure the Ransomware Protection, Bruteforce Defender and Homeland Access Protection features.

Start Ransomware Protection's learning period to allow Advanced Security to identify legit applications and behaviors on your system by clicking on the following tile:

Quick Start Ransowmare Protection

Bruteforce Defender is usually up-and-running following installation. Otherwise, click on the Repear defense against bruteforce attacks tile to resolve issues and applys the required system configuration. By default, this feature blocks attaquants following 10 failed login attempts.

Quick Start Bruteforce Defender

Finally, add your country in the list of authorized countries from where clients are allowed to connect. Click on the tile Authorize connections from another country and add your country to configure Homeland Access Protection

Quick Start Homeland Access Protection

You are all set! Don't forget to activate your license and to update to the latest version to keep Advanced Security protection at its best!

Step 3: Reviewing prevented threats

Now that you have configured Advanced Security key features, prevented threats will be reported in the prevented threats section, as show below:

Quick Start Prevented Threats

For example, Homeland Access Protection feature has prevented 673 unwanted connexions from unauthorized countries.

Also, the Hacker IP protection keeps the machine protected against known threats by blocking more than 600 000 000 known malicious IP addresses.

All the security events can be displayed by clicking on the See all events tile.

Step 4: Leveraging other security feature to enhance protection

At the bottom, four other security features can be accessed and configure to enhance your machine's protection.

  • Adjust and monitor access privileges on your local filesystems, printers and registry keys to ensure every user has access to relevant resources, with the Permissions feature.

  • Define period of time where users are authorized to login with the Working Hours feature. Users will be disconnected passed their allowed working hours.

  • Customize and secure user sessions with the Secure Desktop feature. Customize, hide, deny access from items of the session interface for local users.

  • Validate the name of the remote client when a user connects to your machine with Endpoint Protection. This feature validates client machine names for each remotly connected user.

There is more! Switching to advanced mode grant you access to more capabilities.

Step 5: Becoming an advanced user

Advanced Security has changed its look since version 6. A Lite Mode and an Expert Mode have been introduced. Expert Mode displays a more detailled interface with access to features and advanced settings.

Administrators can toggle between the two interface styles by clicking the button in the upper-right corner of the application.

Switch to Expert mode button

Thank you for using BYODAPP Advanced Security!