About Admin Manual

About Admin Manual

The CyBot Admin Manual is your comprehensive guide to effectively manage and administer the CyBot Threat Management Platform. This manual has been meticulously crafted to empower administrators, security professionals, and IT personnel with the knowledge and skills required to harness the full potential of CyBot for threat detection, analysis, and mitigation.

Inside this manual, you will find detailed information, step-by-step instructions, and best practices for configuring, optimizing, and maintaining the CyBot Threat Management Platform. 

Key Highlights:

1. CyBot Overview
  1. Introduction to CyBot
  2. Key Features and Capabilities
  3. System Requirements
2. About the Admin User Guide
  1. Purpose and Scope of this Manual
  2. How to Use This Guide
  3. Contact Information for Support
3. CyBot Modules
  1. An overview of the various modules within CyBot
  2. How each module contributes to comprehensive threat management
4. CyBot Deployment
  1. Deployment options and considerations
  2. Hardware and Software Requirements
  3. Installation and Setup Guidelines
5. Setting Up the CyBot - Threat Management Platform
  1. CyBot License Activation
  2. CyBot Configuration Settings
    1. Authentication
    2. Exceptions
    3. Integration
    4. Notification
    5. License Info
    6. Date Format
6. CyBot User Management
  1. User Role Types and Permissions
  2. Creating and Managing User Accounts
  3. Role-Based Access Control (RBAC)
  4. User Authentication Methods
7. CyBot Rule Studio
  1. Introduction to Rule Management
  2. Creating and Managing Rules for Threat Detection
  3. Best Practices for Rule Creation
This manual is your technical companion on the journey to fortify your organization's cybersecurity stance with CyBot. Whether you seek to implement sophisticated threat detection algorithms, fine-tune incident response protocols, or harness the full potential of CyBot, this document is your indispensable reference. Dive deep into the technical intricacies and empower yourself with the knowledge and skills needed to safeguard your digital ecosystem against the ever-evolving landscape of cyber threats.

    • Related Articles

    • Purpose of the Configuration and Setup Guide

      This guide is meticulously crafted with the primary goal of empowering admin users to effectively configure and establish the Cybot environment. Encompassing critical components such as the Data Lake, dedicated log collectors, and the Cybot product ...
    • Configure IP in Cybot™ Platform

      Login to the Cybot machine via SSH. Once logged in successfully to Cybot machine, please find the following steps to assign IP address to Cybot. Enter as root user in the console using the following command. >>>> sudo –s Provide the password for the ...
    • Cybot™ Log Collector

      Installation steps to deploy Datalake Engine and Datalake-UI Downloading the OVA The download link for the ova will be shared by the ActiveBytes Support team. Download the OVA and proceed to import the OVA using your preferred hypervisor. Importing ...
    • Cybot Analytical Engine Installation

      Cybot Analytical Engine Installation This guide will lead you through the process of deploying a Cybot Analytical Engine. Downloading the OVA The download link for the ova will be shared by the ActiveBytes Support team. Download the OVA and proceed ...
    • Cybot™ Platform

      CYBOT™ is a one-of-a-kind platform that is custom-built to fit needs of enterprises with critical infrastructure. It acts as a cyber security foundation for organizations that requires deep visibility into their infrastructure with a multilayer ...