ShieldNet 360

May 20, 2026

Guide

ShieldNet Defense – Application Scan Guide

ShieldNet Defense – Application Scan Guide

This document provides instructions for using the application scanning and statistics feature on ShieldNet Defense.


Topics covered in this guide:

- How to register and set up your organization on ShieldNet Defense (Free Trial)

- Pre-setup before scanning applications

- Viewing installed application information

- Contact information and support


Section 1: How to Register and Set Up Your Organization on ShieldNet Defense


Step 1: Visit the free trial URL

Go to: https://shieldnet360.com/san-pham/defense/dung-thu-mien-phi


Step 2: Enter the IT Manager/Admin email

Enter your email in the provided field. Note: this email will also serve as the organization administrator.


Step 3: Enter the OTP sent to your email to verify your identity.


Step 4: After successful verification, a confirmation message and email will be sent to your mailbox.


Step 5: Click the "Complete Registration" button in the email and follow the on-screen instructions. Important: The registration link expires on the date shown in the email.


Section 2: Pre-Setup Before Scanning Applications


How ShieldNet Defense Works

ShieldNet Defense is specifically designed to inventory applications running on employee computers and protect those computers against cybersecurity attacks.


1. Install Agent: The agent installation link is sent via email to each employee. Installation is quick, simple, and does not require an admin to be present.


2. Collect Data: The ShieldNet Defense agent collects all installed applications on the user's computer, recording version numbers, licenses, and detecting unauthorized apps.


3. Manage via Portal: Administrators can review the application list and identify unauthorized applications via the ShieldNet Defense management dashboard.


Deployment time: 5-10 minutes


Setup Step 1: Add Employee Information

Go to Asset Management > Employees. Add and manage the list of employees in the organization. You can manually enter employees, download an Excel template to fill in and upload, or sync directly from Microsoft Entra ID.


Setup Step 2: Note Before Installing Agent

- You must declare employees in the Asset Management section before proceeding with the agent installation on their computers.

- Computers that self-install but are not declared on the portal will fail installation in subsequent steps.


Setup Step 3: Install Agent for Application Scanning

B1: Click Start to open the agent installation guide.

B2: Select Employee Devices.

B3: Select the employees who will receive the agent installation email, then click Send.

B4: Click Finish and Close. Employees will receive an email notification to install the agent.

B5: Employees will receive an email containing a download link. Click the appropriate version to download and install. The agent supports MacOS and Windows.

B6: Double-click the installer file and follow the on-screen instructions.

B7: Employee selects Get Started and authenticates with SSO from their organization (Microsoft/Google/Zoho).

B8: After installation is complete, the device will be protected and the application list will appear on the ShieldNet Defense Portal.


Note: If the agent installation fails, please check network requirements (see below) and send a screenshot of the error to the ShieldNet Defense support team for faster assistance.


Network Requirements

Allow internet connectivity and access to the following addresses:

- shieldnet360-agent-installers.s3.ap-southeast-1.amazonaws.com (Port 443, TCP) - Agent installation

- agents.shieldnet360.com (Port 1901, 1902, TCP) - Agent communication


Section 3: Viewing Installed Application Information on Employee Computers


Once all setup steps are complete, ShieldNet Defense can retrieve information about applications installed on employee computers.


Application Overview

Go to Asset Management > Applications. This provides a centralized view of applications installed on all devices and computers. Information is automatically synced once agent installation is complete, giving administrators both an overview and detailed view of installed applications.

The application list shows: Application name, Number of devices with the app installed, Available versions.


Application Details per Computer

Go to Asset Management > Devices. Click on a device to view details. After the agent is successfully installed, information from the agent will be shown including: OS, IP address, and all applications installed on that computer.

Application list includes: Application name, Version, Installation date.


With ShieldNet Defense data, administrators can:

1. Build a list of applications currently installed

2. Identify applications approved for use

3. Categorize applications not permitted for use

4. Detect pirated/cracked software

5. Remove unnecessary software or unlicensed software to avoid device penalties

6. Provide evidence of the complete list of installed software


Section 4: Additional Features


In addition to application scanning, ShieldNet Defense continuously monitors and protects computers against malware such as ransomware (data encryption), data theft, and vulnerability exploitation. These alerts and detections are displayed in real-time on the portal for users to monitor.


Endpoint Protection with ShieldNet Defense

If a computer or endpoint device is attacked after the agent is installed, the system will record any security incidents detected and display them in the alerts list. Click the incident name to view detailed information.


Each security alert includes:

- Summary: A brief description of the attack.

- Impact: Information about assets and users affected.

- Activity Timeline: Detailed timeline of the incident including analysis stages: Analyze, Investigate, Response, Assign, Conclusion, and Close Reason.

- Action Needed: Quick response actions that can be executed directly from the portal, supported by the AI Agent (Block IP, Kill Process, Quarantine File, Isolate Host). The AI Agent also provides additional recommendations for administrators to perform manual actions after the quick response steps.


Section 5: Contact Information & Support


If you require assistance or need to report security operations issues, please contact us using the information below.


Email Support:

General Support: [email protected]

Security Operations (SecOps): [email protected]


Instant Messaging: MSTeams / Google Chat available upon request.

Zalo: +84 946.400.096


Point of Contact: [email protected] | +84 946.400.096

ShieldNet 360 in Action

Protect your business with ShieldNet 360

Get started and learn how ShieldNet 360 can support your business.