ShieldNet 360

Apr 13, 2026

Guide

ShieldNet Defense Getting Started

ShieldNet Defense Getting Started

ShieldNet Defense Getting Started

Security Made Simple

a part of ShieldNet 360

 


This document provides a complete guide for customers using ShieldNet Defense. It covers the essential steps for onboarding your organization, configuring the platform, installing agents, and effectively monitoring security alerts.

I. How to onboard your organization to ShieldNet Defense (Trial Registration)

II. Required configuration steps before using the platform

III. How to use the platform and review security alerts

IV. Contact information and support

  

I. How to Onboard Your Organization (Trial Registration)

 

Follow these steps to register for a trial and onboard your organization to ShieldNet Defense:

1. Start the Trial:

Visit https://shieldnet360.com/ and click the "Free trial" button.

2. Provide IT Manager Email:

Enter the email address of the IT Manager who will administer the account.

3. Verify Email (OTP):

Check your email for a One-Time Password (OTP) and enter it to verify your identity.

4. Completion Email:

After successful verification, you will receive an email to finalize the registration process.

5. Complete Registration:

Open the email and click the "Complete Registration" button. Follow the on-screen instructions to finish setting up your account.

II. Required Configuration Steps

Before fully utilizing the platform, certain configuration steps are required to ensure proper asset management and security monitoring.

 

1. Initial Setup

Login to the Portal. You will see step-by-step instructions on the bottom left panel labeled "Get started." Follow these initial prompts to familiarize yourself with the environment.

 

2. Discover Features

 

2.1 Assets Management - Employees

Purpose: Add and manage the list of employees within the organization.

 Users can manually enter employees one by one.



 Download an Excel template to fill in and upload bulk data.




 Synchronize directly from Microsoft Entra ID for a faster process.



2.2 Assets Management - Devices

Purpose: Manage information about devices where the agent has been installed.

Once the agent is successfully installed, device information – including OS, IP address, installed applications, and other metadata – will automatically appear here. (See "Install the Agent" section below for details).


 Click the info button to show OS and hardware information.

 Click on a Device name to drill down into details.


2.3 Assets Management - Applications

Applications: Provides a centralized view of applications installed on devices that have the agent installed. This information is automatically synchronized after agent installation is completed. You can view the number of versions currently existing in the system.

 

2.4 Assets Management - Domain

Domain: Register the organization’s public domains.

Currently: Used to monitor public assets such as SSL certificates and their expiration dates.



 Future Roadmap: This will become the hub for identifying the organization’s attack surface, including threat intelligence, domain vulnerabilities, hosted services (web services, APIs), libraries used, and potential credential leaks. (Feature under development, planned for release later this year.)



 

3. Install the Agent on an Endpoint

To start monitoring, the ShieldNet Agent must be installed on your endpoints.

1. Click Start to open the instruction panel for agent installation.

2. Select the OS type, then click Continue.

3.Follow the step-by-step instructions provided in the portal to install the agent on the endpoint.

  

Agent Requirements

The endpoint must be connected to the Internet and allow traffic to the following destinations:

 

 

Source

 

Destination

Destination Port

 

Protocol

 

Purpose

Server, Desktop

shieldnet360-agent-installer.s3.ap-southeast-1.amazonaws.com

443

TCP

Agent installation

Server, Desktop

agents.shieldnet360.com

1901, 1902

TCP

Agent communication

 

4. Integrate with SaaS/Cloud Services

To integrate ShieldNet Defense with your organization's existing platforms:

1. Click the user icon in the top-right corner of the portal.

2. Select Organization Settings.

3. From the left navigation menu, choose Integrations.

4. Select the integration type currently used by your organization and follow the configuration steps.

 

Available Integrations

 Import M365 Directory: Automatically import the user directory from Microsoft Entra ID. This allows organizations to quickly synchronize employee accounts and simplifies the onboarding process.

 Sync M365 Audit Log: Authorize access to Microsoft 365 audit logs to monitor security-related activities across supported applications such as Exchange, SharePoint, and other M365 services.

 Sync GCP Audit Log: Authorize access to Google Cloud audit logs to monitor security events and activities across GCP services.

 Connect AWS CloudTrail: Connect to AWS CloudTrail to track important actions and security-related events within your AWS environment.

III. How to Use the Platform and Review Security Alerts

 After completing the configuration steps – or at a minimum, the agent installation – the system will automatically scan activities on the device to detect potential risks and security attacks. These security alerts and findings can be visually monitored on the portal.

Security Monitoring

If a server or endpoint is attacked after the agent is installed, the system will record the detected security incidents in the alert list. Click on the incident name to view detailed information.

Key Alert Components:

Summary

The most concise description of the attack in plain text, designed for executives or IT administrators who may not have deep security expertise. These alerts are generated after the agent performs detailed behavioral analysis and consolidates the results for administrators, eliminating the need for a large security monitoring team.

Impact

Information about the affected assets and users.

Activity Timeline

A detailed timeline of the incident, including timestamps and the results of various stages: Analyze, Investigate, Response, Assign, Conclusion, and Close Reason.

Action Needed

Quick response actions that can be executed directly from the portal, supported by the AI Agent. Actions include:

 Block IP

 Kill Process

 Quarantine File

 Isolate Host

These actions immediately stop the incident from continuing. The AI Agent also provides additional recommendations for administrators to perform manual actions after the quick response steps, helping to strengthen security and reduce the risk of similar attacks in the future.

 

 

IV. Contact Information and Support

 If you require assistance or need to report security operations issues, please contact us using the information below.

Email Support:

 General Support: [email protected]

 Security Operations (SecOps): [email protected]

Instant Messaging: MSTeams / Google Chat available upon request.

Quick Support (Call/Z): +84 359.034.039

Thank You!

Learn more about us at www.shieldnet360.com

 


ShieldNet 360 in Action

Protect your business with ShieldNet 360

Get started and learn how ShieldNet 360 can support your business.