INTRODUCTION
Dualog Endpoint is a comprehensive and efficient approach to cybersecurity, providing greater protection against malware, phishing, and ransomware attacks. It also offers enhanced visibility and control over endpoints, enabling administrators to monitor and manage devices more effectively and respond to real-time security incidents.
Superior protection requires more updates. Dualog Endpoint updates will be distributed daily to provide effective protection against modern threats. On average, Dualog Endpoint will utilize approximately 3 GB of data each month.
PRE-REQUISITES
Ensure that the firewall on the ship is configured to allow the following:
- Protocol: TCP
- Ports:
- 2222 (For configurations & reporting)
- 2223 (For updates)
- 443 (For Dualog portal)
- Direction: to and fro
- Destination: apps.dualog.com, downloads.dualog.com and 93.188.232.76
Dualog Network Control users can add this rule directly on the Dualog Portal. Refer to the article Network Control: Firewall Rules for further details.
GETTING STARTED
Please note that both Dualog Link Client and Dualog Endpoint have to be installed on every machine that you wish to protect with Dualog Endpoint.
-
Install and activate the Dualog Link client
- For both new and existing customers:
- Please download and run the latest client installer > tick on Dualog Endpoint Security service > complete the installation
- For both new and existing customers:
- Install and activate the Dualog Endpoint Service
Comments
Article is closed for comments.