Dualog Endpoint - Getting Started

INTRODUCTION

Dualog Endpoint is a comprehensive and efficient approach to cybersecurity, providing greater protection against malware, phishing, and ransomware attacks. It also offers enhanced visibility and control over endpoints, enabling administrators to monitor and manage devices more effectively and respond to real-time security incidents.

Superior protection requires more updates. Dualog Endpoint updates will be distributed daily to provide effective protection against modern threats. On average, Dualog Endpoint will utilize approximately 3 GB of data each month.

PRE-REQUISITES

Ensure that the firewall on the ship is configured to allow the following:

  • Protocol: TCP
  • Ports:
    • 2222 (For configurations & reporting)
    • 2223 (For updates)
    • 443 (For Dualog portal)
  • Direction:  to and fro
  • Destination: apps.dualog.com, downloads.dualog.com and 93.188.232.76 

Dualog Network Control users can add this rule directly on the Dualog Portal. Refer to the article Network Control: Firewall Rules for further details.

GETTING STARTED 

Please note that both Dualog Link Client and Dualog Endpoint have to be installed on every machine that you wish to protect with Dualog Endpoint.

  1. Install and activate the Dualog Link client
    • For both new and existing customers:
      • Please download and run the latest client installer > tick on Dualog Endpoint Security service > complete the installation
  2. Install and activate the Dualog Endpoint Service

For more information, view the most latest Product Webinar here.

 

Was this article helpful?
2 out of 2 found this helpful
Have more questions? Submit a request

Comments

0 comments

Article is closed for comments.