Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. User Access:

    • The customer will furnish a list of email addresses for UI access.

  2. Identity Provider (IDP) Integration:

    • Customers can integrate GYTPOL with their existing IDP, such as OKTA, AzureAD, and more.

  3. Access Levels:

    • Specify required access levels, e.g., Full Admin, Read for Windows Servers, Write for Linux Debian, etc.

  4. Operating System Support:

    • Ensure the target operating system is supported; refer to the provided list.

  5. SaaS Tenant Creation:

    • Upon SaaS tenant creation, GYTPOL will supply a username (email address) and an initial password, which must be changed upon the first login.

  6. Firewall Whitelisting:

    • GYTPOL will share a list of FW rules (allowing only port 443 to SaaS URLs) for whitelisting in case of blocks.

  7. Client Downloads:

    • GYTPOL will provide links to clients per OS (Windows MSIs, Linux, and macOS packages).

    • Clients can also be downloaded directly from the GYTPOL UI.

  8. Active Directory / GPO Data and CIS/NIST Benchmarks:

    • For customers wishing to view Active Directory/GPO data and CIS/NIST benchmarks:

Benchmarks (CIS/NIST) and AD / GP security on SaaS - dsRequester installation and update requirements

New Customers (PoC or Production)

...

For in-depth client guides, detailed how-to instructions, and a comprehensive support matrix, please refer to the following link: GYTPOL UI2 - Client Installation Documentation. Guide

This resource provides step-by-step guidance and essential information for installing and configuring GYTPOL clients on various operating systems. Explore the documentation to ensure a smooth and effective implementation of GYTPOL's solutions.