Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

First Initial Meeting (45 minsminutes) – POC Kick off, we will deploy Gytpol to some of the devices in scope and provide a show and tell as to how to do this. Thereafter you will then work to deployed Gytpol to the remaining devices in scope (Up to 50 devices, we recommended privileged users and servers of interest!) Second Meeting (45 mins Kickoff: In this session, we'll initiate the Proof of Concept by deploying GYTPOL to a subset of the designated devices. We'll offer a hands-on demonstration of the deployment process. Following this, your team will take over to extend the GYTPOL deployment to the remaining devices within the specified scope, covering up to 50 devices, with a preference for privileged users and critical servers.

Follow-up Meeting (45 minutes to 1 hour) – Mid Eval -Evaluation Sync we will review the data as the great thing about Gytpol is we receive result : We will convene to assess the data generated by GYTPOL. One of the advantages of GYTPOL is its rapid results, often available within the hour of deployment. The focus of this session is to provide context around This meeting aims to contextualize the findings and provide recommendations as to on best practices, i.e. quick wins (we start the remediation that can absolutely have no impact) the idea is to start exercising Gytpol’s value of closing gaps. Third Meeting (45 mins . Emphasis will be placed on identifying quick wins, initiating remediation efforts that guarantee minimal impact. The primary goal is to leverage GYTPOL to swiftly address vulnerabilities and enhance overall security.

Final Meeting (45 minutes to 1 hour) End of Eval review – much the same as Evaluation Review: Similar to the previous session, we will conduct a comprehensive review of all gathered data and , implemented remediations, and any question, queries concern. address any questions or concerns you may have. This meeting serves as a platform for finalizing the evaluation phase, ensuring a thorough understanding of GYTPOL's impact and addressing any outstanding queries.

...

At GYTPOL, we offer provide two types of POC - a SaaS (Cloud) option POC options: a Software as a Service (SaaS) deployed in the cloud and an on-prem premises installation. Consult with the GYTPOL representative and choose the approach that suits you best.

SaaS POC

SaaS POC is pretty straight forward and all the relevant info is in this document: SaaS On-Boarding - GYTPOL 

On-prem POC 

The on-prem POC setup/process comprises of a few main steps:

...

To determine the most suitable approach for your needs, we recommend consulting with a GYTPOL representative.

For those interested in the SaaS option, the process is straightforward, and a detailed information on requirements and installation process, can be found in the GYTPOL SaaS on-boarding document. Feel free to review this document and reach out to our representative for further assistance in selecting the POC approach that aligns best with your requirements.

To initiate the on-premises POC for GYTPOL, follow the steps to prepare a Windows Server/VM, according to specifications outlined in the GYTPOL Validator | System Requirements for onPrem document.

...

This process includes

...

additional configurations beyond a standard Windows Server installation

...

Create a domain user for GYTPOL

...

Create a CNAME DNS entry and open a couple of ports on the firewall.

...

:

  1. Review System Requirements: Refer to the document to understand the specific hardware and software specifications required for the on-premises deployment.

  2. Prepare Windows Server/VM: Set up a Windows Server or virtual machine adhering to the server sizing specifications outlined for up to 5,000 devices

...

  1. , as detailed in the document.

Info
  • Ensure that all hardware and software prerequisites are met based on the sizing recommendations for optimal performance during the POC.

  • It's important to note that there is no requirement to install a SQL server

  • for this POC, simplifying the setup process.

  1. Create a Domain User for GYTPOL: Establish a dedicated domain user account exclusively for GYTPOL. This user account will be utilized for secure integration and access management.

Info

Please refer to the documentation and ensure that the created domain user is granted with the relevant permissions and group memberships as outlined. Follow the guidelines in the documentation to grant the necessary access rights to guarantee a smooth functioning of GYTPOL with the associated user account. This step is crucial for maintaining security and enabling GYTPOL to perform its functions seamlessly within the established environment.

  1. Create a DNS CNAME Entry: Generate a Canonical Name (CNAME) DNS entry to associate a domain alias with the GYTPOL server. This ensures seamless domain resolution and accessibility.

  2. Configure Firewall Ports: Open the designated firewall ports as specified in the documentation. These ports are essential for facilitating communication with GYTPOL. Follow the documented guidelines to configure the firewall settings accurately.

By meticulously adhering to these steps, you'll effectively prepare the Windows Server/VM for GYTPOL on-premises deployment, encompassing the additional requirements outlined in the system requirements documentation.

  1. Run Pre-Checker Tool

...

  1. : Refer to the same document

...

  1. for detailed instructions on how to

...

  1. execute the pre-checker tool. This tool is

...

  1. crucial for verifying that the server has been

...

  1. set up correctly

...

  1. in accordance with our provided instructions.

...

    • After running the pre-checker tool

...

    • , carefully review the results to identify any issues or discrepancies. Address and rectify any necessary configurations based on the tool's output.

    • Click on the "Export results" option within the pre-checker tool and promptly email the generated output to your GYTPOL representative. This information is essential for our team to assess the setup and send you the required packages in preparation for the kickoff meeting and installation.

    • Once we receive the pre-checker tool results, we will provide you with the necessary packages to download, ensuring a streamlined process for our upcoming kickoff meeting and installation.

Upon successful completion of the preceding steps, our team will dispatch the requisite packages for installation on your designated machines.

The client installation process can be carried out through various methods, detailed instructions can be found in the GYTPOL Client installation guide. Ensure that you follow the guidelines precisely to guarantee a smooth and effective installation.

To facilitate this process, we will organize a kickoff meeting where our team will actively assist you in navigating through the installation steps. This collaborative session is designed to address any queries, provide real-time support, and ensure a seamless deployment of GYTPOL on your targeted machines.

Be prepared to engage in the kickoff meeting, as it serves as a valuable opportunity to enhance your understanding of the installation process and address any specific requirements or concerns that may arise during the deployment.