Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Introduction

...

Easy heading
linkText4
linkText10
linkText3
linkText6
linkText5
relatedLinksLabels
linkText2
linkText1
headingTagsH1,H2,H3
sidebarMaxHeight450
linkType2Page
linkType3Page
linkType1Page
linkType10Page
sidebarTitleON THIS PAGE
linkUrl3
linkUrl4
linkUrl1
linkUrl2
linkUrl10
includedPageModeDisable_Included_Pages
linkText8
linkText7
relatedLinksOrderLabels_First
sidebarModeOpened
headingNumberingModeDisable_Numbering
linkText9
sidebarMarginRight20
relatedLinksTargetNew_Window
relatedLinksTitleRELATED LINKS
linkUrl9
linkUrl7
linkUrl8
numberedHeadingTagsH1,H2,H3
linkUrl5
linkUrl6
linkType8Page
linkType9Page
linkType6Page
headingLinkTextModeWrap
linkType7Page
linkType4Page
linkType5Page
sidebarWidth240
sidebarTop160
headingLinkExpandModeCollapse_All_By_Default
headingLinkIndent10

The goal of this document is to provide furnish instructions for both the onboarding of Software as a Service (SaaS) onboarding process, applicable to both new customers and the migration process for existing customers migrating to GYTPOL's Software as a Service ( SaaS ) platform.

Preliminary steps and ongoing onboarding

  1. User Access:

    • The customer

...

    • will furnish a list of email addresses for UI access

...

    • .

  1. Identity Provider (IDP) Integration:

    • Customers can integrate GYTPOL with their existing IDP, such as OKTA, AzureAD, and more.

  2. Access Levels:

    • Specify required access levels, e.g., Full Admin, Read for Windows Servers, Write for Linux Debian, etc.

...

  1. Operating System Support:

    • Ensure

...

    • the target operating system is supported

...

    • ; refer to the provided list.

...

  1. SaaS Tenant Creation:

    • Upon SaaS tenant

...

    • creation, GYTPOL will supply

...

    • a username (email address

...

    • ) and an initial password

...

    • , which must be changed upon the first login.

  1. Firewall Whitelisting:

    • GYTPOL will

...

    • share a list of FW rules (allowing only port 443 to

...

    • SaaS URLs) for whitelisting in case of blocks.

...

  1. Sensor Downloads:

    • GYTPOL will provide links to Sensors per OS (Windows MSIs, Linux, and macOS packages)

...

    • .

    • Sensors can also be downloaded directly from the GYTPOL

...

    • UI.

  1. Active Directory / GPO Data and CIS/NIST Benchmarks:

    • For

...

    • customers wishing to view Active Directory/GPO data and CIS/NIST benchmarks:

      • Set up a server (can be shared) following the dsRequester system requirements at

Benchmarks (CIS/NIST) for 1.0 and AD / GP security on SaaS 2.0 - dsRequester installation and update requirements

New Customers (PoC or Production)

Deployment and Device Scanning Process:

  1. dsRequester Server Setup:

    • If needed, set up the dsRequester server as per the provided requirements.

  2. Firewall Rules and dsRequester Server Ready:

    • Ensure all necessary FW rules are configured.

    • Confirm the readiness of the dsRequester server.

  3. GYTPOL Sensor Deployment:

    • Deploy the GYTPOL Sensor on a group of devices, adhering to licensing limitations.

    • Use any deployment tool (SCCM, BigFix, GPO) for deploying the new Sensor.

  4. Scanning and Data Submission:

    • After deployment, the device is scanned for the first time.

    • Data collected during the scan is transmitted to GYTPOL cloud.

  5. Metrics Display in UI:

    • View and analyze metrics in the GYTPOL UI.

  6. Full Functionality and Remediation:

    • The software offers full functionality, including remediation capabilities.

  7. Exercise Caution with Remediations:

    • Exercise caution when choosing devices for remediations.

    • It is advisable to test remediations on a small scale before implementing them on a larger group of devices.

This process ensures a systematic deployment, scanning, and evaluation of device metrics within the defined licensing constraints.

SaaS Proof of Concept (PoC)

...

Details:

  • The PoC license encompasses:

    • Limitation to 50 devices

...

    • .

    • Validity for 21 days.

...

    • Full functionality, inclusive of all modules

...

    • : detection, remediation, and revert functionality.

Throughout the PoC, various meetings will be conducted, including an onboarding session to review initial findings and UI overview, a status call for advanced technical discussions, and a PoC summary call to present results, discuss findings with stakeholders and decision-makers, and plan next steps.

  • Meeting Schedule During PoC:

    1. Onboarding Session:

      • Overview of initial findings.

      • UI overview.

    2. Status Call:

      • Advanced and technical discussions.

    3. PoC Summary Call:

      • Review of findings.

      • Presentation of results to stakeholders and decision-makers.

      • Discussion of next steps.

These meetings are essential for a comprehensive understanding and evaluation of GYTPOL's capabilities during the PoC period.

Existing On-Prem Customers, migrating to SaaS

Deployment of New Sensor and Transition to SaaS:

  1. New Sensor Deployment:

    • GYTPOL will provide an updated Sensor (higher version).

    • The new Sensor will automatically update the existing installation, recreate configuration files, and redirect data to GYTPOL SaaS.

  2. Deployment Methods:

    • Use any deployment tool (SCCM, BigFix, GPO) or leverage GYTPOL's Auto-Update mechanism for deploying the new Sensor.

  3. Data Submission to GYTPOL SaaS:

    • After deployment, scanned device data is sent to GYTPOL SaaS instead of the local server.

  4. Metrics in UI:

    • View and analyze metrics in the GYTPOL SaaS UI.

  5. Dual Visibility:

    • The updated device will report to the new GYTPOL SaaS.

    • It will remain visible in the old server for an additional 14 days (if GYTPOL's auto-update is used).

  6. Important Note on Migration:

    • Data migration is not possible.

    • Remediation tasks, Mutes, Roles, and Permissions must be recreated in the new UI.

This process facilitates a smooth transition to the updated GYTPOL SaaS environment, ensuring continued visibility of devices during the transition period.

Sensor installation guide and supported platforms

For in-depth client Sensor guides, detailed how-to instructions, and a comprehensive support matrix, please refer to the following link: GYTPOL Client Installation Documentation. UI2 - Client Deployment and Management Guide

This resource provides step-by-step guidance and essential information for installing and configuring GYTPOL clients Sensors on various operating systems. Explore the documentation to ensure a smooth and effective implementation of GYTPOL's solutions.