Portal Administration

General portal functionality, detections, authentication, etc.

Brian avatar Keith McCammon avatar Bryan Morrow avatar +8
32 articles in this collection
Written by Brian, Keith McCammon, Bryan Morrow and 8 others
General

Getting Started

A list of our most popular content.
Nick McAnally avatar
Written by Nick McAnally
Updated over a week ago

Supported Browsers

Supported Browsers for your Red Canary Portal
Tyler Bohlmann avatar
Written by Tyler Bohlmann
Updated over a week ago

Inviting Users to your Portal

How to invite users to your Red Canary Portal
Tyler Bohlmann avatar
Written by Tyler Bohlmann
Updated over a week ago

Red Canary Service Status

Nick McAnally avatar
Written by Nick McAnally
Updated over a week ago

Share a file with Red Canary

Joe Casazza avatar
Written by Joe Casazza
Updated over a week ago

Improve context by denoting internal IP address spaces

Enhance Red Canary's detection and your response by defining internal address spaces
Keith McCammon avatar
Written by Keith McCammon
Updated over a week ago

Determining License Usage

Determining the number of licenses used when calculating overages and true-up invoicing.
David Epperly avatar
Written by David Epperly
Updated over a week ago

Fast Nav allows you to quickly jump to resources

Quickly jump to resources with ⌘/Ctrl+K
Brian avatar
Written by Brian
Updated over a week ago

Audit actions throughout Red Canary

Reviewing Red Canary audit logs for security and troubleshooting
Adam Mathis avatar
Written by Adam Mathis
Updated over a week ago

Self documenting CSVs

CSV exports are now delivered via shared files and include documentation
R
Written by Ryan Ritz
Updated over a week ago

Improved Endpoint Synchronization

Syncing endpoint data from EDR platforms is messy. We've made it better.
Bryan Morrow avatar
Written by Bryan Morrow
Updated over a week ago

How Red Canary displays endpoints

Understand how RC displays endpoints
Tyler Bohlmann avatar
Written by Tyler Bohlmann
Updated over a week ago
Detections

Understand Red Canary Detection classifications

Red Canary uses classifications and sub-classifications to clearly communicate the nature of a given threat.
Keith McCammon avatar
Written by Keith McCammon
Updated over a week ago

Tailor unwanted software detections to your organization

Some unwanted software products detected by Red Canary serve legitimate business purposes for companies or are accepted risks
Brian avatar
Written by Brian
Updated over a week ago

Use notes to annotate detections

Notes allow your team to communicate about your response plan, results of your investigation, and other important information
Keith McCammon avatar
Written by Keith McCammon
Updated over a week ago

Provide feedback on a detection

Mark Detections as remediated or not remediated to customize Red Canary's detection to fit your organization
Brian avatar
Written by Brian
Updated over a week ago

Reopen a detection you've marked as Remediated

Detections marked remediated or not remediated can now be reopened directly in Red Canary
Bryan Morrow avatar
Written by Bryan Morrow
Updated over a week ago

Respond to confirmed threats

Learn how the Red Canary platform expedites response
Robert Adams avatar
Written by Robert Adams
Updated over a week ago

Isolate an endpoint

Isolate an endpoint for quick containment
Robert Adams avatar
Written by Robert Adams
Updated over a week ago

Execute response plans

Understanding and executing response plans
Robert Adams avatar
Written by Robert Adams
Updated over a week ago

Audit response plans

Understanding who, what, and when response actions were invoked
Robert Adams avatar
Written by Robert Adams
Updated over a week ago

Respond faster with automatically prepared Response Plans

Less clicking, more responding.
Bryan Morrow avatar
Written by Bryan Morrow
Updated over a week ago
Authentication

Use role-based access control

Users are granted access to the various product functions through roles. Understand the actions each role can perform.
Bryan Morrow avatar
Written by Bryan Morrow
Updated over a week ago

Use a new Two Factor Authentication device

How to access Red Canary and make changes to your Two Factor Authentication device, in the event of loss, theft or another change.
Adam Mathis avatar
Written by Adam Mathis
Updated over a week ago

Troubleshooting Multi-Factor Authentication

Mike Haag avatar
Written by Mike Haag
Updated over a week ago

Login to Red Canary with Single Sign-On

The Red Canary portal now supports your organization's SSO providers to simplify your users' logins and improve your security.
Brian avatar
Written by Brian
Updated over a week ago

Configuring Single Sign-On User and Role Provisioning

Mandate logins via Single Sign-On and control user and role provisioning
Brian avatar
Written by Brian
Updated yesterday

Single Sign-On to Red Canary using Duo

Learn how to set up Single Sign-On from your organization's Duo to Red Canary.
Brian avatar
Written by Brian
Updated over a week ago

Single Sign-On to Red Canary using Microsoft Azure Active Directory

Learn how to set up Single Sign-On from your organization's Microsoft Azure Active Directory to Red Canary.
Brian avatar
Written by Brian
Updated over a week ago

Single Sign-On to Red Canary using Okta

Learn how to set up Single Sign-On from your organization's Okta Directory to Red Canary.
Brian avatar
Written by Brian
Updated over a week ago

Single Sign-On to Red Canary using PingOne

Learn how to set up Single Sign-On from your organization's PingOne directory to Red Canary.
Brian avatar
Written by Brian
Updated over a week ago

Single Sign-On to Red Canary using OneLogin

Learn how to set up Single Sign-On from your organization's OneLogin to Red Canary.
Nick McAnally avatar
Written by Nick McAnally
Updated over a week ago