Settings
Use this section of the management console to configure various settings to customize Aurora Endpoint Security services and features to meet your organization's needs.
Application
View, delete, or regenerate the installation token for the Aurora Protect Desktop agent.
View, disable, or generate an invitation URL for Aurora Protect Desktop users.
Configure whether users must provide a password to remove the Aurora Protect Desktop agent and Aurora Focus agent.
Configure Aurora Endpoint Security to send events for different services and features to a SIEM solution or syslog server. See Send events to a SIEM solution or syslog server.
Configure custom authentication for the management console. See Custom authentication.
Access detailed Aurora Protect Desktop threat data reports. See Using Aurora Protect Desktop reports.
Administrators
Assign administrator roles to users and create your own roles with custom permissions. Roles and their associated permissions control the features that an administrator can view and modify throughout the console.
Global List
Add files to the global quarantine or safe list to control whether they are blocked or permitted on Aurora Protect Desktop devices.
See Add a file to the Aurora Protect Desktop global quarantine or global safe list.
Global List (Mobile)
You can use the safe list to exempt a specific app or developer signing certificate from Aurora Protect Mobile malware and sideload detection, or an IP address or domain from Aurora Protect Mobile message scanning. You can use the restricted list to classify a specific app, developer signing certificate, IP address, or domain as a threat as soon as it is detected by these features.
See Add an app, certificate, IP address, or domain to a CylancePROTECT Mobile safe or restricted list.
Detection and Response
Create custom partial lockdown configurations for Aurora Focus devices.
See Lock a device.
Deployments
Download the installers for the Aurora Protect Desktop and Aurora Focus agents.
Update
Manage updates of the Aurora Protect Desktop and Aurora Focus agents.
See Managing updates for the Aurora Endpoint Security agents.
Certificates
Add a certificate to the certificates safe list to allow the associated software to run without interruption on Aurora Protect Desktop devices.
See Add a certificate to the Aurora Protect Desktop global safe list.
Integrations
Integrate Aurora Endpoint Security with third-party programs using the Aurora User API.
Device Lifecycle
Configure the time period before an offline Aurora Protect Desktop device is considered inactive.
Authentication
Add an authenticator so that you can use an identity store like Active Directory or myAccount, or an identity or multi-factor authentication provider like Okta, Ping Identity, or Duo, to specify the types of authentication users must complete to access the management console or to activate the Aurora Protect Mobile app or the Gateway agent.
See Add an authenticator.
Directory Connections
Connect Aurora Endpoint Security to your organization’s directory to onboard users for the Aurora Protect Mobile and Gateway services.
See Installing the Aurora Protect Connectivity Node and Linking to your company directory.
Connectors
Connect Aurora Endpoint Security to EMM solutions such as Microsoft Intune to enable the reporting of device risk levels to the EMM solution. The device risk level is calculated based on the detection of mobile threats by the Aurora Protect Mobile app on devices. The EMM solution can execute mitigation actions based on the device risk level.
See Integrating Cylance Endpoint Security with Intune to respond to mobile threats.
Network
Configure settings to customize the features and functionality of Gateway.
See Setting up Gateway.
Information Protection
Configure settings to customize the features and functionality of CylanceAVERT.
See Define sensitive content using information protection settings.
Activation
Configure how long activation credentials are valid for the Aurora Protect Mobile app and the Gateway agent.