home home
Other Sites
  • ArcticWolf.com
  • Unified Portal
  • Arctic Circle Community
  • Technical Support Knowledge Base
Request a Demo Internal Documentation
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentication
  • Sensors, Scanners, and Log Collectors
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Developer and OEM
  • Product Updates
  • Additional Information about Products and Services
  • Legacy Risk Dashboard
  • Legacy Analytics
  • English
  • 日本語
  • Deutsch
  • Français
Sign In
  • Aurora Endpoint Security
  • Managed Detection and Response (MDR)
  • Managed Risk
  • Managed Security Awareness (MA)
  • Incident Readiness and Response
  • Arctic Wolf Unified Portal
  • MSP Portal
  • Authentication
  • Sensors, Scanners, and Log Collectors
  • Arctic Wolf Agent
  • Onboarding Portal
  • Active Response, Log Forwarding, and Security Monitoring
  • Active Directory
  • Cloud Security Posture Management (CSPM)
  • IT Service Management (ITSM)
  • Developer and OEM
  • Product Updates
  • Additional Information about Products and Services
  • Legacy Risk Dashboard
  • Legacy Analytics
  • English
  • 日本語
  • Deutsch
  • Français
Sign In

Aurora Endpoint Security

Aurora Endpoint Security
  • Aurora Endpoint Security Setup
    • Aurora Endpoint Security Setup Guide
      • Configuration
        • Default Settings
        • Export, Import, or Reset the Configuration
          • Export
          • Import
          • Reset
      • Prerequisites
        • Endpoint Defense Console
        • Aurora Protect Desktop
          • Root certificates required for the Aurora Protect Desktop agent for Windows
        • Aurora Focus
        • Aurora Protect Mobile App
        • BlackBerry Protect Connectivity Node
        • Gateway Connector
        • Gateway Agents
        • CylanceAVERT
        • Aurora Endpoint Security Network
        • Aurora Endpoint Security Proxy
      • Access the Console
        • Sign In
        • Authentication
          • Configure Authentication for Sign-In
            • Add OTP
            • Add IDP SAML
            • Add an Authenticator
              • Considerations for adding SAML authenticators
            • Update IDP SAML
            • Generate an SSO Callback URL
            • Remove OTP
          • Configure the Default Authentication Policies
          • Add a User Policy for Authentication
          • Custom Authentication
            • Configure Custom Authentication
            • Migrate External IDPs from Custom Authentication
            • Migrate Custom Authentication Settings
      • Administrator Configuration
        • Add an Administrator
        • Permissions of Default Administrator Roles
        • Add a Role
        • Configure Session and Idle Timeout Limits
      • Add and Configure a Zone
      • Migrate from Legacy Zones to New Zones
        • Create a Device Query
        • Create a New Zone
        • Identify and Organize Zones
        • Troubleshooting
      • Setting up Aurora Protect Desktop
        • Testing your Aurora Protect Desktop deployment
          • Create an Aurora Protect Desktop test policy
          • Exclusions and when to use them
        • Create and manage a device policy
          • Device policy: Malware Protection settings
          • Device policy: Memory Protection settings
            • Windows examples of wildcards used in memory protection exclusions
            • macOS examples of wildcards used in memory protection exclusions
          • Device policy: Script Control settings
            • Examples of script control exclusions
          • Device policy: External Device Control settings
          • Device policy: Application Control settings
          • Device policy: Agent Settings
        • Installing the Aurora Protect Desktop agent for Windows
          • Install the Windows agent
          • Windows installation parameters
          • Install Aurora Protect using Group Policy
        • Installing the Aurora Protect Desktop agent for macOS
          • Install the Aurora Protect Desktop agent for macOS
            • Aurora Protect Desktop configuration requirements for macOS and later
            • Commands for installing the macOS agent using the command line
          • Troubleshooting macOS installations
        • Installing the Aurora Protect Desktop agent for Linux
          • Linux installation prerequisites
            • Create a configuration file for the Linux agent installation
          • Enable Linux Secure Boot
          • Install the Linux agent automatically
          • Install the Linux agent manually
          • Updating the Linux driver
            • Automatically update the Linux driver
            • Manually update the Linux driver
          • Upgrade the Linux agent manually
          • Linux commands for the agent
          • Troubleshooting Linux agent installations
            • Start the UI manually
            • Error: Multilib version problems found
        • Require users to provide a password to remove the Aurora Protect Desktop and Aurora Focus agents
      • Setting up Aurora Focus
        • Install the Aurora Focus agent on devices
          • Configuration requirements for macOS 11.x and later
          • OS commands for the Aurora Focus agent
        • Enable and configure Aurora Focus
          • Aurora Focus sensors
          • Aurora Focus optional sensors
          • Data structures that Aurora Focus uses to identify threats
        • Configuring the Aurora Focus Behavioral Detection Engine
          • Transition Aurora Focus devices from detection rule sets to the Behavioral Detection Engine
          • Create a behavioral detection policy
            • Automated responses by detection type
          • Bulk change MITRE technique configurations in a BDE policy
          • Reviewing and searching for alerts generated by the Behavioral Detection Engine
          • Configure exceptions for the Behavioral Detection Engine
          • Approve updates to the Behavioral Detection Engine
          • Additional resources for BDE
      • Manage Updates for the Aurora Protect Desktop and Aurora Focus Agents
      • Best practices for deploying Aurora Protect Desktop on Windows virtual machines
        • Requirements and considerations for using Aurora Protect Desktop on virtual machines
        • Deploy Aurora Protect Desktop on virtual machines
        • Update Aurora Protect Desktop on cloned devices
      • Using RMM solutions to install the Endpoint Defense agents on devices
        • Use Datto RMM to install or remove the Endpoint Defense agents
        • Use Kaseya VSA 10 to install or remove the Endpoint Defense agents
      • Installing the BlackBerry Protect Connectivity Node
        • Set an environment variable for the Java location
        • Download the installation and activation files for the BlackBerry Protect Connectivity Node
        • Install and configure the BlackBerry Protect Connectivity Node
        • Copy directory connection configurations
        • Configure proxy settings for an BlackBerry Protect Connectivity Node instance
      • Linking to your company directory
        • Configure Aurora Endpoint Security to synchronize with Entra Active Directory
          • Update the Microsoft Entra ID Active Directory connection credentials
        • Connect to Microsoft Active Directory
        • Connect to an LDAP directory
        • Configure onboarding and offboarding
        • Configure directory synchronization schedules
        • Synchronize with your company directory
      • Add users and devices
        • Add Aurora Protect Mobile app and Gateway users
        • Add user groups
          • Add a directory group
          • Add a local group
        • Assign policies to administrators, users, and groups
          • Rank policies
      • Setting up Aurora Protect Mobile
        • Create an Aurora Protect Mobile policy
        • Integrating Aurora Endpoint Security with Microsoft Intune to respond to mobile threats
          • Connect Aurora Endpoint Security to Intune
        • Use Intune app protection policies with Aurora Protect Mobile
      • Setting up Gateway
        • Defining your private network
          • Setting up the Gateway Connector
            • Install the Gateway Connector to a vSphere environment
            • Install the Gateway Connector to an ESXi environment
            • Prerequisites to install Gateway Connector to a Microsoft Entra ID environment
            • Install the Gateway Connector to a Microsoft Entra ID environment
            • Install the Gateway Connector to a Hyper-V environment
            • Install the Gateway Connector to an AWS environment
            • Configure the Gateway Connector in the VM environment
            • Access the Gateway Connector using OpenSSH
            • Configure your firewall for the Gateway Connector
            • Enroll the Gateway Connector with the Protect Backend
            • View details for an enrolled Gateway Connector
            • Configure the Gateway Connector
            • Managing Gateway Connectors
            • Manage Gateway Connectors
            • Update a Gateway Connector
            • UDP connectivity test responses
          • Specify your private network
          • Specify your private DNS
          • Specify your DNS suffixes
          • Specify private Gateway agent IP ranges
          • Bring your own IP addresses (BYOIP)
        • Network Address Translation with Gateway
        • Define network services
        • Controlling network access
          • Applying ACL rules
          • ACL parameters
          • Destination content categories
          • Evaluate the risk level of a network destination
          • Configure the access control list
        • Configuring network protection
          • Destination reputation risk threshold
          • Configure network protection settings
        • Searching ACL rules and Network Services
        • Using source IP pinning
        • Configuring the Gateway service options
          • Gateway Service policy parameters
          • Configure Gateway service options
          • Specifying how devices activated with an EMM solution use the Gateway tunnel
            • Specify which apps use Gateway on iOS devices
            • Specify which apps use Gateway on iOS devices in a Microsoft Intune environment
            • Specify Gateway options on Android Enterprise devices
            • Specify Gateway options on Chromebook devices
            • Specify Gateway options on Android Enterprise devices in your Microsoft Intune environment
        • Connecting Aurora Endpoint Security to MDM solutions to verify whether devices are managed
          • Prerequisites: Verifying that devices are MDM managed
            • Prerequisites: Verifying that iOS devices are managed by UEM
            • Prerequisites: Verifying that Android devices are managed by UEM
          • Add a BlackBerry UEM connector
          • Use BlackBerry UEM to install the Aurora Protect Mobile app on devices
          • Connect Aurora Endpoint Security to Intune
        • Installing the Gateway agent
          • Perform a silent installation and upgrade of the Gateway agent
      • Enroll Aurora Protect Mobile and Gateway users
        • Create an enrollment policy
        • Supported enrollment email variables
      • Setting up CylanceAVERT
        • Installing the CylanceAVERT agent
          • Install CylanceAVERT
        • Define sensitive content using information protection settings
          • Manage evidence collection
          • Add allowed and trusted domains
          • Use templates to group data types
          • Specify sensitive data types
          • Verify domains using trusted certificates
          • Send notifications to specified email addresses
        • Managing information protection policies
          • Best practices for policy consolidation
          • Create an information protection policy
      • Connect Aurora Endpoint Security to an External Service
        • Connect Aurora Endpoint Security to Mimecast
        • Connect Aurora Endpoint Security to Okta
      • Download Aurora software
Home ▸ Aurora Endpoint Security ▸ Aurora Endpoint Security Setup ▸ Aurora Endpoint Security Setup Guide
Share this page
  • LinkedIn
  • X
  • Facebook
  • Email
Print page

Setting up CylanceAVERT

Item

Description



Review the software requirements



Define sensitive content



Install CylanceAVERT



Create information protection policies



Assign policies to administrators, users, and groups

Aurora Endpoint Defense Aurora Endpoint Security Installation or Configuration Public

Last updated: March 30, 2026

Previous Supported enrollment email variables Next Installing the CylanceAVERT agent

Explore Topics

Aurora Endpoint Security Managed Detection and Response (MDR) Managed Risk Managed Security Awareness (MA) Incident Readiness and Response Arctic Wolf Unified Portal MSP Portal Authentication Sensors, Scanners, and Log Collectors Arctic Wolf Agent Onboarding Portal Active Response, Log Forwarding, and Security Monitoring Active Directory Cloud Security Posture Management (CSPM) IT Service Management (ITSM) Developer and OEM Product Updates Additional Information about Products and Services Legacy Risk Dashboard Legacy Analytics
Arctic Wolf Help Documentation
Privacy Policy
Terms of Use
Cookie Policy
Accessibility Statement
Information Security
Sustainability Statement
© 2026 Arctic Wolf Networks Inc. All Rights Reserved.