Managing the Solution
Introduction
This section provides guidance on how to manage Superna Data Security after the initial deployment is complete. It includes tools and workflows for configuring security components, automating simulations, monitoring activity, and executing operational tasks during and after a security event.
Configuration
Set up recovery policies, auditing behavior, and threat simulation tools. This configuration lays the groundwork for operational response and detection workflows.
Operations
Use Superna Data Security tools to respond to cyber events. This includes restoring user access, recovering files, and investigating suspicious activity with forensics tools.
See Also
Need to revisit initial setup steps? Head back to Getting Started for deployment, licensing, and environment preparation guidance.