Managing the Solution
Introduction​
This section provides guidance on how to manage Superna Data Security after the initial deployment is complete. It includes tools and workflows for configuring security components, automating simulations, monitoring activity, and executing operational tasks during and after a security event.
Configuration​
Set up recovery policies, auditing behavior, and threat simulation tools. This configuration lays the groundwork for operational response and detection workflows.
Operations​
Use Superna Data Security tools to respond to cyber events. This includes restoring user access, recovering files, and investigating suspicious activity with forensics tools.
See Also​
Need to revisit initial setup steps? Head back to Getting Started for deployment, licensing, and environment preparation guidance.