Skip to main content
Version: 4.2.0 🚧

Managing the Solution

Introduction

This section provides guidance on how to manage Superna Data Security after the initial deployment is complete. It includes tools and workflows for configuring security components, automating simulations, monitoring activity, and executing operational tasks during and after a security event.

Configuration

Set up recovery policies, auditing behavior, and threat simulation tools. This configuration lays the groundwork for operational response and detection workflows.

Operations

Use Superna Data Security tools to respond to cyber events. This includes restoring user access, recovering files, and investigating suspicious activity with forensics tools.

See Also

Need to revisit initial setup steps? Head back to Getting Started for deployment, licensing, and environment preparation guidance.