Home Getting Started

Getting Started

Quick guides to help you set up StrongKeep, onboard your team, and understand the basics of the platform.
Sir Stonk
By Sir Stonk
7 articles

Introduction

What is StrongKeep? StrongKeep is your all-in-one shield against cyber chaos. Instead of juggling five different vendors and a consultant who charges by the hour, you get compliance, protection, training, and insurance in one platform. We built it for SMEs who need to be secure and audit-ready, but don’t have the time (or appetite) for enterprise-style complexity. Key Benefits for SMEs Here’s what StrongKeep brings to the table: - Time back in your day – compliance tasks that usually take months now take minutes. - Costs that make sense – enterprise-grade security at SME-friendly prices. - Business credibility – pass audits and client checks without the panic. - Real protection – from phishing tests to endpoint defense, all bundled in. Less stress, more security. That’s the deal. System Requirements StrongKeep is built to run simply and smoothly. Here’s all you need: - A modern web browser (Chrome, Edge, Safari, Firefox). - An internet connection. - For endpoint protection: Windows 10/11 or macOS 12+ with at least 4GB RAM. No servers. No complex installs. Just log in and get going. Setting Up Your Account Getting started takes minutes: 1. Sign up at strongkeep.com. Only work email with proper domain names are allowed 2. Verify your email. 3. Start using StrongKeep (yes, it's that simple). Once you’re in, the dashboard guides you step by step — no guesswork required. Onboarding Checklist Run through this list and you’re ready for battle: - Setup your profile - Run your first domain scan - Install endpoint protection on staff devices - Invite employees to complete training (Guide coming soon!) - Get started with compliance certification - Review your dashboard for the next steps Finish this, and you’ve covered the essentials.

Last updated on Nov 06, 2025

Setup your profile

How to Set Up Your Profile (First-Time Login Guide) Overview When you first log in to StrongKeep, we’ll walk you through a quick 3-step setup to personalise your experience — and then introduce you to your dashboard. It only takes a few minutes to get ready for your cyber journey. Step 1: Tell us a little bit about yourself You’ll start by entering some basic details: 1. Your name – This helps us personalise your dashboard and reports. 2. Your designation – For example, “IT Manager” or “Business Owner.” 3. Click Next to continue. 💡 Why we ask: Knowing your role helps StrongKeep tailor tips and recommendations suited to your responsibilities. Step 2: Tell us about your organisation Next, we’ll collect a few details to set up your company profile. 1. Enter your Organisation name. 2. Choose your Country of registered business. 3. (Optional) Fill in your Address and Business Registration Number. 4. Select your Industry, Number of employees, and Number of endpoints (devices to protect). 5. Click Next to move on. 💡 Why we ask: These details help us right-size your protection plan and ensure compliance tasks match your business type. Step 3: Choose your cyber journey Welcome aboard, brave defender! ⚔️ Now, tell us where you’d like to begin: - 🧾 Compliance: “I’m here to level up my company with compliance, one standard at a time.” - 🔒 Protection: “I’m looking for tools to shield my business from threats quickly.” - 👀 Explore: “I’m just here to poke around and see what cybersecurity is about.” Select an option and click Start My Journey. 💡 Tip: You can always switch paths later from your dashboard. Step 4: Explore your StrongKeep dashboard Once you complete setup, your dashboard will open — this is your command center. You’ll see a short guided tour (1-minute walkthrough) introducing: - Your cyber armour: tools to safeguard your data and devices - Your compliance companion: automated certification support - Your watchtower: real-time alerts and monitoring - Your cyber checklist: recommended next steps to strengthen your defences Click Next through the walkthrough, or close it anytime — you can revisit it later. ✅ That’s it! You’re all set to begin your StrongKeep journey. From here, you can explore your dashboard, start a Cyber Essentials assessment, or connect your protection tools. Next step: Run your first domain scan

Last updated on Nov 06, 2025

How to Run Your First Domain Scan

Overview Once your account is set up, StrongKeep automatically starts scanning your company’s email and website security using the domain from your work email address. This helps detect issues like expired certificates, weak encryption, or unsafe redirects — so you know your website and email are protected. Steps 1. Automatic Setup - When you first log in, StrongKeep detects your company’s domain (e.g., yourcompany.com) and verifies it automatically. - A scan for both Mail Server Security and Web Server Security begins right away — no action needed. 2. Adding More Domains or Subdomains If your company uses multiple websites or custom subdomains (e.g., portal.yourcompany.com), you can add them easily: 1. Go to Settings → Domains. 2. Click + Add domain. 3. Enter the new domain name. 4. Click Add to save it. 💡 Tip: You can also add domains directly from the Website/Email Detection page. 3. Verifying a New Domain If it’s a new domain, verification is needed to confirm ownership. To verify: 1. Click Verify beside the domain name. 2. Follow the steps shown — you’ll need to add a TXT record to your DNS. 3. Once the record is detected, the domain will show as Verified ✅ and scans will start automatically. 4. Managing Active Scans - Domains that don’t host a main website can be switched off under Settings → Domains. - Add only the domains or subdomains you want to monitor — such as your main website, client portal, or web app. - Scans refresh periodically; no manual action is needed. 5. Viewing and Sharing Results - Each scan result shows a security score (e.g., 82% or 100%). - 🟢 Green (80–100%): Good — your website and email are well protected. - 🟠 Orange (50–79%): Some fixes recommended. - 🔴 Red (<50%): Immediate action advised. - Click into each scan to see details and resolution steps. - You can share reports with your web host or IT provider for quick fixes. StrongKeep continuously improves its recommendations — so your security gets better over time. Next step: Install endpoint protection on staff devices

Last updated on Nov 06, 2025

How to Protect Your Devices

Overview Protecting your devices keeps your business safe from malware, phishing, and unsafe websites. With StrongKeep, you can: - Add devices your team uses - Install protection automatically or guide your staff - Track protection status in one place Once set up, StrongKeep keeps watch so you don’t have to. Step 1: Add Your Device Before you can protect a device, it needs to appear in Device Management. You have 3 ways to do this: Option A: Install Endpoint Protection (Recommended) 1. Install the Anti-malware agent on the device. 2. Go to Device Management → Sync Now. 3. The device will appear automatically and available for linking Option B: Import via CSV 1. Go to Device Management → Add Device. 2. Upload your CSV file with device details. 3. Assign each device to a staff member. Option C: Add Manually 1. Go to Device Management → Add Device. 2. Enter device details (name, OS, owner). 3. Save the device. 💡 If you added devices manually or via CSV, your staff can install protection themselves through the Staff Portal. They’ll get the correct installer for their device automatically. Step 2: Install Endpoint Protection (Anti-malware) ⚠️ You can skip this step if you used Option A above. The device will already appear with protection after syncing. 1. Open the device from your device list. 2. Under Anti-malware, click How to install. 3. Follow the instructions or ask your staff to install via the Staff Portal. Once installed, the device will show as active. Step 3: Set Up Web Firewall After endpoint protection is installed, add web protection to block unsafe websites. 1. Open the device. 2. Under Web Firewall, locate the Resolver ID. 3. Click the Installation link. 4. Share the link with your staff or install it directly. The link includes step-by-step instructions tailored to the device. What Happens Next? - The device will start reporting activity to StrongKeep - You’ll see protection status and last seen activity - Both you and your staff can track device health Everything stays visible in one place, so nothing slips through. Tips & Troubleshooting - Device not showing up? Click Sync Now after installing the agent. - Wrong device owner? Edit the device details anytime. - Web firewall not active? Make sure the installation link was completed on the device. - Need to remove a device? Uninstall protection first before deleting it.

Last updated on Mar 19, 2026

Get Started with Compliance Certification

Overview This guide walks you through how to complete your first compliance certification in StrongKeep — step by step. You’ll learn how to answer the setup questions, review clauses, generate your policies, and finally submit your certification to the authority. Step 1. Open the Compliance Dashboard Go to Compliance from the left navigation (or from the main dashboard card). You’ll see all available standards. Start with CSA Cyber Essentials (2022) and click Get Started. 💡 Tip: There’s a short video at the top explaining how StrongKeep streamlines certification — it’s worth a quick watch. Step 2. Complete the Questionnaire You’ll begin by defining the scope of your audit — which parts of your business are covered. Tick the relevant options such as Cloud, Mobile Devices, or IoT Devices depending on what your company uses. 🧭 Each system you include may require additional evidence later, so include only what’s relevant to your business. Step 3. Review Certification Clauses You’ll now see two sections: Required Clauses (mandatory) and Recommended Clauses (optional). For each Recommended Clause, choose one of the following: - ✅ Implemented – you already follow this measure - ❌ Not Implemented – not yet in place - ⚙️ Not Applicable – doesn’t apply to your organisation Click Read More beside each clause to view a simple guide written in plain English. Step 4. Review Generated Policy Documents Based on your answers, StrongKeep automatically generates your cybersecurity policies. You can view or download each document (like Access Control Policy or Asset Management Policy) as a PDF. 🛠️ These documents are pre-filled with your selected clauses — no need to write them from scratch. Step 5. Submit Evidence Next, you’ll upload or generate the evidence needed for certification. - Some evidence (like staff training and endpoint protection) can be pulled automatically from your StrongKeep modules. - Others include ready-made templates and samples to guide you. - If you’re unsure where to find something, click “Where do I find this?” for help. Track your progress under the Completed or Pending tabs. Step 6. Fill in Business Information Enter your organisation and representative details — StrongKeep pre-fills what it can from your Profile Settings. Review and update your contact info, company name, and main business activities. Step 7. Review & Submit You’re almost ready to submit for certification! 1. Download the full package to review your policies, evidence, and reports. 2. Complete the declaration and funding support forms provided. 3. Click I’m ready to submit to send everything to the certifying body. After submission: - The certifying body may request clarifications or revisions. - They’ll schedule an interview session to finalise your certification. - Step 8. Upload Your Certification Once you’ve received your official certification, upload a copy in StrongKeep along with the certification and expiry dates. This helps you stay on top of renewals for the next cycle. 🎉 Congratulations — you’ve completed your first certification with StrongKeep! Next step: Review your dashboard for the next steps

Last updated on Nov 06, 2025

Review Your Dashboard for the Next Steps

Overview Your StrongKeep Dashboard is your command center, it gives you a quick snapshot of your company’s cybersecurity health and what to do next. From here, you can see your overall cyber posture, active protection, and recommended actions to stay secure. 1. Start at the Dashboard When you log in, you’ll see an overview of all key areas: Cyber Posture, Actions, Compliance, Email & Website, and Devices. Each card represents a part of your company’s cybersecurity setup. - Items that need setup show a wrench icon 🔧. - Ongoing items display their progress status. - Anything that needs urgent attention appears in red. These indicators help you quickly identify what’s working and what still needs attention. 2. Check Your Cyber Posture The first card shows your Cyber Posture grade, a simple letter score (A to D) calculated using StrongKeep’s algorithm. It factors in both: - Internal risks : such as device protection, training completion, and compliance progress. - External risks : such as relevant cybernews trends. Click into Cyber Posture to view your 30-day trend, detailed scoring breakdown, and an explanation of how your grade is calculated. The higher the score, the stronger your defences. 3. Review Your Dashboard Actions The Actions card lists your recommended next steps, these are specific tasks that will directly improve your cyber posture. Each action includes a short guide to help you complete it confidently. As you finish actions, your posture grade automatically improves. 4. Stay Updated with Cyber News The Cyber News card keeps you informed of the latest incidents and insights relevant to your organisation. StrongKeep curates these updates so you can: - Stay aware of new vulnerabilities - Learn from real-world breaches - Take preventive action when needed Cyber awareness is part of staying protected, think of it as your daily news briefing for digital safety.

Last updated on Nov 06, 2025