Home Getting Started

Getting Started

Quick guides to help you set up StrongKeep, onboard your team, and understand the basics of the platform.
Sir Stonk
By Sir Stonk
6 articles

Introduction

What is StrongKeep? StrongKeep is your all-in-one shield against cyber chaos. Instead of juggling five different vendors and a consultant who charges by the hour, you get compliance, protection, training, and insurance in one platform. We built it for SMEs who need to be secure and audit-ready, but don’t have the time (or appetite) for enterprise-style complexity. Key Benefits for SMEs Here’s what StrongKeep brings to the table: - Time back in your day – compliance tasks that usually take months now take minutes. - Costs that make sense – enterprise-grade security at SME-friendly prices. - Business credibility – pass audits and client checks without the panic. - Real protection – from phishing tests to endpoint defense, all bundled in. Less stress, more security. That’s the deal. System Requirements StrongKeep is built to run simply and smoothly. Here’s all you need: - A modern web browser (Chrome, Edge, Safari, Firefox). - An internet connection. - For endpoint protection: Windows 10/11 or macOS 12+ with at least 4GB RAM. No servers. No complex installs. Just log in and get going. Setting Up Your Account Getting started takes minutes: 1. Sign up at strongkeep.com. Only work email with proper domain names are allowed 2. Verify your email. 3. Start using StrongKeep (yes, it's that simple). Once you’re in, the dashboard guides you step by step — no guesswork required. Onboarding Checklist Run through this list and you’re ready for battle: - Setup your profile - Run your first domain scan - Install endpoint protection on staff devices - Invite employees to complete training (Guide coming soon!) - Get started with compliance certification - Review your dashboard for the next steps Finish this, and you’ve covered the essentials.

Last updated on Nov 06, 2025

Setup your profile

How to Set Up Your Profile (First-Time Login Guide) Overview When you first log in to StrongKeep, we’ll walk you through a quick 3-step setup to personalise your experience — and then introduce you to your dashboard. It only takes a few minutes to get ready for your cyber journey. Step 1: Tell us a little bit about yourself You’ll start by entering some basic details: 1. Your name – This helps us personalise your dashboard and reports. 2. Your designation – For example, “IT Manager” or “Business Owner.” 3. Click Next to continue. 💡 Why we ask: Knowing your role helps StrongKeep tailor tips and recommendations suited to your responsibilities. Step 2: Tell us about your organisation Next, we’ll collect a few details to set up your company profile. 1. Enter your Organisation name. 2. Choose your Country of registered business. 3. (Optional) Fill in your Address and Business Registration Number. 4. Select your Industry, Number of employees, and Number of endpoints (devices to protect). 5. Click Next to move on. 💡 Why we ask: These details help us right-size your protection plan and ensure compliance tasks match your business type. Step 3: Choose your cyber journey Welcome aboard, brave defender! ⚔️ Now, tell us where you’d like to begin: - 🧾 Compliance: “I’m here to level up my company with compliance, one standard at a time.” - 🔒 Protection: “I’m looking for tools to shield my business from threats quickly.” - 👀 Explore: “I’m just here to poke around and see what cybersecurity is about.” Select an option and click Start My Journey. 💡 Tip: You can always switch paths later from your dashboard. Step 4: Explore your StrongKeep dashboard Once you complete setup, your dashboard will open — this is your command center. You’ll see a short guided tour (1-minute walkthrough) introducing: - Your cyber armour: tools to safeguard your data and devices - Your compliance companion: automated certification support - Your watchtower: real-time alerts and monitoring - Your cyber checklist: recommended next steps to strengthen your defences Click Next through the walkthrough, or close it anytime — you can revisit it later. ✅ That’s it! You’re all set to begin your StrongKeep journey. From here, you can explore your dashboard, start a Cyber Essentials assessment, or connect your protection tools. Next step: Run your first domain scan

Last updated on Nov 06, 2025

How to Run Your First Domain Scan

Overview Once your account is set up, StrongKeep automatically starts scanning your company’s email and website security using the domain from your work email address. This helps detect issues like expired certificates, weak encryption, or unsafe redirects — so you know your website and email are protected. Steps 1. Automatic Setup - When you first log in, StrongKeep detects your company’s domain (e.g., yourcompany.com) and verifies it automatically. - A scan for both Mail Server Security and Web Server Security begins right away — no action needed. 2. Adding More Domains or Subdomains If your company uses multiple websites or custom subdomains (e.g., portal.yourcompany.com), you can add them easily: 1. Go to Settings → Domains. 2. Click + Add domain. 3. Enter the new domain name. 4. Click Add to save it. 💡 Tip: You can also add domains directly from the Website/Email Detection page. 3. Verifying a New Domain If it’s a new domain, verification is needed to confirm ownership. To verify: 1. Click Verify beside the domain name. 2. Follow the steps shown — you’ll need to add a TXT record to your DNS. 3. Once the record is detected, the domain will show as Verified ✅ and scans will start automatically. 4. Managing Active Scans - Domains that don’t host a main website can be switched off under Settings → Domains. - Add only the domains or subdomains you want to monitor — such as your main website, client portal, or web app. - Scans refresh periodically; no manual action is needed. 5. Viewing and Sharing Results - Each scan result shows a security score (e.g., 82% or 100%). - 🟢 Green (80–100%): Good — your website and email are well protected. - 🟠 Orange (50–79%): Some fixes recommended. - 🔴 Red (<50%): Immediate action advised. - Click into each scan to see details and resolution steps. - You can share reports with your web host or IT provider for quick fixes. StrongKeep continuously improves its recommendations — so your security gets better over time. Next step: Install endpoint protection on staff devices

Last updated on Nov 06, 2025

How to Install Endpoint Protection on Staff Devices

Overview Endpoint Protection helps you monitor, detect, and block threats on every staff device — automatically. StrongKeep partners with Palo Alto Networks, one of the world’s leading cybersecurity providers, to deliver enterprise-grade protection that’s easy for SMBs to deploy. Once installed, the agent keeps your staff devices protected in real time and reports security alerts directly to your Detection → Alerts page. Steps 1. Go to Protection → Endpoints If no devices are onboarded yet, you’ll see an empty state with a button that says Download Installation Packages. Click it to begin. 2. Select your operating system You’ll be directed to the Download Installer page. Choose the correct installer based on your staff device’s OS Then click Download to save the installer. The installation UI will have insturctions on how to set it up, if you need more details can refer to Cortex Help Center. You can find the guides under Agent Administrator Guide > Select Version (e.g. Version 8.9) > On the left menu select the OS version and installation guide 3. Distribute and install Share the installer with your team and run it on all staff endpoints that need protection. The setup process typically takes 5–10 minutes per device. 4. Add more device licenses (if needed) If you’ve reached your plan limit, click Get More Licences. A modal will appear showing the per-device pricing Adjust the number of additional devices and click Checkout to confirm. 5. Verify connection After installation, it may take a short while for devices to appear in the Endpoints Management page. You’ll soon see each device listed with its status (Connected, Disconnected, Protected, etc.). 6. Monitor alerts Once active, the endpoint agent continuously scans for malware, suspicious behavior, and vulnerabilities. You can monitor all findings under Detection → Alerts. Tips & Troubleshooting - It can take up to 3 hours after installation for new endpoints to sync. - If an endpoint shows as Disconnected for a long time, ensure it’s connected to the internet. - For installation errorsxx, re-download the installer for the correct OS and retry. - Each license covers one device. You can always add more later. Next step: Get started with compliance certification

Last updated on Nov 06, 2025

Get Started with Compliance Certification

Overview This guide walks you through how to complete your first compliance certification in StrongKeep — step by step. You’ll learn how to answer the setup questions, review clauses, generate your policies, and finally submit your certification to the authority. Step 1. Open the Compliance Dashboard Go to Compliance from the left navigation (or from the main dashboard card). You’ll see all available standards. Start with CSA Cyber Essentials (2022) and click Get Started. 💡 Tip: There’s a short video at the top explaining how StrongKeep streamlines certification — it’s worth a quick watch. Step 2. Complete the Questionnaire You’ll begin by defining the scope of your audit — which parts of your business are covered. Tick the relevant options such as Cloud, Mobile Devices, or IoT Devices depending on what your company uses. 🧭 Each system you include may require additional evidence later, so include only what’s relevant to your business. Step 3. Review Certification Clauses You’ll now see two sections: Required Clauses (mandatory) and Recommended Clauses (optional). For each Recommended Clause, choose one of the following: - ✅ Implemented – you already follow this measure - ❌ Not Implemented – not yet in place - ⚙️ Not Applicable – doesn’t apply to your organisation Click Read More beside each clause to view a simple guide written in plain English. Step 4. Review Generated Policy Documents Based on your answers, StrongKeep automatically generates your cybersecurity policies. You can view or download each document (like Access Control Policy or Asset Management Policy) as a PDF. 🛠️ These documents are pre-filled with your selected clauses — no need to write them from scratch. Step 5. Submit Evidence Next, you’ll upload or generate the evidence needed for certification. - Some evidence (like staff training and endpoint protection) can be pulled automatically from your StrongKeep modules. - Others include ready-made templates and samples to guide you. - If you’re unsure where to find something, click “Where do I find this?” for help. Track your progress under the Completed or Pending tabs. Step 6. Fill in Business Information Enter your organisation and representative details — StrongKeep pre-fills what it can from your Profile Settings. Review and update your contact info, company name, and main business activities. Step 7. Review & Submit You’re almost ready to submit for certification! 1. Download the full package to review your policies, evidence, and reports. 2. Complete the declaration and funding support forms provided. 3. Click I’m ready to submit to send everything to the certifying body. After submission: - The certifying body may request clarifications or revisions. - They’ll schedule an interview session to finalise your certification. - Step 8. Upload Your Certification Once you’ve received your official certification, upload a copy in StrongKeep along with the certification and expiry dates. This helps you stay on top of renewals for the next cycle. 🎉 Congratulations — you’ve completed your first certification with StrongKeep! Next step: Review your dashboard for the next steps

Last updated on Nov 06, 2025

Review Your Dashboard for the Next Steps

Overview Your StrongKeep Dashboard is your command center, it gives you a quick snapshot of your company’s cybersecurity health and what to do next. From here, you can see your overall cyber posture, active protection, and recommended actions to stay secure. 1. Start at the Dashboard When you log in, you’ll see an overview of all key areas: Cyber Posture, Actions, Compliance, Email & Website, and Devices. Each card represents a part of your company’s cybersecurity setup. - Items that need setup show a wrench icon 🔧. - Ongoing items display their progress status. - Anything that needs urgent attention appears in red. These indicators help you quickly identify what’s working and what still needs attention. 2. Check Your Cyber Posture The first card shows your Cyber Posture grade, a simple letter score (A to D) calculated using StrongKeep’s algorithm. It factors in both: - Internal risks : such as device protection, training completion, and compliance progress. - External risks : such as relevant cybernews trends. Click into Cyber Posture to view your 30-day trend, detailed scoring breakdown, and an explanation of how your grade is calculated. The higher the score, the stronger your defences. 3. Review Your Dashboard Actions The Actions card lists your recommended next steps, these are specific tasks that will directly improve your cyber posture. Each action includes a short guide to help you complete it confidently. As you finish actions, your posture grade automatically improves. 4. Stay Updated with Cyber News The Cyber News card keeps you informed of the latest incidents and insights relevant to your organisation. StrongKeep curates these updates so you can: - Stay aware of new vulnerabilities - Learn from real-world breaches - Take preventive action when needed Cyber awareness is part of staying protected, think of it as your daily news briefing for digital safety.

Last updated on Nov 06, 2025