Home Platform

Platform

Detailed walkthroughs of StrongKeep’s core tools, including scans, endpoint protection, network protection, password management, automations, training, crisis drills, and incident response.
Sir Stonk
By Sir Stonk
6 articles

Platform Features

Website & Vulnerability Scans How to Run a Scan 1. Go to Scans in your dashboard. 2. Enter your website or application URL. 3. Hit Run Scan. 4. Sit back — results appear once the check is complete. Understanding Scan Results - High Severity – Fix immediately; attackers love these. - Medium Severity – Address soon; they can be chained into bigger issues. - Low Severity – Keep an eye on them; not urgent but worth cleaning up. Fixing Common Issues - Outdated software? Update it. - Weak SSL/TLS settings? Reconfigure your web server. - Missing headers or security policies? Apply recommended patches. If you’re not sure, share the report with your IT vendor — they’ll know what to do. Endpoint Protection (EDR) Installing & Managing Agents 1. Go to Endpoints → Add Endpoint. 2. Download the installer for Windows or Mac. 3. Run the installer on the device. 4. The device will show up in your dashboard once it checks in. Monitoring Devices Your dashboard displays: - Active devices (protected and reporting). - Inactive devices (offline or not reporting). - Alerts if suspicious activity is detected. Responding to Alerts If StrongKeep flags suspicious activity: 1. Check the alert details in your dashboard. 2. We usually block bad things automatically, by default. 3. If confirmed malicious, you can also isolate the device from the network. 4. Follow remediation guidance or escalate to support. Automations & Workflows Setting Up Automated Tasks - Go to Automations → New Workflow. - Select the trigger (e.g., new employee added). - Choose actions (e.g., send policy, assign quiz, install EDR). - Save and activate. Example Workflow: New Employee Onboarding - Send Acceptable Use Policy for acknowledgment. - Assign Security Quiz. - Install EDR agent on their laptop. All done automatically when HR adds them. Example Workflow: Phishing Training & Tracking - Schedule quarterly phishing test emails. - Track who clicks and who reports. - Assign refresher training to repeat offenders. Training & Awareness Running Staff Security Quizzes - Go to Training → Quizzes. - Select the quiz topic. - Assign to individuals or groups. - Completion status shows in the dashboard. Tracking Training Completion - Dashboard displays completion rates by user and department. - Export reports for compliance audits. Phishing Simulation Campaigns - Go to Training → Phishing Tests. - Choose a template (generic, invoice, HR-style). - Launch campaign. - Review results and follow up with targeted training. Insurance How Insurance Qualification Works StrongKeep collects and validates compliance data. If you meet the baseline, we fast-track your application with insurance partners — no endless questionnaires. Linking Compliance to Insurance Discounts - Complete compliance modules. - Pass training and endpoint protection checks. - Your insurer sees you as a lower risk — which translates into lower premiums. Incident Response What’s Included in StrongKeep IR - Access to automated cyber incident response self-help tools. - Guidance on recovery steps. - Help with reporting and insurance claims. How to Trigger an IR Retainer Event 1. Go to Activate Help in your dashboard. 2. Follow the instructions and your insurance (if paid for) will get in touch.

Last updated on Dec 18, 2025

Installing Web Firewall/Scam Protection

Overview DNS Firewall (also called Web Filter Protection) blocks malicious and unsafe websites before they can reach your devices. To keep things simple and secure, this protection is provisioned per device — so the first step is making sure your devices are already onboarded in StrongKeep. Once provisioned, StrongKeep generates a Resolver ID and install link, which guides the user through setup step by step. Don’t worry — you don’t need to be technical. We’ve got you covered 🛡️ Prerequisites Before you start, make sure: - ✅ The device is already onboarded in Device Management - ✅ You have permission to manage devices in StrongKeep If you haven’t onboarded the device yet, head to Team → Device Management first. Option 1: Protect a Single Device Use this if you’re setting up DNS Firewall for just one device. 1. Go to Team → Device Management 2. Click on the device you want to protect 3. Scroll down to the Web Filter section 4. Click Protect this device That’s it — StrongKeep will prepare the setup link for you. Option 2: Protect Multiple Devices at Once Use this if you want to roll out DNS Firewall to several devices together. 1. Go to Team → Device Management 2. Open the Coverage & Services tab 3. Scroll down to the Web Filter section 4. Click Provision Service to Devices 5. Select the devices you want to protect 6. Confirm your selection StrongKeep will now provision DNS Firewall for all selected devices. Resolver ID & Installation Link After provisioning (using either option above), StrongKeep will generate: - Resolver ID - Installation link, in this format: https://controld.com/provision?resolverUid={Resolver ID} What to do next - Share this link with the person who has access to the device(s) - Open the link on the target device - Follow the step-by-step instructions shown on the page to complete installation The instructions are tailored to the device’s operating system, so no guesswork needed.

Last updated on Feb 02, 2026

Install Anti-Malware on Your Devices

Overview This guide helps you install StrongKeep’s anti-malware protection on your company devices, such as laptops used by your team. StrongKeep uses Palo Alto Networks Cortex as the underlying anti-malware and endpoint protection engine. This is the same technology trusted by large enterprises, while setup and daily management remain simple for smaller teams. Once installed, StrongKeep keeps watch in the background. It monitors for malware, suspicious behaviour, and threats, so you do not have to. Before You Start Make sure at least one device has been added to StrongKeep under Device Management. This helps StrongKeep tailor the installer to the right operating system. Ways to Download the Anti-Malware Installer Option 1: Download from Device Management Use this if you just want the installer quickly. 1. Go to Team → Device Management. 2. Click Download Installer. 3. Select the correct operating system (macOS or Windows). 4. Follow the on-screen instructions to download the installer. Option 2: Download from a Specific Device (Recommended) Use this if you’ve already created a device or asset list. 1. Go to Team → Device Management. 2. Click on a device from the list. 3. Scroll to the Anti-Malware section. 4. Download the installer — the OS is pre-selected based on the device record. This reduces mistakes and ensures the right installer is used. Option 3: Download from Coverage & Services Use this if you’re rolling out protection to multiple devices. 1. Go to Team → Device Management. 2. Open the Coverage & Services tab. 3. Scroll down to Anti-Malware. 4. Download the installer for the required operating system. Installing the Anti-Malware After downloading the installer using one of the methods above, share it with the relevant devices and follow the steps below. Install on macOS 1. Open the downloaded .pkg file. 2. Follow the installation wizard. 3. When prompted, allow required security and system permissions. 4. Complete the setup and wait for installation to finish. Once installed, the device will automatically appear as protected in StrongKeep. Install on Windows 1. Open the downloaded .exe installer. 2. Approve the security prompt if shown. 3. Follow the on-screen installation steps. 4. Wait for the installer to complete. The device will check in automatically and show up as protected in your dashboard. What Happens Next? - The device begins reporting security status automatically. - Malware and suspicious activity are monitored in real time. - You can view protection status anytime under Device Management. No daily action needed — StrongKeep keeps watch for you 🛡️ Tips & Troubleshooting - Installer won’t run? Make sure you’re logged in as an admin on the device. - Wrong OS selected? Download again using the device page — it auto-selects the correct version. - Not showing as protected yet? Give it a few minutes, then refresh the dashboard.

Last updated on Dec 22, 2025

Staff Management

Overview Staff Management helps you keep your whole team protected in one place. From here, you can: - Add and organise your staff - Send training to improve cyber awareness - Give access to the Staff Portal for installers and tools - Track each person’s cyber posture at a glance It’s your central view of who’s protected, who needs attention, and what to do next. How to Add Staff (Step-by-Step) 1. Go to Staff Management 2. Click Add Staff 3. Choose one of the four methods: - Microsoft 365 - Google Workspace - Upload CSV - Add manually 4. Follow the prompts to complete setup 5. Send invitations to your staff What You Can Do in Staff Management 1. Add Your Staff You can add staff in four simple ways depending on what works best for your business: Option 1: Sync with Microsoft 365 Connect your Microsoft directory to automatically import your team. Option 2: Sync with Google Workspace Pull your staff list directly from Google Workspace. Option 3: Upload a CSV file Upload a list of staff emails using our template. Option 4: Add staff manually Add individual staff one by one. Once added, you can send them an invitation to join the Staff Portal. 2. Invite Staff to the Portal When you invite a staff member: - They receive an email invitation - They can log in to their Staff Portal - They can access installers and complete training This helps your team take action without needing IT support for every step. 3. Track Cyber Posture Each staff member has a simple status view so you can quickly see: - If their device is protected - If password security is enabled - If training has been completed This makes it easy to spot gaps and follow up. 4. Assign Devices and Services You can assign protection tools and services to each staff member. This ensures: - The right people are protected - Licenses are used properly - Nothing is missed 5. Organise Staff into Groups Create staff groups to stay organised. Groups help you: - Send training to specific teams - Manage departments separately - Roll out protection in batches For example, you can create groups like: - Finance - Operations - New Joiners Tips & Troubleshooting - If a staff member didn’t receive the invite, check their email address and resend it - CSV uploads must follow the provided template format, errors will be shown relating to invalid entries before confirming import - If directory sync fails, reconnect your Microsoft or Google account, refresh the page Why This Matters Your security is only as strong as your people. Staff Management helps you: - Keep everyone accountable - Close security gaps early - Build good cyber habits across your team

Last updated on Mar 19, 2026

Set Up Staff Training Campaigns

How to Set Up Staff Training Campaigns Overview Training your staff is one of the simplest ways to reduce everyday cyber risks. StrongKeep helps you roll this out in minutes — from onboarding new hires to ongoing awareness training. Pre-requisites Before you begin, make sure your staff list is already added. Training campaigns are sent directly to your team. Step 1: Go to Training Campaigns From your dashboard, go to Training → Staff Training. You’ll see: - A default campaign for all staff- Onboarding - Recommended templates to get started quickly Step 2: Choose a Campaign Option A (Recommended): Use the default Onboarding campaign This is ready out of the box — no setup needed. Just click Continue Setup. Option B: Start a new campaign Pick from templates like: - Progressive Cyber Awareness - Keeping Devices Safe - Watching for Online Threats - Data & Privacy These help you target specific risks your team faces. Step 3: Review Campaign Summary Before launching, you’ll see a summary of the campaign. For the Onboarding campaign: - Staff participants: Automatically set to All staff - End date: No end date (continuous learning for new hires) - Purpose: Pre-filled to guide new staff on cyber basics For other campaigns, you can usually adjust: - Staff group or participants - Campaign end date Step 4: Preview the Training Email StrongKeep sends each staff member a training email with their own unique link. In this step, you can: - Review the email content - Click Send Test Email to yourself - Open the training link to preview the quiz experience Each staff member will receive: - A personalised training link - A randomised set of questions based on the selected topic This keeps training fair and prevents answer sharing. Step 5: Launch the Campaign Once everything looks good: 1. Click Start Training Campaign 2. Emails will be sent to your staff automatically That’s it — your training is live. Step 6: Track Progress and Results After launching, you can monitor how your team is doing in real time. You’ll see: - Overall completion rate - Number of staff who completed training - Email delivery and engagement (sent, opened, bounced) - Individual campaign performance Step 7: Download Reports You can export results anytime: - Campaign Report → For a single campaign - Overall Training Report → Across all campaigns Reports help you: - Track compliance progress - Share results with management - Identify staff who need follow-up Tips & Troubleshooting - No staff receiving emails? Make sure your staff list is populated and emails are valid. - Low completion rates? Send reminders or follow up with staff who haven’t completed training. - Want more targeted training? Use different templates for different teams or risk areas.

Last updated on Mar 19, 2026

Set Up a Phishing Simulation

Overview Phishing simulations help you safely test how your staff respond to real-world email threats. You’ll see who clicks, who reports, and where your team may need more awareness — so you can strengthen your human firewall. Before You Start Make sure the following is ready: - Your staff list is populated via Microsoft 365 or Google Workspace - Staff added via CSV or manual entry will not appear in phishing simulations - You have admin access to grant email permissions Steps 1. Go to Phishing Simulator - Navigate to Training → Phishing Simulator 2. Grant Email Permissions (Required First Step) To run simulations, StrongKeep needs permission to send simulated emails. - Click to grant consent for direct mail injection - This must be done by an M365 or Google Workspace admin - Follow the on-screen instructions for your provider This step ensures emails are delivered realistically — just like real phishing attempts. 3. Choose a Template - Browse available templates Each template uses a different phishing tactic to train your staff. Choose one that fits the scenario you want to test. 4. Configure Campaign Details Fill in the key details: - Sender’s Name and Email - You can simulate a colleague (e.g. leadership) - Slight variations or misspellings make it more realistic - End Date - Defines when the simulation ends and results are finalized - Target Staff Group - Select users synced from Microsoft 365 or Google Workspace 5. Review and Preview Before launching, you’ll see a full preview: - The phishing email - The landing page staff will see if they click - The post-simulation education page - The final summary email sent to staff You can also: - Send a test email to yourself - Check that everything looks realistic and aligned 6. Launch the Campaign - Click Start Phishing Campaign when ready StrongKeep will handle delivery and tracking automatically. After Launch You can track results in real time: - Who opened the email - Who clicked the link - Who ignored or handled it correctly Once the campaign ends: - A final summary is generated - You can download reports for individual campaigns or overall performance Tips & Troubleshooting - Staff not showing up? → Make sure they were added via Microsoft 365 or Google Workspace sync - Can’t proceed with setup? → Ensure admin consent for email injection is completed - Want a realistic simulation? → Use familiar names and slightly altered emails — this mimics real attacks

Last updated on Mar 19, 2026