background image

 

www.fidelissecurity.com

 

About Fidelis Cybersecurity 

Fidelis Cybersecurity, the industry innovator in Active XDR and proactive cyber defense solutions, safeguards 
modern IT environments with unparalleled detection, deception, response, cloud security, and compliance 
capabilities. We offer full visibility across hybrid environments via deep, dynamic asset discovery, multi-faceted 
context, and risk assessment. These features help minimize attackable surface areas, automate exposure 
prevention, threat detection, and incident response, and provide the context, accuracy, speed, and portability 
security professionals need to find and neutralize adversaries earlier in the attack lifecycle. Fidelis Cybersecurity 
is dedicated to helping clients become stronger and more secure. Fidelis is trusted by many top commercial, 
enterprise, and government agencies worldwide. For more information, please visit 

www.fidelissecurity.com 

 

Copyright © 2022 Fidelis Cybersecurity

®

, Inc. All rights reserved. 

 

 

Fidelis Network

®

/Fidelis Deception

®

 

CommandPost 

Quick Start Guide 
Rev-K (HPE DL360 Gen10) Platforms 

 

 

Summary of Contents for Deception CommandPost

Page 1: ...ttackable surface areas automate exposure prevention threat detection and incident response and provide the context accuracy speed and portability security professionals need to find and neutralize ad...

Page 2: ...ck tools rails and connectors Keyboard and video monitor KVM switch for temporary appliance setup Power cables two per appliance appropriate power source and region Ethernet cables cat5e for Admin and...

Page 3: ...act Fidelis Cybersecurity Technical support at Phone 1 301 652 7190 Toll free in the US and Canada 1 800 652 4020 Email support fidelissecurity com Web https support fidelissecurity com 3 CommandPost...

Page 4: ...of the appliance Use the tables below to determine the count and type of switch ports required to support the number of appliances for your deployment Admin Network The Admin network connects the Com...

Page 5: ...5 0 Gateway 10 1 2 1 Proxy Server 10 5 6 7 DNS Servers 8 8 4 4 8 8 8 8 NTP Servers 0 pool1 ntp org Time Zone UTC 0 6 Appliance Installation Rack Installation Install each appliance in an enclosure loc...

Page 6: ...ring iLO to Use a Static IP Address 1 Log into the iLO console https IP address where IP address is the iLO IP address 2 Specify the credentials Username Administrator Password A random eight characte...

Page 7: ...ese values 7 Enter values in the IP Address Subnet Mask and Gateway IP Address boxes See Section 5 Appendix A 8 To save the changes and exit press F12 The iLO 5 Configuration Utility prompts you to co...

Page 8: ...rform Initial Install or Factory Reset selected press Enter 3 Use the Up and Down arrow keys to select CommandPost and press Enter The system displays a screen with the message Congratulations your Ce...

Page 9: ...e return to the top menu 9 When complete select OK to leave Setup 10 From the command line reboot the system sudo fss bin shutdown pl user admin reboot 8 Fidelis Licensing The Fidelis CommandPost come...

Page 10: ...d site location Fidelis Cybersecurity Support will respond within one business day with a license key Enter a License Key After receiving a response to your license request 1 Copy the license key from...

Page 11: ...iguration 6x HDD 600GB RAID 5 3 TB Effective Network Adapters Default Config 4x 1GbE Out of Band Management Integrated Lights Out Management iLO Power Supply Dual hot swap 800W High Efficiency AC powe...

Page 12: ...the table below shows the software to apply based on the appliance SKU Note the SKU typically starts with FNH You can find the SKU in the following locations Appliance lid UID decal see sample on righ...

Page 13: ...features help minimize attackable surface areas automate exposure prevention threat detection and incident response and provide the context accuracy speed and portability security professionals need...

Reviews: