background image

 

www.fidelissecurity.com

 

About Fidelis Cybersecurity 

Fidelis Cybersecurity, the industry innovator in Active XDR and proactive cyber defense solutions, safeguards 
modern IT environments with unparalleled detection, deception, response, cloud security, and compliance 
capabilities. We offer full visibility across hybrid environments via deep, dynamic asset discovery, multi-faceted 
context, and risk assessment. These features help minimize attackable surface areas, automate exposure 
prevention, threat detection, and incident response, and provide the context, accuracy, speed, and portability 
security professionals need to find and neutralize adversaries earlier in the attack lifecycle. Fidelis Cybersecurity 
is dedicated to helping clients become stronger and more secure. Fidelis is trusted by many top commercial, 
enterprise, and government agencies worldwide. For more information, please visit 

www.fidelissecurity.com 

 

Copyright © 2022 Fidelis Cybersecurity

®

, Inc. All rights reserved. 

 

 

Fidelis Network

®

/Fidelis Deception

®

 

CommandPost 

Quick Start Guide 
Rev-K (HPE DL360 Gen10) Platforms 

 

 

Содержание Deception CommandPost

Страница 1: ...ttackable surface areas automate exposure prevention threat detection and incident response and provide the context accuracy speed and portability security professionals need to find and neutralize ad...

Страница 2: ...ck tools rails and connectors Keyboard and video monitor KVM switch for temporary appliance setup Power cables two per appliance appropriate power source and region Ethernet cables cat5e for Admin and...

Страница 3: ...act Fidelis Cybersecurity Technical support at Phone 1 301 652 7190 Toll free in the US and Canada 1 800 652 4020 Email support fidelissecurity com Web https support fidelissecurity com 3 CommandPost...

Страница 4: ...of the appliance Use the tables below to determine the count and type of switch ports required to support the number of appliances for your deployment Admin Network The Admin network connects the Com...

Страница 5: ...5 0 Gateway 10 1 2 1 Proxy Server 10 5 6 7 DNS Servers 8 8 4 4 8 8 8 8 NTP Servers 0 pool1 ntp org Time Zone UTC 0 6 Appliance Installation Rack Installation Install each appliance in an enclosure loc...

Страница 6: ...ring iLO to Use a Static IP Address 1 Log into the iLO console https IP address where IP address is the iLO IP address 2 Specify the credentials Username Administrator Password A random eight characte...

Страница 7: ...ese values 7 Enter values in the IP Address Subnet Mask and Gateway IP Address boxes See Section 5 Appendix A 8 To save the changes and exit press F12 The iLO 5 Configuration Utility prompts you to co...

Страница 8: ...rform Initial Install or Factory Reset selected press Enter 3 Use the Up and Down arrow keys to select CommandPost and press Enter The system displays a screen with the message Congratulations your Ce...

Страница 9: ...e return to the top menu 9 When complete select OK to leave Setup 10 From the command line reboot the system sudo fss bin shutdown pl user admin reboot 8 Fidelis Licensing The Fidelis CommandPost come...

Страница 10: ...d site location Fidelis Cybersecurity Support will respond within one business day with a license key Enter a License Key After receiving a response to your license request 1 Copy the license key from...

Страница 11: ...iguration 6x HDD 600GB RAID 5 3 TB Effective Network Adapters Default Config 4x 1GbE Out of Band Management Integrated Lights Out Management iLO Power Supply Dual hot swap 800W High Efficiency AC powe...

Страница 12: ...the table below shows the software to apply based on the appliance SKU Note the SKU typically starts with FNH You can find the SKU in the following locations Appliance lid UID decal see sample on righ...

Страница 13: ...features help minimize attackable surface areas automate exposure prevention threat detection and incident response and provide the context accuracy speed and portability security professionals need...

Отзывы: