Sign up
Submit the account form with name, email, and password.
/signup.htmlUse this document as the implementation path for new users: complete sign-up form, activate account from email verification link, choose deployment method (standalone, Docker, K8s, EKS, ECS), then continue to findings, events, and policy control.
How to start
Complete these steps in order to go from account creation to runtime analysis and control.
Submit the account form with name, email, and password.
/signup.htmlOpen your email and click the verify link before first login.
Select one deployment method based on your environment.
Confirm inventory assets and event flow in Security Posture and Event Timeline.
Triage findings, analyze events, and tune file/process/network policies.
Sign-up and verification must happen first. Deployment comes next, then event analysis and policy hardening in the runtime console.
Solution model
After onboarding is complete, use this as the operating model for daily runtime security work.
Ingest runtime signals from Kubernetes-managed containers, standalone containers, and Linux hosts in one place.
Correlate threat, vulnerability, and behavioral findings to prioritize high-impact runtime issues.
Apply policy controls to reduce alert noise and enforce monitoring coverage where risk is concentrated.
Deployment tracks
Choose one method first (standalone, Docker, Kubernetes, EKS, ECS), then verify event flow and control posture.
Enable namespace and pod context for runtime findings and policy actions.
Cover standalone container runtimes and host-level container workloads.
Track host process execution, file drift, and network runtime events.
Operational workflow
Use this sequence to reduce context switching and improve runtime response quality.
Get coverage and telemetry health before deep investigation.
Use combined findings and process alerts to prioritize investigations.
Apply monitoring controls where detections are noisy or high-risk.
Detection domains
Use this table as the default mapping between detection signals and control actions.
| Domain | Primary signals | Triage entry point | Control action |
|---|---|---|---|
| Threat + Vulnerability | MITRE tags, PCI tags, CVE-linked indicators, exploit behaviors | /overview.php?view=findings |
Prioritize assets and map policy hardening |
| Process | Unexpected execution chains, privilege escalation, noisy binaries | /overview.php?view=top_alerts |
/overview.php?view=policies_process |
| File | Sensitive path writes, config drift, binary tampering | /overview.php?view=events&action=fim |
/overview.php?view=policies_file |
| Network | IOC lookups, egress anomalies, unexpected destinations | /overview.php?view=events |
/overview.php?view=policies_network |
Troubleshooting
Validate that the environment has active sensors and current inventory events. Then verify date range and customer scope filters.
Open combined findings first, identify top process alert sources, then tune process and file policies for those binaries and paths.
Review Runtime Overview asset matrix and ensure host rows include process and file signal counts in the current time window.
Yes. Policy controls support host and non-managed container use cases in addition to Kubernetes-managed workloads.
Use this order: sign-up, verify email, deploy sensor, validate events, then tune controls in the console.