When taking F-Secure Elements Endpoint Protection into use, the typical process includes five steps.
- Logging into your Elements Security Center account.
- Selecting the Elements solution that you want to administer, for example, Endpoint Protection, Vulnerability Management, Detection & Response, or Microsoft 365.
- If you are a Solution Provider (SoP) or a Service Partner (SeP), selecting a company to administer.
- Adding devices (computers and mobiles) to the Elements Security Center (ESC).
- Creating and assigning one or more profiles for the devices.
Source : Official F-Secure Brand
Editor by : BEST Antivirus KBS Team
(Visited 7 times, 1 visits today)