Start protecting computers
If you haven't registered for a Workload Security account yet, you can sign up for a free 30 day trial account. Once your account is registered, you will need to:
- Add AWS EC2 instances to Workload Security, if they exist.
- Add Azure virtual machines to Workload Security, if they exist.
- Add Google Cloud Platform (GCP) virtual machines to Workload Security, if they exist.
- Deploy Deep Security Agents to your AWS EC2 instances or Azure virtual machines.
- Protect your instances with policies
You can Try the Workload Security demo to get familiar with the features of Workload Security before you start deploying.
Modify your AWS security group to allow outbound traffic over port 443
If you have AWS security groups that restrict outbound traffic, you need to allow outbound communication over port 443. To do so:
- Log in to your Amazon Web Services Console and click EC2.
- In the navigation pane, go to Network & Security > Security Groups.
- On the Security Group page, select the security group associated with your instances and edit the outbound rules for the group to allow traffic to all IPs over port 443.
You can also further restrict outbound traffic to only allow access to the Workload Security IPs used by Deep Security Agents.
Add AWS EC2 instances
For details on how to add your AWS EC2 instances to Workload Security, see About adding AWS accounts.
For instructions on how to add your Azure virtual machines to Workload Security, see Add a Microsoft Azure account to Workload Security.
For instructions on how to add your GCP virtual machines to Workload Security, see Add a Google Cloud Platform account.
Once you've added your AWS EC2 instances or Azure virtual machines to Workload Security, you need to install the Deep Security Agent on each instance to start protecting it. You can either Use deployment scripts to add and protect computers (recommended) or Manually install the Deep Security Agent.
Once you've installed the Deep Security Agent on your instances, you need to create policies and assign them to your instances to start protecting them.