Start protecting computers

If you haven't registered for a Workload Security account yet, you can sign up for a free 30 day trial account. Once your account is registered, you will need to:

  1. Add AWS EC2 instances to Workload Security, if they exist.
  2. Add Azure virtual machines to Workload Security, if they exist.
  3. Add Google Cloud Platform (GCP) virtual machines to Workload Security, if they exist.
  4. Deploy Deep Security Agents to your AWS EC2 instances or Azure virtual machines.
  5. Protect your instances with policies

You can Try the Workload Security demo to get familiar with the features of Workload Security before you start deploying.

Add AWS EC2 instances to Workload Security

Modify your AWS security group to allow outbound traffic over port 443

If you have AWS security groups that restrict outbound traffic, you need to allow outbound communication over port 443. To do so:

  1. Log in to your Amazon Web Services Console and click EC2.
  2. In the navigation pane, go to Network & Security > Security Groups.
  3. On the Security Group page, select the security group associated with your instances and edit the outbound rules for the group to allow traffic to all IPs over port 443.

You can also further restrict outbound traffic to only allow access to the Workload Security IPs used by Deep Security Agents.

Add AWS EC2 instances

For details on how to add your AWS EC2 instances to Workload Security, see About adding AWS accounts.

Add Azure virtual machines to Workload Security

For instructions on how to add your Azure virtual machines to Workload Security, see Add a Microsoft Azure account to Workload Security.

Add Google Cloud Platform (GCP) virtual machines to Workload Security

For instructions on how to add your GCP virtual machines to Workload Security, see Add a Google Cloud Platform account.

Deploy Deep Security Agents to your AWS EC2 instances or Azure virtual machines

Once you've added your AWS EC2 instances or Azure virtual machines to Workload Security, you need to install the Deep Security Agent on each instance to start protecting it. You can either Use deployment scripts to add and protect computers (recommended) or Manually install the Deep Security Agent.

Protect your instances with policies

Once you've installed the Deep Security Agent on your instances, you need to create policies and assign them to your instances to start protecting them.