User Guide & FAQ

User Guide & FAQ

Welcome to the Aegis Sentinelยฎ Help Centerโ€”Everything you need to protect your business with confidence

Getting Started

How do I sign up for an account?

  1. Visit aegissentinel.io
  2. Click “Start Free Trial” or “Get Started”
  3. Enter your:
    • Business email address
    • Company name
    • Phone number (for security alerts)
  4. Verify your email address (check spam if needed)
  5. Set up your password (minimum 12 characters, must include uppercase, lowercase, number, and special character)
  6. Complete the initial network scan

You’re ready! Your dashboard will populate within 5-10 minutes as Aegis Sentinel discovers your network devices.

What happens during the initial setup?

When you sign up, Aegis Sentinel automatically:

  • Discovers devices: Scans your network to identify all connected devices (computers, printers, IoT devices, etc.)
  • Establishes baselines: Learns normal behavior patterns for your network
  • Assigns security scores: Rates each device based on vulnerabilities and compliance
  • Sends your first report: Emails a summary of what was found

No installation required! Aegis Sentinel is entirely cloud-based. There’s no software to download, no servers to maintain, and no IT expertise needed.

How long does setup take?

  • Account creation: 3-5 minutes
  • Initial network discovery: 5-10 minutes
  • Full baseline establishment: 24-48 hours

You can start using your dashboard immediately, but threat detection accuracy improves after the baseline period.

What if I have multiple locations?

Aegis Sentinel supports multi-site monitoring:

  • Free plan: Single location only
  • Pro plan: Up to 3 locations
  • Business plan: Unlimited locations

Each location appears as a separate network in your dashboard with its own device inventory and alerts.

Understanding Dashboard

What am I looking at on my dashboard?

Your Aegis Sentinel dashboard has four main sections:

1. Security Health Score (Top Center)

  • Green (80-100): Your network is secure
  • Yellow (60-79): Minor issues detected โ€“ review recommended actions
  • Red (0-59): Critical vulnerabilities โ€“ take immediate action

2. Active Alerts Panel (Right Side)

Shows real-time security events requiring attention, color-coded by severity:

  • Red Critical (immediate action required)
  • Orange High priority (action within 24 hours)
  • Yellow Medium priority (action within 1 week)
  • Blue Informational (no action needed)

3. Discovered Devices Table (Center)

Lists every device on your network with:

  • Device name and type (PC, printer, camera, etc.)
  • IP address
  • Security score (0-100)
  • Last seen timestamp
  • Quick action buttons (View Details, Quarantine, Run Scan)

4. Quick Statistics (Top Row)

  • Total Devices: How many devices we’re monitoring
  • At-Risk Devices: Devices with security scores below 60
  • Active Threats: Current security incidents
  • Compliance Status: Your progress toward industry standards (HIPAA, PCI-DSS, etc.)

Why did my security score change?

Your score updates automatically when:

  • New vulnerabilities are discovered on your devices
  • Software updates fix security issues (score improves)
  • New devices join your network
  • Suspicious activity is detected
  • You take recommended actions

Click on your score to see a detailed breakdown of what’s affecting it.

What does “Last Seen” mean?

“Last Seen” shows when a device last communicated on your network:

  • Active (green dot): Device online right now
  • Recent (yellow dot): Seen within last 24 hours
  • Offline (gray dot): Not seen for 24+ hours

Pro Tip: If a device shows “offline” but you know it’s on, it may be blocking network scans (common with certain security cameras). Check device settings or contact support.

Plain-English Alerts

What makes Aegis Sentinel alerts different?

We translate technical security jargon into clear, actionable language:

Traditional Security Alert:

CVE-2024-1234: Remote code execution vulnerability detected in device 192.168.1.45 (Apache HTTP Server 2.4.49). CVSS score 9.8. Exploit available. Immediate patching required.

Aegis Sentinel Alert:

Security Camera Needs Update

Your lobby security camera has a critical security flaw that hackers could use to access your network. Click “Update Now” to fix it automatically, or we can schedule this for tonight after hours.

Every alert includes:

  • What happened: Plain explanation of the issue
  • Why it matters: Real-world impact to your business
  • What to do: Step-by-step instructions or one-click fixes
  • How urgent: Color-coded priority level

What should I do when I get an alert?

  1. Read the alert: We explain what’s wrong in plain English
  2. Check the priority:
    • Red = do it now (within 1 hour)
    • Orange = do it today
    • Yellow = do it this week
  3. Take action: Click the recommended action button, or follow the manual steps
  4. Confirm completion: The alert will disappear once the issue is resolved

Can I customize alert settings?

Yes! Go to Settings > Notifications to control:

  • Delivery method: Email, SMS, or in-app only
  • Priority threshold: Only notify for medium+ or high+ alerts
  • Quiet hours: Pause non-critical alerts during specific times
  • Alert consolidation: Group similar alerts into daily digests

Recommended Settings for Small Businesses:

  • Email: All alerts
  • SMS: Critical and high priority only
  • Quiet hours: 6 PM โ€“ 8 AM for medium/low alerts
  • Daily digest: Enabled for informational alerts

Core Features & Actions

How do I quarantine a suspicious device?

Quarantine = temporarily blocking a device from your network

  1. Find the device in your Discovered Devices table
  2. Click the Quarantine button (โš ๏ธ icon)
  3. Confirm the action

The device will be isolated within 30 seconds. It can no longer:

  • Access other devices on your network
  • Connect to the internet
  • Send or receive data

When to quarantine:

  • Device shows signs of infection or compromise
  • Unknown device appears on your network
  • Device is behaving suspiciously (unusual traffic patterns)
  • Alert recommends quarantine

How do I manually scan a device?

Aegis Sentinel automatically scans all devices every 6 hours, but you can run manual scans:

  1. Select the device in your dashboard
  2. Click Run Scan
  3. Choose scan type:
    • Quick Scan: 2-3 minutes, checks for common vulnerabilities
    • Deep Scan: 10-15 minutes, comprehensive security audit
  4. Wait for results (you’ll get an email when complete)

What is a “security profile” and do I need one?

Security profiles are industry-specific security baselines:

  • Healthcare (HIPAA): For medical practices, dental offices, clinics
  • Financial (PCI-DSS): For businesses that process credit cards
  • Manufacturing: For factories, production facilities
  • Retail: For shops, restaurants, e-commerce
  • General Business: Default for all other industries

Why it matters: Your security profile ensures you meet industry compliance requirements and get alerts relevant to your business type.

To change your profile: Settings > Compliance > Industry Profile

Can Aegis Sentinel fix problems automatically?

Yes! Our Autonomous Response feature can automatically:

  • Apply security patches to supported devices
  • Update firmware on network equipment
  • Quarantine infected devices
  • Block malicious IP addresses
  • Reset compromised passwords

Enable Autonomous Response: Settings > Security > Autonomous Actions

You can customize which actions run automatically and which require your approval.

Recommended setting: Enable automatic actions for low/medium severity issues, require approval for critical changes.

AI/ML Models

What AI models power Aegis Sentinel?

Aegis Sentinel uses six advanced AI/ML models working together to provide comprehensive threat detection and automated response:

1. XGBoost Attack Classifier

High-accuracy classification of attack types including DDoS, malware, brute force, and more.

  • Processes millions of events with 97% accuracy
  • 12ms average inference latency
  • Classifies 15+ attack categories
  • Continuously updated with new threat signatures

2. LSTM Sequence Analyzer

Deep learning model that analyzes temporal patterns in network traffic.

  • Detects sophisticated multi-stage attacks
  • Identifies anomalous behavior sequences
  • Learns normal patterns for each device
  • Flags deviations from established baselines

3. Isolation Forest Anomaly Detector

Unsupervised learning model that identifies unusual network behavior.

  • No labeled training data required
  • Excellent for zero-day threat detection
  • Identifies outliers in network traffic patterns
  • Adapts to your unique network environment

4. E-GraphSAGE GNN (Graph Neural Network)

Models device relationships and predicts attack propagation paths.

  • Visualized in the Attack Propagation Prediction dashboard
  • Maps device-to-device communication patterns
  • Predicts lateral movement paths
  • Identifies high-risk network segments

5. DDPG Auto-Remediation (Reinforcement Learning)

Deep Deterministic Policy Gradient agent that automatically takes defensive actions.

  • Blocks malicious IPs automatically
  • Rate limits suspicious traffic
  • Isolates compromised devices
  • Learns optimal response strategies over time

6. LLM Alert Explainer (GPT-4)

Large Language Model that generates plain-English explanations of security alerts.

  • Translates technical alerts into business language
  • Provides impact assessment for non-technical users
  • Recommends specific remediation actions
  • Explains “why it matters” for each alert

Model Health Monitoring: View real-time status, accuracy metrics, and inference latency for all models in the AI Insights dashboard. Go to Dashboard > AI Insights to see model performance.

Can I configure the AI models?

Yes! Go to Settings > ML/AI Settings to control:

  • Anomaly Detection: Enable/disable Isolation Forest anomaly detection
  • ML Threat Scoring: Enable/disable XGBoost + LSTM threat scoring
  • LLM Explanations: Enable/disable GPT-4 plain-English alert explanations
  • Auto-Quarantine: Enable automatic device isolation for high-risk threats
  • Auto-Quarantine Threshold: Set the threat score (50-100) that triggers automatic quarantine

PagerDuty Integration

What is PagerDuty integration?

Route critical security alerts to your on-call teams through PagerDuty for immediate response. When Aegis Sentinel detects a threat, it can automatically create a PagerDuty incident to ensure your team is notified immediately.

How do I set up PagerDuty?

  1. Navigate to Settings > Integrations > PagerDuty
  2. Enter your PagerDuty Routing Key (found in PagerDuty under Services > Integrations)
  3. Configure which alert severities trigger PagerDuty incidents:
    • Critical: Immediate threats requiring urgent response
    • High: Serious issues requiring same-day attention
    • Medium: Issues requiring attention within a week
    • Low: Informational alerts (not recommended for PagerDuty)
  4. Click Test Integration to send a test alert
  5. Click Save Settings

What features does PagerDuty integration include?

Automatic Incident Creation

Critical alerts automatically create PagerDuty incidents with full context including:

  • Alert type and severity
  • Affected device information
  • ML confidence score
  • Recommended remediation steps
  • Direct link to Aegis Sentinel dashboard

Auto-Resolution

When threats are remediated in Aegis Sentinel, corresponding PagerDuty incidents are automatically resolved. This keeps your incident queue clean and accurate.

Escalation Support

Integrates with your existing PagerDuty escalation policies. Alerts follow your team’s on-call schedule and escalation rules.

Pro Tip: Configure PagerDuty to only trigger for Critical and High severity alerts to avoid alert fatigue. Use email notifications for Medium and Low alerts.

SIEM Integration

What is SIEM integration?

Integrate Aegis Sentinel with your Security Information and Event Management (SIEM) system for centralized security monitoring. This allows you to correlate Aegis Sentinel alerts with data from other security tools.

Which SIEM platforms are supported?

Supported SIEM Platforms

  • Splunk Enterprise & Splunk Cloud: Native integration via HTTP Event Collector (HEC)
  • Elastic Security (ELK Stack): Direct Elasticsearch ingestion or Logstash pipeline
  • IBM QRadar: Syslog forwarding with custom DSM
  • Microsoft Sentinel: Azure Event Hub integration
  • Google Chronicle: Direct API integration
  • Sumo Logic: HTTP source integration
  • Custom SIEM: Syslog forwarding (CEF/LEEF format)

How do I configure SIEM integration?

  1. Go to Settings > Integrations > SIEM
  2. Select your SIEM provider from the dropdown
  3. Enter your SIEM endpoint URL
  4. Enter your API key or authentication token
  5. Select which event types to forward:
    • Critical/High/Medium/Low alerts
    • Device events (new devices, status changes)
    • Audit logs (user actions, configuration changes)
  6. Click Test Connection to verify
  7. Click Save SIEM Settings

What data is exported to SIEM?

  • Security alerts: Full context with ML confidence scores
  • Device inventory: Device details and status changes
  • Network flow data: Anomaly detections and traffic patterns
  • Auto-remediation actions: Actions taken and outcomes

API Access: Use the Aegis Sentinel REST API for custom integrations. Generate API keys in Settings > API Keys. Full API documentation available at docs.aegissentinel.io/api.

Ticketing System

What is ticketing integration?

Automatically create and manage tickets for security incidents in your preferred ticketing system. This ensures security issues are tracked, assigned, and resolved through your existing IT workflows.

Which ticketing platforms are supported?

Supported Platforms

  • Jira: Create issues in specified projects with custom fields and workflows
  • ServiceNow: Integrate with IT Service Management for incident tracking
  • Zendesk: Create support tickets for security-related customer issues
  • Freshdesk: Automated ticket creation with priority mapping
  • PagerDuty: Create incidents (also available as standalone integration)
  • Opsgenie: Alert management and on-call scheduling
  • Linear: Modern issue tracking for engineering teams
  • Custom Webhook: Send to any system via HTTP webhook

How do I configure ticketing integration?

  1. Go to Settings > Integrations > Ticketing
  2. Select your ticketing provider
  3. Enter your instance URL (e.g., yourcompany.atlassian.net)
  4. Enter your API token or authentication credentials
  5. Configure project/queue settings:
    • Project key or queue name
    • Default priority mapping
    • Custom field mappings (optional)
  6. Select which events auto-create tickets:
    • Critical alerts
    • High alerts
    • Medium alerts (optional)
    • Quarantine events
  7. Click Test Connection
  8. Click Save Ticketing Settings

What ticket features are available?

Auto-Population

Tickets automatically include:

  • Device details (name, IP, type)
  • Alert context and description
  • ML analysis and confidence score
  • Recommended remediation steps
  • Direct link to Aegis Sentinel dashboard

Priority Mapping

Alert severity automatically maps to ticket priority:

  • Critical โ†’ P1 / Highest
  • High โ†’ P2 / High
  • Medium โ†’ P3 / Medium
  • Low โ†’ P4 / Low

Bi-directional Sync

Ticket status updates reflect back in Aegis Sentinel dashboard. When a ticket is resolved in your ticketing system, the corresponding alert is marked as resolved in Aegis Sentinel.

SLA Tracking

Monitor response and resolution times against your security SLAs. View SLA compliance metrics in Reports > SLA Compliance.

Best Practice: Configure auto-ticket creation for Critical and High alerts only. Use the Aegis Sentinel dashboard for Medium and Low alerts to avoid ticket overload.

Account & Security

How do I change my password?

  1. Click your profile icon (top right)
  2. Select Account Settings
  3. Click Change Password
  4. Enter your current password
  5. Enter new password (must be 12+ characters)
  6. Confirm new password
  7. Click Update Password

You’ll receive an email confirmation when your password changes.

Should I enable Two-Factor Authentication (2FA)?

Yes! 2FA adds an extra security layer to your account.

To enable 2FA:

  1. Go to Account Settings > Security
  2. Click Enable Two-Factor Authentication
  3. Choose your method:
    • SMS: Receive codes via text message
    • Authenticator App: Use Google Authenticator or similar
  4. Follow setup instructions
  5. Save backup codes in a safe place

Important: Keep your backup codes somewhere safe (not on your computer). You’ll need them if you lose access to your phone.

Can I add other users to my account?

User management is available on Pro and Business plans:

  • Free plan: 1 user (account owner)
  • Pro plan: Up to 3 users
  • Business plan: Unlimited users

To add users:

  1. Go to Settings > Team Management
  2. Click Add User
  3. Enter their email address
  4. Assign permission level:
    • Admin: Full access (billing, settings, all features)
    • Manager: Can take security actions, view reports
    • Viewer: Read-only access
  5. Click Send Invitation

What data does Aegis Sentinel collect?

We collect only what’s necessary for security monitoring:

  • Device information: IP addresses, MAC addresses, device types, operating systems
  • Network activity: Connection logs, traffic patterns (metadata only, not content)
  • Security events: Vulnerability scans, threat detections, alerts
  • Account information: Email, company name, phone number

We NEVER collect:

  • Email content or messages
  • Passwords or credentials
  • Personal files or documents
  • Web browsing history
  • Voice or video recordings

Reports & Compliance

What reports can I generate?

1. Security Summary (Weekly)

Automatic email every Monday with:

  • Security score trend
  • New vulnerabilities discovered
  • Issues resolved
  • Top at-risk devices

2. Compliance Report (Monthly)

Available on Pro and Business plans:

  • Industry compliance status (HIPAA, PCI-DSS, etc.)
  • Required actions for certification
  • Audit-ready documentation

3. Executive Report (Quarterly)

High-level overview for leadership:

  • Overall security posture
  • Risk trends
  • Investment recommendations
  • Industry benchmarking

4. Custom Reports

Available on Business plan:

  • Device-specific security audits
  • Threat intelligence briefings
  • Penetration test summaries
  • Incident response documentation

How do I download a report?

  1. Go to Reports in the main menu
  2. Select report type from dropdown
  3. Choose date range (if applicable)
  4. Click Generate Report
  5. Select format:
    • PDF: Professional document for printing/sharing
    • CSV: Raw data for spreadsheet analysis
    • JSON: Technical format for integration with other tools
  6. Click Download

Reports are also automatically emailed based on your schedule settings.

Do your reports satisfy insurance or compliance audits?

Yes! Our compliance reports are designed for audit submission:

  • HIPAA: Satisfies Technical Safeguards requirements (45 CFR ยง 164.312)
  • PCI-DSS: Meets Requirements 5, 6, and 11 (vulnerability management, monitoring)
  • ISO 27001: Provides evidence for controls A.12.6 (Technical Vulnerability Management)
  • Cyber Insurance: Demonstrates active monitoring and risk management

Many of our customers submit our monthly compliance reports directly to their insurance carriers and auditors.

Can I schedule automated report delivery?

Yes! Go to Reports > Delivery Schedule:

  1. Choose report type
  2. Set frequency (daily, weekly, monthly, quarterly)
  3. Select delivery day/time
  4. Enter recipient email addresses (separate with commas)
  5. Click Save Schedule

Pro Tip: Send monthly compliance reports to your insurance broker and quarterly executive reports to your board of directors.

Notifications & Alerts

How do I control which alerts I receive?

Go to Settings > Notifications to customize:

Alert Priority Filters:

  • All Alerts: Receive every security event (not recommended)
  • Medium and Above: Skip low-priority informational alerts
  • High and Critical Only: Only urgent issues
  • Critical Only: Immediate threats only

Delivery Channels:

  • Email: Detailed alert with context and action buttons
  • SMS: Brief text with link to dashboard (charges may apply)
  • In-App: Dashboard notifications only
  • Webhook: Send to Slack, Teams, or other tools (Business plan)

Alert Grouping:

  • Real-time: Immediate notification for each alert
  • Hourly Digest: Group alerts into hourly summaries
  • Daily Digest: One summary email per day (8 AM your timezone)

What’s the difference between alerts and notifications?

  • Alerts = security events requiring action (threats, vulnerabilities, compliance issues)
  • Notifications = informational updates (new device discovered, scan complete, report ready)

You can control each separately in Settings.

Can I get alerts in Slack or Microsoft Teams?

Yes, on the Business plan:

  1. Go to Settings > Integrations
  2. Click Connect next to Slack or Teams
  3. Authorize Aegis Sentinel to access your workspace
  4. Choose which channel receives alerts
  5. Set alert filters (optional)

Alerts appear in your channel with the same color-coding and action buttons as email alerts.

Why am I getting so many alerts?

Common reasons for alert volume:

  • Initial baseline period: First 2-3 weeks have higher alert volume as we establish normal behavior
  • Outdated devices: Many small businesses have devices with accumulated vulnerabilities โ€“ fix the critical ones first
  • Alert sensitivity: Default is set to “medium and above” โ€“ increase threshold if needed
  • New network: Networks without prior security monitoring often have hidden issues

Don’t worry! Alert volume typically decreases after the first 2-3 weeks as we establish normal baselines.

Subscription & Billing

What are the pricing tiers?

Free Plan: $0/month

  • Up to 10 devices
  • Basic monitoring
  • Weekly reports
  • Community support

Pro Plan: $49/month (or $499/year, save $89)

  • Up to 100 devices
  • Advanced threat detection
  • Compliance reports
  • Priority email support

Business Plan: $150/month (or $1,500/year, save $300)

  • Up to 300 devices
  • Autonomous response
  • Custom reports
  • 24/7 phone support

Enterprise: Custom pricing

  • Unlimited devices
  • Dedicated security manager
  • Custom integrations
  • White-label options

How do I upgrade my plan?

  1. Go to Settings > Billing
  2. Click Change Plan
  3. Select your new plan
  4. Choose billing cycle (monthly or annual)
  5. Click Upgrade Now

Your new features activate immediately. You’ll be charged a prorated amount for the remainder of your current billing cycle.

Can I cancel anytime?

Yes! No contracts or commitments.

To cancel:

  1. Go to Settings > Billing
  2. Click Cancel Subscription
  3. Tell us why you’re leaving (optional)
  4. Confirm cancellation

Your account remains active until the end of your current billing period. After that:

  • Dashboard becomes read-only
  • No new scans or alerts
  • Data retained for 90 days
  • You can reactivate anytime within 90 days without losing data

What payment methods do you accept?

  • Credit card (Visa, MasterCard, American Express, Discover)
  • Debit card with credit card logo
  • ACH bank transfer (Business plan and above)
  • Purchase order/invoice (Enterprise plan only)

All payments are processed securely through Stripe. We never store your full card number.

Do you offer discounts?

Yes!

  • Annual billing: Save 15% by paying yearly
  • Nonprofits: 25% discount (requires verification)
  • Multi-year: Contact sales for custom pricing on 2-3 year contracts
  • Volume: Discounts available for 300+ devices

Contact sales@aegistechnologies.tech for nonprofit verification or volume pricing.

Help & Support

How do I contact support?

Support Channels

๐Ÿ“ง
Email Support: support@aegistechnologies.tech
All plans โ€ข Response within 24 hours (Free), 4 hours (Pro), 1 hour (Business)
๐Ÿ’ฌ
Live Chat: Click chat icon in dashboard
Business plan only โ€ข Available 9 AM โ€“ 6 PM ET, Monday-Friday
๐Ÿ“ฑ
Phone Support: See dashboard for your dedicated number
Business plan only โ€ข 24/7 emergency line for critical incidents
๐ŸŒ
Help Center: help.aegissentinel.io
All plans โ€ข Self-service guides, videos, troubleshooting

What qualifies as an “emergency”?

Use emergency contact (phone support) for:

  • Active security breach or cyberattack
  • Network-wide outage caused by security incident
  • Ransomware infection
  • Data theft in progress

NOT emergencies (use email or chat):

  • General questions about features
  • Billing inquiries
  • Feature requests
  • Historical report questions

Can I schedule a call with your security team?

Yes, on Business and Enterprise plans:

  1. Email support@aegistechnologies.tech
  2. Subject: “Security Consultation Request”
  3. Include: Your availability and topics to discuss

We’ll schedule a 30-minute call with one of our security analysts. Topics might include:

  • Interpreting your security posture
  • Prioritizing remediation efforts
  • Industry-specific compliance guidance
  • Best practices for your business type

Do you have video tutorials?

Yes! Visit help.aegissentinel.io/videos for:

  • Platform walkthrough (10 minutes)
  • Understanding your dashboard (5 minutes)
  • Responding to alerts (8 minutes)
  • Generating compliance reports (6 minutes)
  • Setting up multi-site monitoring (7 minutes)

All videos include captions and transcripts.

Troubleshooting

Why can’t I see some of my devices?

Common reasons devices don’t appear:

1. Device is on a separate network

If you have multiple Wi-Fi networks or VLANs, devices may be isolated.

Solution: Add each network separately in Settings > Networks

2. Device has network discovery disabled

Some devices (especially Apple products) hide from network scans.

Solution: Manually add device IP address in Devices > Add Manually

3. Firewall blocking scans

Your network firewall may be blocking Aegis Sentinel.

Solution: Contact support for IP addresses to whitelist

4. Device recently turned off

Devices only appear when actively connected.

Solution: Turn on device and wait 5 minutes for scan

Why is my security score so low?

New accounts often start with lower scores because:

  • Accumulated vulnerabilities: Many devices haven’t been updated in months/years
  • Default configurations: Factory settings are often insecure
  • Outdated software: Operating systems and apps need updates
  • Missing security controls: No firewall rules, weak passwords, etc.

Don’t panic! Your score will improve as you:

  • Address high-priority alerts first
  • Enable automatic updates
  • Update critical devices
  • Follow recommended actions in dashboard

Most customers see their score increase 20-30 points within the first week.

I’m not receiving email alerts

Check these common issues:

1. Email in spam folder

  • Check spam/junk folder for emails from alerts@aegissentinel.io
  • Mark as “Not Spam” and move to inbox
  • Add alerts@aegissentinel.io to your contacts

2. Email settings disabled

  • Go to Settings > Notifications
  • Ensure “Email Alerts” is toggled ON
  • Verify your email address is correct

3. Alert threshold too high

  • Check if your threshold is set to “Critical only”
  • Change to “Medium and above” to receive more alerts

4. Email bouncing

  • Dashboard will show a warning if emails are bouncing
  • Verify email address in Account Settings

A device is showing as “at risk” but it’s brand new

Even new devices can have vulnerabilities:

  • Outdated firmware: Devices often ship with old firmware versions
  • Default passwords: Factory passwords are publicly known and insecure
  • Missing patches: Updates released after device was manufactured
  • Insecure defaults: Manufacturers prioritize convenience over security

What to do:

  1. Click on the device to see specific issues
  2. Follow recommended actions (usually firmware update + password change)
  3. Re-scan after making changes

How do I reset my two-factor authentication?

If you’ve lost access to your 2FA device:

  1. On the login screen, click “Lost access to 2FA?”
  2. Enter your email address
  3. Check email for reset link
  4. Enter one of your backup codes
  5. Disable old 2FA
  6. Set up new 2FA with your new device

Don’t have backup codes? Contact support with:

  • Account email address
  • Company name
  • Government-issued ID (for verification)

We’ll manually reset your 2FA within 24 hours after verification.

I accidentally quarantined a device. How do I restore it?

Easy fix:

  1. Find the quarantined device in your Discovered Devices table
  2. Look for devices with a ๐Ÿšซ icon or “Quarantined” status
  3. Click the green Release button
  4. Confirm the action

The device will regain network access within 30 seconds.

Note: If you’re repeatedly quarantining the same device, it may have legitimate security issues. Check its security score and alerts for details.

Still Have Questions?

We’re here to help. Contact us using any of the support channels below.

๐Ÿ“ง

Email

support@aegistechnologies.tech

๐ŸŒ

Help Center

help.aegissentinel.io

๐Ÿ’ฌ

Live Chat

Available for Business plan

๐Ÿ“ฑ

Emergency

See welcome email

Response Times:

Free plan: 24 hours โ€ข Pro plan: 4 hours โ€ข Business plan: 1 hour (priority support)