Your cart is currently empty!
User Guide & FAQ
User Guide & FAQ
Welcome to the Aegis Sentinelยฎ Help CenterโEverything you need to protect your business with confidence
Navigation
Getting Started
How do I sign up for an account?
- Visit aegissentinel.io
- Click “Start Free Trial” or “Get Started”
- Enter your:
- Business email address
- Company name
- Phone number (for security alerts)
- Verify your email address (check spam if needed)
- Set up your password (minimum 12 characters, must include uppercase, lowercase, number, and special character)
- Complete the initial network scan
You’re ready! Your dashboard will populate within 5-10 minutes as Aegis Sentinel discovers your network devices.
What happens during the initial setup?
When you sign up, Aegis Sentinel automatically:
- Discovers devices: Scans your network to identify all connected devices (computers, printers, IoT devices, etc.)
- Establishes baselines: Learns normal behavior patterns for your network
- Assigns security scores: Rates each device based on vulnerabilities and compliance
- Sends your first report: Emails a summary of what was found
No installation required! Aegis Sentinel is entirely cloud-based. There’s no software to download, no servers to maintain, and no IT expertise needed.
How long does setup take?
- Account creation: 3-5 minutes
- Initial network discovery: 5-10 minutes
- Full baseline establishment: 24-48 hours
You can start using your dashboard immediately, but threat detection accuracy improves after the baseline period.
What if I have multiple locations?
Aegis Sentinel supports multi-site monitoring:
- Free plan: Single location only
- Pro plan: Up to 3 locations
- Business plan: Unlimited locations
Each location appears as a separate network in your dashboard with its own device inventory and alerts.
Understanding Dashboard
What am I looking at on my dashboard?
Your Aegis Sentinel dashboard has four main sections:
1. Security Health Score (Top Center)
- Green (80-100): Your network is secure
- Yellow (60-79): Minor issues detected โ review recommended actions
- Red (0-59): Critical vulnerabilities โ take immediate action
2. Active Alerts Panel (Right Side)
Shows real-time security events requiring attention, color-coded by severity:
- Red Critical (immediate action required)
- Orange High priority (action within 24 hours)
- Yellow Medium priority (action within 1 week)
- Blue Informational (no action needed)
3. Discovered Devices Table (Center)
Lists every device on your network with:
- Device name and type (PC, printer, camera, etc.)
- IP address
- Security score (0-100)
- Last seen timestamp
- Quick action buttons (View Details, Quarantine, Run Scan)
4. Quick Statistics (Top Row)
- Total Devices: How many devices we’re monitoring
- At-Risk Devices: Devices with security scores below 60
- Active Threats: Current security incidents
- Compliance Status: Your progress toward industry standards (HIPAA, PCI-DSS, etc.)
Why did my security score change?
Your score updates automatically when:
- New vulnerabilities are discovered on your devices
- Software updates fix security issues (score improves)
- New devices join your network
- Suspicious activity is detected
- You take recommended actions
Click on your score to see a detailed breakdown of what’s affecting it.
What does “Last Seen” mean?
“Last Seen” shows when a device last communicated on your network:
- Active (green dot): Device online right now
- Recent (yellow dot): Seen within last 24 hours
- Offline (gray dot): Not seen for 24+ hours
Pro Tip: If a device shows “offline” but you know it’s on, it may be blocking network scans (common with certain security cameras). Check device settings or contact support.
Plain-English Alerts
What makes Aegis Sentinel alerts different?
We translate technical security jargon into clear, actionable language:
Traditional Security Alert:
CVE-2024-1234: Remote code execution vulnerability detected in device 192.168.1.45 (Apache HTTP Server 2.4.49). CVSS score 9.8. Exploit available. Immediate patching required.
Aegis Sentinel Alert:
Security Camera Needs Update
Your lobby security camera has a critical security flaw that hackers could use to access your network. Click “Update Now” to fix it automatically, or we can schedule this for tonight after hours.
Every alert includes:
- What happened: Plain explanation of the issue
- Why it matters: Real-world impact to your business
- What to do: Step-by-step instructions or one-click fixes
- How urgent: Color-coded priority level
What should I do when I get an alert?
- Read the alert: We explain what’s wrong in plain English
- Check the priority:
- Red = do it now (within 1 hour)
- Orange = do it today
- Yellow = do it this week
- Take action: Click the recommended action button, or follow the manual steps
- Confirm completion: The alert will disappear once the issue is resolved
Can I customize alert settings?
Yes! Go to Settings > Notifications to control:
- Delivery method: Email, SMS, or in-app only
- Priority threshold: Only notify for medium+ or high+ alerts
- Quiet hours: Pause non-critical alerts during specific times
- Alert consolidation: Group similar alerts into daily digests
Recommended Settings for Small Businesses:
- Email: All alerts
- SMS: Critical and high priority only
- Quiet hours: 6 PM โ 8 AM for medium/low alerts
- Daily digest: Enabled for informational alerts
Core Features & Actions
How do I quarantine a suspicious device?
Quarantine = temporarily blocking a device from your network
- Find the device in your Discovered Devices table
- Click the Quarantine button (โ ๏ธ icon)
- Confirm the action
The device will be isolated within 30 seconds. It can no longer:
- Access other devices on your network
- Connect to the internet
- Send or receive data
When to quarantine:
- Device shows signs of infection or compromise
- Unknown device appears on your network
- Device is behaving suspiciously (unusual traffic patterns)
- Alert recommends quarantine
How do I manually scan a device?
Aegis Sentinel automatically scans all devices every 6 hours, but you can run manual scans:
- Select the device in your dashboard
- Click Run Scan
- Choose scan type:
- Quick Scan: 2-3 minutes, checks for common vulnerabilities
- Deep Scan: 10-15 minutes, comprehensive security audit
- Wait for results (you’ll get an email when complete)
What is a “security profile” and do I need one?
Security profiles are industry-specific security baselines:
- Healthcare (HIPAA): For medical practices, dental offices, clinics
- Financial (PCI-DSS): For businesses that process credit cards
- Manufacturing: For factories, production facilities
- Retail: For shops, restaurants, e-commerce
- General Business: Default for all other industries
Why it matters: Your security profile ensures you meet industry compliance requirements and get alerts relevant to your business type.
To change your profile: Settings > Compliance > Industry Profile
Can Aegis Sentinel fix problems automatically?
Yes! Our Autonomous Response feature can automatically:
- Apply security patches to supported devices
- Update firmware on network equipment
- Quarantine infected devices
- Block malicious IP addresses
- Reset compromised passwords
Enable Autonomous Response: Settings > Security > Autonomous Actions
You can customize which actions run automatically and which require your approval.
Recommended setting: Enable automatic actions for low/medium severity issues, require approval for critical changes.
AI/ML Models
What AI models power Aegis Sentinel?
Aegis Sentinel uses six advanced AI/ML models working together to provide comprehensive threat detection and automated response:
1. XGBoost Attack Classifier
High-accuracy classification of attack types including DDoS, malware, brute force, and more.
- Processes millions of events with 97% accuracy
- 12ms average inference latency
- Classifies 15+ attack categories
- Continuously updated with new threat signatures
2. LSTM Sequence Analyzer
Deep learning model that analyzes temporal patterns in network traffic.
- Detects sophisticated multi-stage attacks
- Identifies anomalous behavior sequences
- Learns normal patterns for each device
- Flags deviations from established baselines
3. Isolation Forest Anomaly Detector
Unsupervised learning model that identifies unusual network behavior.
- No labeled training data required
- Excellent for zero-day threat detection
- Identifies outliers in network traffic patterns
- Adapts to your unique network environment
4. E-GraphSAGE GNN (Graph Neural Network)
Models device relationships and predicts attack propagation paths.
- Visualized in the Attack Propagation Prediction dashboard
- Maps device-to-device communication patterns
- Predicts lateral movement paths
- Identifies high-risk network segments
5. DDPG Auto-Remediation (Reinforcement Learning)
Deep Deterministic Policy Gradient agent that automatically takes defensive actions.
- Blocks malicious IPs automatically
- Rate limits suspicious traffic
- Isolates compromised devices
- Learns optimal response strategies over time
6. LLM Alert Explainer (GPT-4)
Large Language Model that generates plain-English explanations of security alerts.
- Translates technical alerts into business language
- Provides impact assessment for non-technical users
- Recommends specific remediation actions
- Explains “why it matters” for each alert
Model Health Monitoring: View real-time status, accuracy metrics, and inference latency for all models in the AI Insights dashboard. Go to Dashboard > AI Insights to see model performance.
Can I configure the AI models?
Yes! Go to Settings > ML/AI Settings to control:
- Anomaly Detection: Enable/disable Isolation Forest anomaly detection
- ML Threat Scoring: Enable/disable XGBoost + LSTM threat scoring
- LLM Explanations: Enable/disable GPT-4 plain-English alert explanations
- Auto-Quarantine: Enable automatic device isolation for high-risk threats
- Auto-Quarantine Threshold: Set the threat score (50-100) that triggers automatic quarantine
PagerDuty Integration
What is PagerDuty integration?
Route critical security alerts to your on-call teams through PagerDuty for immediate response. When Aegis Sentinel detects a threat, it can automatically create a PagerDuty incident to ensure your team is notified immediately.
How do I set up PagerDuty?
- Navigate to Settings > Integrations > PagerDuty
- Enter your PagerDuty Routing Key (found in PagerDuty under Services > Integrations)
- Configure which alert severities trigger PagerDuty incidents:
- Critical: Immediate threats requiring urgent response
- High: Serious issues requiring same-day attention
- Medium: Issues requiring attention within a week
- Low: Informational alerts (not recommended for PagerDuty)
- Click Test Integration to send a test alert
- Click Save Settings
What features does PagerDuty integration include?
Automatic Incident Creation
Critical alerts automatically create PagerDuty incidents with full context including:
- Alert type and severity
- Affected device information
- ML confidence score
- Recommended remediation steps
- Direct link to Aegis Sentinel dashboard
Auto-Resolution
When threats are remediated in Aegis Sentinel, corresponding PagerDuty incidents are automatically resolved. This keeps your incident queue clean and accurate.
Escalation Support
Integrates with your existing PagerDuty escalation policies. Alerts follow your team’s on-call schedule and escalation rules.
Pro Tip: Configure PagerDuty to only trigger for Critical and High severity alerts to avoid alert fatigue. Use email notifications for Medium and Low alerts.
SIEM Integration
What is SIEM integration?
Integrate Aegis Sentinel with your Security Information and Event Management (SIEM) system for centralized security monitoring. This allows you to correlate Aegis Sentinel alerts with data from other security tools.
Which SIEM platforms are supported?
Supported SIEM Platforms
- Splunk Enterprise & Splunk Cloud: Native integration via HTTP Event Collector (HEC)
- Elastic Security (ELK Stack): Direct Elasticsearch ingestion or Logstash pipeline
- IBM QRadar: Syslog forwarding with custom DSM
- Microsoft Sentinel: Azure Event Hub integration
- Google Chronicle: Direct API integration
- Sumo Logic: HTTP source integration
- Custom SIEM: Syslog forwarding (CEF/LEEF format)
How do I configure SIEM integration?
- Go to Settings > Integrations > SIEM
- Select your SIEM provider from the dropdown
- Enter your SIEM endpoint URL
- Enter your API key or authentication token
- Select which event types to forward:
- Critical/High/Medium/Low alerts
- Device events (new devices, status changes)
- Audit logs (user actions, configuration changes)
- Click Test Connection to verify
- Click Save SIEM Settings
What data is exported to SIEM?
- Security alerts: Full context with ML confidence scores
- Device inventory: Device details and status changes
- Network flow data: Anomaly detections and traffic patterns
- Auto-remediation actions: Actions taken and outcomes
API Access: Use the Aegis Sentinel REST API for custom integrations. Generate API keys in Settings > API Keys. Full API documentation available at docs.aegissentinel.io/api.
Ticketing System
What is ticketing integration?
Automatically create and manage tickets for security incidents in your preferred ticketing system. This ensures security issues are tracked, assigned, and resolved through your existing IT workflows.
Which ticketing platforms are supported?
Supported Platforms
- Jira: Create issues in specified projects with custom fields and workflows
- ServiceNow: Integrate with IT Service Management for incident tracking
- Zendesk: Create support tickets for security-related customer issues
- Freshdesk: Automated ticket creation with priority mapping
- PagerDuty: Create incidents (also available as standalone integration)
- Opsgenie: Alert management and on-call scheduling
- Linear: Modern issue tracking for engineering teams
- Custom Webhook: Send to any system via HTTP webhook
How do I configure ticketing integration?
- Go to Settings > Integrations > Ticketing
- Select your ticketing provider
- Enter your instance URL (e.g., yourcompany.atlassian.net)
- Enter your API token or authentication credentials
- Configure project/queue settings:
- Project key or queue name
- Default priority mapping
- Custom field mappings (optional)
- Select which events auto-create tickets:
- Critical alerts
- High alerts
- Medium alerts (optional)
- Quarantine events
- Click Test Connection
- Click Save Ticketing Settings
What ticket features are available?
Auto-Population
Tickets automatically include:
- Device details (name, IP, type)
- Alert context and description
- ML analysis and confidence score
- Recommended remediation steps
- Direct link to Aegis Sentinel dashboard
Priority Mapping
Alert severity automatically maps to ticket priority:
- Critical โ P1 / Highest
- High โ P2 / High
- Medium โ P3 / Medium
- Low โ P4 / Low
Bi-directional Sync
Ticket status updates reflect back in Aegis Sentinel dashboard. When a ticket is resolved in your ticketing system, the corresponding alert is marked as resolved in Aegis Sentinel.
SLA Tracking
Monitor response and resolution times against your security SLAs. View SLA compliance metrics in Reports > SLA Compliance.
Best Practice: Configure auto-ticket creation for Critical and High alerts only. Use the Aegis Sentinel dashboard for Medium and Low alerts to avoid ticket overload.
Account & Security
How do I change my password?
- Click your profile icon (top right)
- Select Account Settings
- Click Change Password
- Enter your current password
- Enter new password (must be 12+ characters)
- Confirm new password
- Click Update Password
You’ll receive an email confirmation when your password changes.
Should I enable Two-Factor Authentication (2FA)?
Yes! 2FA adds an extra security layer to your account.
To enable 2FA:
- Go to Account Settings > Security
- Click Enable Two-Factor Authentication
- Choose your method:
- SMS: Receive codes via text message
- Authenticator App: Use Google Authenticator or similar
- Follow setup instructions
- Save backup codes in a safe place
Important: Keep your backup codes somewhere safe (not on your computer). You’ll need them if you lose access to your phone.
Can I add other users to my account?
User management is available on Pro and Business plans:
- Free plan: 1 user (account owner)
- Pro plan: Up to 3 users
- Business plan: Unlimited users
To add users:
- Go to Settings > Team Management
- Click Add User
- Enter their email address
- Assign permission level:
- Admin: Full access (billing, settings, all features)
- Manager: Can take security actions, view reports
- Viewer: Read-only access
- Click Send Invitation
What data does Aegis Sentinel collect?
We collect only what’s necessary for security monitoring:
- Device information: IP addresses, MAC addresses, device types, operating systems
- Network activity: Connection logs, traffic patterns (metadata only, not content)
- Security events: Vulnerability scans, threat detections, alerts
- Account information: Email, company name, phone number
We NEVER collect:
- Email content or messages
- Passwords or credentials
- Personal files or documents
- Web browsing history
- Voice or video recordings
Reports & Compliance
What reports can I generate?
1. Security Summary (Weekly)
Automatic email every Monday with:
- Security score trend
- New vulnerabilities discovered
- Issues resolved
- Top at-risk devices
2. Compliance Report (Monthly)
Available on Pro and Business plans:
- Industry compliance status (HIPAA, PCI-DSS, etc.)
- Required actions for certification
- Audit-ready documentation
3. Executive Report (Quarterly)
High-level overview for leadership:
- Overall security posture
- Risk trends
- Investment recommendations
- Industry benchmarking
4. Custom Reports
Available on Business plan:
- Device-specific security audits
- Threat intelligence briefings
- Penetration test summaries
- Incident response documentation
How do I download a report?
- Go to Reports in the main menu
- Select report type from dropdown
- Choose date range (if applicable)
- Click Generate Report
- Select format:
- PDF: Professional document for printing/sharing
- CSV: Raw data for spreadsheet analysis
- JSON: Technical format for integration with other tools
- Click Download
Reports are also automatically emailed based on your schedule settings.
Do your reports satisfy insurance or compliance audits?
Yes! Our compliance reports are designed for audit submission:
- HIPAA: Satisfies Technical Safeguards requirements (45 CFR ยง 164.312)
- PCI-DSS: Meets Requirements 5, 6, and 11 (vulnerability management, monitoring)
- ISO 27001: Provides evidence for controls A.12.6 (Technical Vulnerability Management)
- Cyber Insurance: Demonstrates active monitoring and risk management
Many of our customers submit our monthly compliance reports directly to their insurance carriers and auditors.
Can I schedule automated report delivery?
Yes! Go to Reports > Delivery Schedule:
- Choose report type
- Set frequency (daily, weekly, monthly, quarterly)
- Select delivery day/time
- Enter recipient email addresses (separate with commas)
- Click Save Schedule
Pro Tip: Send monthly compliance reports to your insurance broker and quarterly executive reports to your board of directors.
Notifications & Alerts
How do I control which alerts I receive?
Go to Settings > Notifications to customize:
Alert Priority Filters:
- All Alerts: Receive every security event (not recommended)
- Medium and Above: Skip low-priority informational alerts
- High and Critical Only: Only urgent issues
- Critical Only: Immediate threats only
Delivery Channels:
- Email: Detailed alert with context and action buttons
- SMS: Brief text with link to dashboard (charges may apply)
- In-App: Dashboard notifications only
- Webhook: Send to Slack, Teams, or other tools (Business plan)
Alert Grouping:
- Real-time: Immediate notification for each alert
- Hourly Digest: Group alerts into hourly summaries
- Daily Digest: One summary email per day (8 AM your timezone)
What’s the difference between alerts and notifications?
- Alerts = security events requiring action (threats, vulnerabilities, compliance issues)
- Notifications = informational updates (new device discovered, scan complete, report ready)
You can control each separately in Settings.
Can I get alerts in Slack or Microsoft Teams?
Yes, on the Business plan:
- Go to Settings > Integrations
- Click Connect next to Slack or Teams
- Authorize Aegis Sentinel to access your workspace
- Choose which channel receives alerts
- Set alert filters (optional)
Alerts appear in your channel with the same color-coding and action buttons as email alerts.
Why am I getting so many alerts?
Common reasons for alert volume:
- Initial baseline period: First 2-3 weeks have higher alert volume as we establish normal behavior
- Outdated devices: Many small businesses have devices with accumulated vulnerabilities โ fix the critical ones first
- Alert sensitivity: Default is set to “medium and above” โ increase threshold if needed
- New network: Networks without prior security monitoring often have hidden issues
Don’t worry! Alert volume typically decreases after the first 2-3 weeks as we establish normal baselines.
Subscription & Billing
What are the pricing tiers?
Free Plan: $0/month
- Up to 10 devices
- Basic monitoring
- Weekly reports
- Community support
Pro Plan: $49/month (or $499/year, save $89)
- Up to 100 devices
- Advanced threat detection
- Compliance reports
- Priority email support
Business Plan: $150/month (or $1,500/year, save $300)
- Up to 300 devices
- Autonomous response
- Custom reports
- 24/7 phone support
Enterprise: Custom pricing
- Unlimited devices
- Dedicated security manager
- Custom integrations
- White-label options
How do I upgrade my plan?
- Go to Settings > Billing
- Click Change Plan
- Select your new plan
- Choose billing cycle (monthly or annual)
- Click Upgrade Now
Your new features activate immediately. You’ll be charged a prorated amount for the remainder of your current billing cycle.
Can I cancel anytime?
Yes! No contracts or commitments.
To cancel:
- Go to Settings > Billing
- Click Cancel Subscription
- Tell us why you’re leaving (optional)
- Confirm cancellation
Your account remains active until the end of your current billing period. After that:
- Dashboard becomes read-only
- No new scans or alerts
- Data retained for 90 days
- You can reactivate anytime within 90 days without losing data
What payment methods do you accept?
- Credit card (Visa, MasterCard, American Express, Discover)
- Debit card with credit card logo
- ACH bank transfer (Business plan and above)
- Purchase order/invoice (Enterprise plan only)
All payments are processed securely through Stripe. We never store your full card number.
Do you offer discounts?
Yes!
- Annual billing: Save 15% by paying yearly
- Nonprofits: 25% discount (requires verification)
- Multi-year: Contact sales for custom pricing on 2-3 year contracts
- Volume: Discounts available for 300+ devices
Contact sales@aegistechnologies.tech for nonprofit verification or volume pricing.
Help & Support
How do I contact support?
Support Channels
All plans โข Response within 24 hours (Free), 4 hours (Pro), 1 hour (Business)
Business plan only โข Available 9 AM โ 6 PM ET, Monday-Friday
Business plan only โข 24/7 emergency line for critical incidents
All plans โข Self-service guides, videos, troubleshooting
What qualifies as an “emergency”?
Use emergency contact (phone support) for:
- Active security breach or cyberattack
- Network-wide outage caused by security incident
- Ransomware infection
- Data theft in progress
NOT emergencies (use email or chat):
- General questions about features
- Billing inquiries
- Feature requests
- Historical report questions
Can I schedule a call with your security team?
Yes, on Business and Enterprise plans:
- Email support@aegistechnologies.tech
- Subject: “Security Consultation Request”
- Include: Your availability and topics to discuss
We’ll schedule a 30-minute call with one of our security analysts. Topics might include:
- Interpreting your security posture
- Prioritizing remediation efforts
- Industry-specific compliance guidance
- Best practices for your business type
Do you have video tutorials?
Yes! Visit help.aegissentinel.io/videos for:
- Platform walkthrough (10 minutes)
- Understanding your dashboard (5 minutes)
- Responding to alerts (8 minutes)
- Generating compliance reports (6 minutes)
- Setting up multi-site monitoring (7 minutes)
All videos include captions and transcripts.
Troubleshooting
Why can’t I see some of my devices?
Common reasons devices don’t appear:
1. Device is on a separate network
If you have multiple Wi-Fi networks or VLANs, devices may be isolated.
Solution: Add each network separately in Settings > Networks
2. Device has network discovery disabled
Some devices (especially Apple products) hide from network scans.
Solution: Manually add device IP address in Devices > Add Manually
3. Firewall blocking scans
Your network firewall may be blocking Aegis Sentinel.
Solution: Contact support for IP addresses to whitelist
4. Device recently turned off
Devices only appear when actively connected.
Solution: Turn on device and wait 5 minutes for scan
Why is my security score so low?
New accounts often start with lower scores because:
- Accumulated vulnerabilities: Many devices haven’t been updated in months/years
- Default configurations: Factory settings are often insecure
- Outdated software: Operating systems and apps need updates
- Missing security controls: No firewall rules, weak passwords, etc.
Don’t panic! Your score will improve as you:
- Address high-priority alerts first
- Enable automatic updates
- Update critical devices
- Follow recommended actions in dashboard
Most customers see their score increase 20-30 points within the first week.
I’m not receiving email alerts
Check these common issues:
1. Email in spam folder
- Check spam/junk folder for emails from alerts@aegissentinel.io
- Mark as “Not Spam” and move to inbox
- Add alerts@aegissentinel.io to your contacts
2. Email settings disabled
- Go to Settings > Notifications
- Ensure “Email Alerts” is toggled ON
- Verify your email address is correct
3. Alert threshold too high
- Check if your threshold is set to “Critical only”
- Change to “Medium and above” to receive more alerts
4. Email bouncing
- Dashboard will show a warning if emails are bouncing
- Verify email address in Account Settings
A device is showing as “at risk” but it’s brand new
Even new devices can have vulnerabilities:
- Outdated firmware: Devices often ship with old firmware versions
- Default passwords: Factory passwords are publicly known and insecure
- Missing patches: Updates released after device was manufactured
- Insecure defaults: Manufacturers prioritize convenience over security
What to do:
- Click on the device to see specific issues
- Follow recommended actions (usually firmware update + password change)
- Re-scan after making changes
How do I reset my two-factor authentication?
If you’ve lost access to your 2FA device:
- On the login screen, click “Lost access to 2FA?”
- Enter your email address
- Check email for reset link
- Enter one of your backup codes
- Disable old 2FA
- Set up new 2FA with your new device
Don’t have backup codes? Contact support with:
- Account email address
- Company name
- Government-issued ID (for verification)
We’ll manually reset your 2FA within 24 hours after verification.
I accidentally quarantined a device. How do I restore it?
Easy fix:
- Find the quarantined device in your Discovered Devices table
- Look for devices with a ๐ซ icon or “Quarantined” status
- Click the green Release button
- Confirm the action
The device will regain network access within 30 seconds.
Note: If you’re repeatedly quarantining the same device, it may have legitimate security issues. Check its security score and alerts for details.
Still Have Questions?
We’re here to help. Contact us using any of the support channels below.
๐ง
support@aegistechnologies.tech
๐
Help Center
help.aegissentinel.io
๐ฌ
Live Chat
Available for Business plan
๐ฑ
Emergency
See welcome email
Response Times:
Free plan: 24 hours โข Pro plan: 4 hours โข Business plan: 1 hour (priority support)
