How can we help you?
Search our knowledge base, documentation, and troubleshooting guides to find exactly what you need.
📚 Browse Categories
Getting Started
Initial setup, dashboard navigation, and onboarding workflows for new teams.
14 ArticlesTroubleshooting
Fix common errors, connection issues, false positives, and system alerts.
23 ArticlesAPI & Integrations
REST API guides, webhooks, SDKs, and third-party connector documentation.
31 ArticlesSecurity Guides
Encryption standards, zero-trust setup, endpoint hardening, and threat response.
18 ArticlesAccount & Billing
Subscription management, invoices, seat upgrades, and payment methods.
9 ArticlesCompliance & Audits
SOC 2, ISO 27001, GDPR, HIPAA checklists and automated reporting tools.
12 Articles📖 Popular Articles
🔑 Generating & Rotating API Keys
Learn how to securely generate, scope, and rotate API keys for your workspace.
🚨 Understanding SOC Alert Severity Levels
How to interpret critical, high, medium, and low severity alerts in the dashboard.
💻 Deploying the Endpoint Agent
Step-by-step guide for Windows, macOS, and Linux agent installation & MDM integration.
☁️ Securing AWS S3 Buckets & IAM Roles
Best practices for cloud storage encryption, access policies, and least-privilege IAM.
📋 Automated Incident Response Playbooks
Configure auto-remediation workflows for malware, phishing, and brute-force attacks.
Still need help?
Our security engineers and support specialists are here to assist you with complex issues, custom configurations, or emergency response.