YOU’RE NOT VIEWING PANDA SECURITY USA. CLICK TO IMPROVE YOUR EXPERIENCE
VISIT PANDA SECURITY USA
x
48h OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
48-HOUR OFFER
50%
RENEWALS
Home users only
RENEW AT A DISCOUNT
x
SPECIAL OFFER
If you're already a customer of
our homeusers protection,
renew now with 50% off
RENEW NOW
x
HALLOWEEN OFFER
take advantage of our
terrific discounts
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
SPECIAL OFFER
Buy the best antivirus
at the best price
BUY NOW AND GET 50% OFF
x
UP TO
-60%
BUY NOW
x
UP TO
-60%
BUY NOW

Technical Support

Need help?

 

Guide for network administrators of Aether-based Adaptive Defense products

Information applies to:

Products
Panda Adaptive Defense 360 on Aether PlatformPanda Adaptive Defense on Aether Platform
Panda Data ControlPanda Patch Management

This article features access to the guide aimed at network administrators who need to protect their organization's IT assets, find out the extent of the security problems detected, and define response and remediation plans against targeted attacks and advanced persistent threats (APTs). Panda Adaptive Defense 360 on Aether and Panda Adaptive Defense on Aether are managed services that deliver guaranteed security without the need for network administrators to intervene, and offer highly detailed information thanks to the new Aether platform developed by Panda Security.

Aether is a scalable and efficient platform for the centralized management of Panda Security solutions, addressing the needs of key accounts and MSPs. Aether facilitates the real-time presentation of information generated by Adaptive Defense products about processes, the programs run by users and the devices installed, in a coordinated and highly detailed manner.

To get the most out of Adaptive Defense products on Aether, certain technical knowledge of the Windows environment is required with respect to processes, the file system and registry, as well as understanding the most commonly-used network protocols. This way, network administrators can accurately interpret the information in the management console and draw conclusions that help to bolster corporate security.

The Administration Guide is available from your product's administration console, more specifically, here:


To access the Documentation download area, click here.
Help nº- 20190124 700007 EN

Have you resolved your query with this article?

yes no

Thanks for your answer


Why didn't you find it helpful?


The instructions are too complex.
The instructions are too long.
The instructions don't work.
I'd rather have a video.
Other reasons.




Talk to a technician!

 

Business hours: Mondays-Fridays 9:00 to 18:00 CET

Outside business hours, please use the online form.





ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT
ALWAYS ONLINE TO HELP YOU TWITTER FORUM RATE US CHAT