Technical Support

Need help?


Panda Adaptive Defense 360 on Aether Platform Getting started Quick Guide

Information applies to:

Panda Adaptive Defense 360 on Aether Platform

Who is the Quick Guide aimed at? This guide is primarily aimed at a small or medium size network administrators who have never had any Panda Security security solution installed before and who are about to install Panda Adaptive Defense 360.

What is the purpose of the Quick Guide? The objective is to teach in a fast way how to deploy Panda Adaptive Defense 360 and how to learn to take advantage of the solution through several practical recommendations.

Follow the steps indicated in the Panda Adaptive Defense 360 on Aether Platform Getting started Quick Guide and learn to install and configure your product to make the most of it. Remember that if you have any questions during the start-up process, you can always contact our experts.

STEP 1 - Access the administration console
Create your Panda Account by following the steps in the email you received when you purchased the product and access the administration console.

If you already have a Panda Account, click here and enter your email address and login password.
STEP 2 - Install the protections Before you install, please ensure that the system and communication requirements are met.
Within the administration console, on the Computers tab, click on the Add Computers button and select the installation mode:
+ Discovery and remote installation (only for Windows) - RECOMMENDED - Discovery and remote installation (only for Windows) - RECOMMENDED

All products based on Aether Platform provide tools to find the unprotected workstations and servers on your network and launch a remote, unattended installation from the management console.

If you choose this method, please bear in mind the following before you start:

  • You must install Panda Adaptive Defense 360 on the computer that will act as the discovery computer. To do so, click the Computers tab, select Add computers and follow the instructions on the screen. For further details, check this article.
  • Check the discovery requirements. In particular, ensure you are the domain administrator of the network you are going to deploy the protection to, as DOMAIN\administrator credentials will be requested during the process.

For detailed information on the Discovery and remote installation feature, check this article.

+ Download and execution of the installation file (all platforms) - Download and execution of the installation file (all platforms)

You can send the installation URL to the devices you want to protect or else, choose to download the installation file. Depending on the operating system of the device to protect, you will need to follow a different set of instructions. For detailed information, check this article.

STEP 3 - Learn how to make the most of your product
As we have seen, the deployment of Panda Adaptive Defense 360 is very simple and the configuration that is installed by default guarantees the security and complete protection of your park. In this section we offer some practical tips and recommendations to help you take advantage of your product:
+ Alerts - Alerts

Panda Adaptive Defense 360 has a set of alerts activated by default and configurable by user role that allow receiving notifications about the following events:
  • Malware detection
  • Exploit detections
  • Blocked programs in the classification process
  • File classifications that have been allowed by the administrator
  • URLs with blocked malware
  • Phishing detections
  • Blocked devices
  • Computers with protection errors
  • Unlicensed computers
  • Errors during installation
  • Unmanaged computers discovered
We recommend that you..
  • Add the address or email addresses of the recipients of alerts - preferably one or more network administrators -.
  • Given the relevance of all the aforementioned events, we recommend that you do not deactivate any of the alerts to be informed at all times about any event related to the security of your network.
+ Status of protections and malware - Status of protections and malware

The Panda Adaptive Defense 360 console Status tab provides you with a global picture of the protection status, which includes the following information panels:
  • Protection status
  • Offline computers
  • Programs allowed by the administrator
  • Classification of all the programs executed and analyzed
  • Malware activity
  • Programs currently blocked in classification
  • PUPs activity
  • Exploits activity
  • Threats detected by the antivirus
  • Content filtering on Exchange servers
We recommend that you..
  • Consult the informative panels on a regular and frequent basis - at least once a week. Although the alert system will notify you by default of all the events that are shown in the Status panel, it is convenient to actively review it to get consolidated insight of the state of your network.
  • If you need more details about any of the widgets that appear in the panels, we recommend that you check the available listings from the left side menu. You can always create custom listings that fit your needs, but those that appear by default in the menu are the most useful.
+ Security level of the Advanced Protection - Security level of the Advanced Protection
Panda Adaptive Defense 360, uses Machine Learning technologies executed on Panda Security's Big Data platforms to block all programs classified as malware. Of the three available operating modes - Audit, Hardening and Lock - the least restrictive and the one that informs in case of a detection, is the Audit mode. In Hardening and Lock mode, the known malware will be blocked, as well as previously unseen programs until they are analyzed and a security classification is issued.
We recommend that you..
  • Leave the default operating mode activated - Hardening - because it balances the risk of infection of the computer and the productivity of the users, limiting the blocking of unknown programs to those that are considered a priori dangerous.
  • If you require a more restrictive security level for your network to only allow the execution of legal software, you can gradually change it to Lock mode.
+ Security against unauthorised protection tampering - Security against unauthorised protection tampering

Many advanced threats incorporate techniques to deactivate the security software installed on the computers and thus circumvent all their protection features.
This behavior is also common practice for hackers. For this reason, Panda Adaptive Defense 360 incorporates anti-tamper technology that prevents unauthorized modifications of the operation of the solution.
We recommend that you..
  • Activate and configure a password for the following options within the Per-computer settings:
    • Uninstall the computer protection.
    • Activate anti-tamper protection.
+ Health status of your network - Health status of your network

Panda Adaptive Defense 360 includes audit tools so that the administrator can monitor and analyze the health status of the positions in the network and act accordingly.
We recommend that you..
  • Configure views or filters periodically, either to monitor the health status of your network or for productive purposes, for example:
    • View of computers with obsolete hardware.
    • View of computers with unauthorized software.
    • View of computers with non-legal, unsecured or unsigned software.
  • Once a month, for example, schedule the sending of an executive report to the administrator to find out about the status of the protections and the security of your infrastructure.
+ Configure cache role - Configure cache role

Panda Adaptive Defense 360 lets you assign the cache role to one or more computers on your network. These computers will automatically download and store all files required so that other computers with Adaptive Defense 360 installed can update their signature file, agent and protection engine without having to access the Internet.

We recommend that you..
Select one or more computers to act as a cache. This saves bandwidth as it won't be necessary for each computer to separately download the updates they need. All updates are downloaded centrally for all computers on the network. For further information on how to do this, check this article.

Multimedia content

Watch a quick video that will show the Panda Adaptive Defense 360 Getting started process.