
Taylor Colwell
Articles
-
Connect Microsoft Active Directory
This guide provides the required steps to connect Microsoft Active Directory to Cloud Control Center (Connector Version 3.0 and newer) as a data enrichment source for users and devices. For details...
-
Setting Up Identity and Access Management (IAM) Using Role-Based Access Control (RBAC) in Cloud Control Center
This article is designated as Private KB Access. Introduction This Knowledge Base article provides a comprehensive guide on setting up Identity and Access Management (IAM) using Role-Based Access...
-
Elisity Native Identity
Elisity Natively Discovered Attributes and Their Use in Policy Group (PG) Definitions Elisity Native attributes are derived directly from Elisity's native detection and identification mechanisms. T...
-
Policy Groups
Policy Groups are the building blocks of Elisity microsegmentation and are used to dynamically or statically assign assets into groups that receive the same level of cybersecurity treatment. Pol...
-
Virtual Edge Deployment Guide (Virtual Edge 16.3+) Switch Hosted
This article walks through the steps to onboard, configure, and manage a Switch Hosted Virtual Edge 16.0+ For information on how to use the Virtual Edge dashboard, see our VE/VEN management article...
-
IdentityGraph™
What is IdentityGraph™? IdentityGraph™ is Elisity's asset identity engine developed to address the challenges faced by modern network administrators in managing and understanding asset identities...
-
Visibility, Traffic Analytics, and Monitoring
The Elisity Microsegmentation platform provides rich policy and traffic telemetry while also offering effective search and filtering functionality for day two operations. With Elisity, an administr...
-
Policy Set Enforcement Scores
The Policy Set Enforcement Score is a metric introduced in Elisity Cloud Control Center (CCC) to quantify and visualize how well policies are enforced within each Policy Set. By incorporating Polic...
-
Virtual Edge Deployment Guide (Virtual Edge 16.3+) Hypervisor Hosted
This article walks through the steps to onboard, configure, and manage a Hypervisor Hosted Virtual Edge 16.0+ For information on how to use the Virtual Edge dashboard, see our VE/VEN management ar...
-
Policy Matrix
The Policy Matrix offers a visual representation of all Policy Groups and the policies that exist between them. It is also an interactive way to rapidly build policies between known and unknown ass...