Welcome to the BlastShield™ Enterprise and Professional Plan Quick Start Guide. In this series of articles you will learn how to setup your BlastShield™ protected network. To get your BlastShield network up and running, the following workflows are required.
This step-by-step guide shows you how to register and connect to your BlastShield™ network and then launch the Orchestrator. There are two steps:
To register for the first time you will use the Desktop client to register and create a name for the new network. The desktop client will ask for the invitation BSI file to validate the registration. You will be asked to authenticate your biometrics on your phone to complete the authentication process.
To find out how to do this, watch the following video or read the instructions below.
Once you have registered and authenticated for the first time, you will no longer require the .bsi invitation file.
If you would like the BlastShield™ Client to stay connected when your screen is locked then you can configure this in the Client as described below:
Once you have connected to BlastShield™, you can launch the Orchestrator to begin managing your new BlastShield™ network.
To launch the Orchestrator simply click on the 'Launch Orchestrator' buton in the Desktop Client. This will trigger an additional authentication step with a QR code scan and biometric check using the Mobile Authenticator app. Please remember that you must be connected to BlastShield™ before you can launch the Orchestrator. See the video below to learn how to launch the Orchestrator.
The Orchestrator will launch in your web browser at https://orchestrator.blastshield.io
The Dashboard will be displayed as shown below.Now you can move on to the next step where you will add BlastShield™ Agents to protect your servers.
Now you can move on to the next step where you will add BlastShield™ Agents and Gateways to protect your servers.
If you have any problems, please review the troubleshooting guide which addresses the common questions regarding registration, authentication and connecting.
Most users will use the Desktop Client and the Mobile Authenticator to connect, but we also offer two other methods for connections and authentication. These are: