- Preface
- 🔆— GETTING STARTED —🔆
- 1. Introduction and Overview
- 2. Architecture
- 3. Deployment Models
- 4. Ridgeback Data
- 5. System Requirements
- 🔆— OPERATING RIDGEBACK —🔆
- 6. Common Use Cases
- 6.1. Audit DNS Entries
- 6.2. Identify and Eliminate Insecure Hostname Queries
- 6.3. Identify and Eliminate Reconnaissance Threats
- 6.4. Identify and Eliminate Active Threats
- 6.5. Identify and Eliminate Unapproved Services
- 6.6. Detect and Correct Leaky Segments
- 6.7. Identify Unauthorized Devices
- 7. Using Reports and Analytics
- 8. Phantoms
- 9. Harden Comms (CISA Guidance)
- 🔆— INTERMEDIATE TOPICS —🔆
- 10. Securing Ridgeback
- 11. The Dangerous 169.254.169.254
- 12. The Multicast Broadcast 224.0.0.1
- 13. Rcore Configuration
- 13.1. Active and Passive Rcore
- 13.2. Passive Rcore, UI Phantoms
- 13.3. Rcore and DHCP
- 14. Policies (Security and IT)
- 14.1. Policies in the UI
- 14.2. Policies with Scripts
- 14.3. Policy Triggers
- 15. Security Event Management
- 16. Compliance
- 🔆— ADMINISTRATION —🔆
- 17. Installation and Setup
- 18. License Key Management
- 19. User Account Management
- 20. Configuration and Customization
- 21. Setting up Email for Alerts
- 22. Security and Access Control
- 23. Managing the Containers
- 24. Log Management and Monitoring
- 25. Database Management
- 26. Data Backup and Recovery
- 27. Managing the Rcores
- 28. Software Updates and Maintenance
- 29. Troubleshooting and Error Handling
- 30. Integrating with Other Tools and Systems
- 🔆— BACK MATTER —🔆
- 31. Glossary and Terminology
- 32. Contact and Support Information