1. Preface
  2. 🔆— GETTING STARTED —🔆
  3. Introduction and Overview
  4. Architecture
  5. Deployment Models
  6. Ridgeback Data
  7. System Requirements
  8. 🔆— OPERATING RIDGEBACK —🔆
  9. Common Use Cases
    1. Audit DNS Entries
    2. Identify and Eliminate Insecure Hostname Queries
    3. Identify and Eliminate Reconnaissance Threats
    4. Identify and Eliminate Active Threats
    5. Identify and Eliminate Unapproved Services
    6. Detect and Correct Leaky Segments
    7. Identify Unauthorized Devices
  10. Using Reports and Analytics
  11. Phantoms
  12. Harden Comms (CISA Guidance)
  13. 🔆— INTERMEDIATE TOPICS —🔆
  14. Securing Ridgeback
  15. The Dangerous 169.254.169.254
  16. The Multicast Broadcast 224.0.0.1
  17. Rcore Configuration
    1. Active and Passive Rcore
    2. Passive Rcore, UI Phantoms
    3. Rcore and DHCP
  18. Policies (Security and IT)
    1. Policies in the UI
    2. Policies with Scripts
    3. Policy Triggers
  19. Security Event Management
  20. Compliance
  21. 🔆— ADMINISTRATION —🔆
  22. Installation and Setup
  23. License Key Management
  24. User Account Management
  25. Configuration and Customization
  26. Setting up Email for Alerts
  27. Security and Access Control
  28. Managing the Containers
  29. Log Management and Monitoring
  30. Database Management
  31. Data Backup and Recovery
  32. Managing the Rcores
  33. Software Updates and Maintenance
  34. Troubleshooting and Error Handling
  35. Integrating with Other Tools and Systems
  36. 🔆— BACK MATTER —🔆
  37. Glossary and Terminology
  38. Contact and Support Information