-
Intelligence Center: Connecting to a SIEM
Similar to the Atakama Log Server, the Atakama Intelligence Center can be co...
-
Adding and removing keys via Command Line Interface (CLI)
Adding or removing keys involve two steps: 1. performing the change, and ...
-
Secure Folders & Security Groups: Overview
TABLE OF CONTENTS Secure Folders Introduction Global identifier Shari...
-
v2.0.16583 - Quantum Quetzalcoatl
New Features It is now possible to link a new device directly inside the...
-
Using Windows Task Scheduler to Launch Atakama
Atakama is configured to run by default when a user logs in. However, you ca...