Skip to main content
Knowledge
Mimecast Support
Community Support
Log in / Register
Knowledge Hub
Application Downloads
Service Updates
Raise a Support Case
Check Existing Requests
Contact Us by Phone
Education Resources
Forum Topics
Blogs
Mimecast
Knowledge Hubs
Human Risk Management
Incydr
Incydr administration
Planning and installing
Planning and installing
This guide provides instructions for planning and implementing Incydr, and installing agents.
Manage agent installations in your Incydr environment
Security hardening
Implement Incydr
Manage agent installations in your Incydr environment
There are multiple ways to deploy agents to endpoint devices, depending on version, environment, and authentication method. This section provides links to detailed instructions.
Security hardening
This section describes how to configure settings in your environment to increase security.
Implement Incydr
This guide provides resources to help you implement Incydr at your company.
Administrator's guide to getting started with Incydr
Available languages for Incydr products
Best practices for using Incydr with EDR software
Considerations for defining your backup policies
Deploy the Incydr browser extension
Getting started with Incydr
Identify IP addresses used by Incydr data connectors
Incydr FAQs
Incydr hardware and software requirements
Install the insider risk agent
Install the insider risk and backup agents
Introduction to Incydr
IP addresses and ports used by Incydr
Optimize settings for the backup agent
Supported operating systems
User data sources
User device resources
Validate signature for Red Hat insider risk agent installer
Return to top
installation, branding, customization