Get your teams up to speed quickly with our Halo Foundations training videos, whether you’re an existing Halo customer or evaluating Halo to unify and automate your cloud security. In this series of 17 short self-service videos, you’ll get comfortable using Halo, learn the basics about administration and monitoring, and maybe discover a few features you haven’t used yet. These videos are your solution to your team educating themselves at their own pace—remotely, quickly, and at no cost.
You can access all the videos at CloudPassage Halo Foundations – Self Service Training Videos, or click on the individual video images below.
Improving your cloud security posture and maintaining compliance requires the right tools and the right strategy. Halo is easy-to-use security that’s built for the cloud, and putting it in place can go a long way toward securing your cloud resources. However, our most successful customers follow specific steps that lead from asset awareness, through survivability and threat detection, and finally to streamlined, continuous compliance and automated remediation.
The Halo Foundations training videos empower you with the knowledge you need to accelerate your success with Halo. And after completing your basic training, the Halo Operations Guide, provided through the Halo portal, and the Halo REST API Developer’s Guide are in-depth resources that help you enable fully automated cloud security operations.
Bringing your staff up to speed quickly can accelerate your time to value with any new software product or platform, whether you’ve just installed the solution or you’ve hired new staff. Halo self-service training videos can help you quickly learn the basics, from navigating the portal, to site, group, user, and asset administration, to security automation and alert monitoring, and more.
The Halo Foundations training videos give newcomers a chance to learn quickly and effectively through short, guided presentations, and it allows seasoned users to brush up on unfamiliar product features. You’ll also get tips on best practices, and you’ll find references to related documentation for deeper learning.
Below is a summary of the 17 Halo Foundations training videos currently available.
By approaching Halo integration as a formal project, with an executive sponsor and a dedicated project team, you can have Halo up and running in your environment quickly. In this introductory Halo Foundations training video, we walk through the key activities of a successful Halo project, including:
Since security is a cross-cutting requirement for any organization, implementing a new security platform requires buy-in and participation by many different teams. By following the steps in this video, you can accelerate your success with Halo, and you can make sure you’re including all the right stakeholders.
In just over six minutes, this guided tour of the Halo portal teaches you how to navigate the Halo portal, including:
This video is the starting point for getting new users up to speed with the Halo portal, and it sets them up for success as they dive deeper into the Halo Foundations training videos.
Halo site administrators are responsible for user administration. Based on a user’s scope and roles, they gain access to the various features within Halo. It’s important to understand user administration so that the Halo portal itself is protected from misuse. In this video, you will learn how to:
After watching the Halo User Administration video, you can build on your knowledge by watching the Halo Site Administration and Role-Based Access Control (RBAC) User Administration videos.
This short, impactful Halo training video familiarizes Halo administrators with all administrative screens, except user administration, including:
The Halo Site Administration video goes beyond a simple tour by giving you tips on best-practice configurations throughout each of the screens. The user administration screen is covered in detail in Designing an Effective Group Hierarchy and Role-Based Access Control (RBAC) User Administration.
Learn about RBAC and how it’s used within Halo for user administration, and how it relates to group administration for asset access control. This video provides a step-by-step guide for:
The RBAC User Administration video also provides brief descriptions, access rights, and limitations of each of the Administrator, Standard, Auditor, and GhostPorts Halo roles.
An effective group hierarchy strategy is fundamental to group-based policy management in Halo. This eleven-minute video teaches you group hierarchy best practices, and gives you tips on how to:
By watching, understanding, and implementing the concepts taught in this Halo Foundations training video will help ensure that your Halo configuration provides effective visibility into your security posture. You’ll also create a group hierarchy that can scale across any number of servers or cloud environments without introducing unnecessary complexity.
With attribute-based policy assignment (APA), you can specify how CSM, FIM, and LIDS server policies are assigned within the policy itself, using attributes of the target assets, such as OS distribution and OS version, as assignment criteria. This short video covers:
Alert profiles in Halo are policies that control the alerts that you receive, including who receives the notifications and at what frequency. The Alert Profiles Halo training video teaches you:
After watching this video, you’ll be able to configure alert profiles to email important security events to your security and operations groups, and you’ll know how to configure alert frequency based on the criticality of the security event.
This walkthrough covers how the Halo Event Connector works to transfer event data to integrated analysis platforms, including Splunk, ArcSight, and others. The topics covered include:
The video walks you through the import and configuration of the CloudPassage Halo Event Connector in Splunk as an example of how to manage the connection between Halo and your SIEM platform.
Single Sign-on (SSO) is a convenient and secure way to provide access to all authorized resources across your company. Halo offers Security Assertion Markup Language (SAML) based SSO integration with common identity providers. In this Halo Foundations training video, you’ll learn about:
You’ll also learn requirements for using SSO login, best practices for enforcing SSO, and how to use Halo with SSO as a GhostPorts user.
Once you’ve configured your Halo administration portal, you’ll be ready to integrate Halo automation throughout your servers, applications, containers, and CI/CD pipeline. In this video, you’ll see:
This video gives you a brief introduction to the Python SDK for CloudPassage Halo API and a few examples to get you started building efficient API integrations. Be sure to follow the links provided in the video to the Halo REST API Developer Guide and community GitHub repositories so you can dig deeper into the vast potential of the APIs that serve as the foundation for security automation in Halo.
File Integrity Monitoring (FIM) is a feature of CloudPassage Halo Server Secure that protects the integrity of the system software and application stack on your Linux or Windows servers. It regularly monitors your servers for unauthorized or malicious changes to system binaries and configuration files. This three-part video series includes:
Automating FIM as part of your CI/CD pipeline can significantly reduce the chance of untested or compromised binaries making it into production. By understanding how FIM works in Halo, you can add this crucial security check without introducing bottlenecks to your DevOps process.
This short video demonstrates how to search for security events that have occurred across your Halo-monitored environments. You’ll learn:
You’ll also see an example of a security event alert email, and how to use the automated emails to navigate directly to the related events in the Halo portal.
Halo automatically scans your assets and reports on issues. The lifecycle of an issue spans from issue detection to final resolution, and consists of scans that evaluate servers based on policies, finding from scans, and logged events. By understanding how to use scans, findings, and events to identify and diagnose issues, you can better secure your IaaS resources, servers and containers. In just over fourteen minutes, you’ll get:
In this video, you’ll walk through scans, and drill down into the findings and event logs that could indicate issues within your systems. You’ll also learn how to add exceptions for vulnerabilities, how to find resolved issues and manually resolve outstanding issues.
As a SaaS solution provider, CloudPassage offers a wide range of customer support, including customer on-boarding, trouble tickets, and engineering support. This video familiarizes new Halo users with the support teams, options, and contact methods available. You’ll learn:
Many InfoSec teams are being asked to do more with fewer resources and lower budgets. These videos are free to our Halo users and can be accessed by your team at any time, on-demand. We also offer all of the topics shown here as in-person classes, both on-site or remote, if you prefer.
Soon we will be releasing self-service training videos for Server Secure, Cloud Secure, and Container Secure. Watch for our upcoming announcements.