What Changes Immediately After Installation
Once installation is complete, your system begins actively protecting your device and network. You may not see everything happening, but the following protections are now in place:
- Security alerting is enabled
- Anti-virus protection becomes active
- Web filtering rules are enforced
- Encryption policies are applied (where configured)
- Firewall protections begin monitoring traffic
To help you feel confident everything is working as expected, we recommend testing the items below.
Note: Testing steps are provided as general guidance and may vary based on your organization’s security policies. If you’re unsure, our support team can assist.


What to Expect
Security alerts will be sent via email when suspicious or blocked activity is detected
How to Test
- Testing Web Blocker or Anti-Virus is the easiest way to confirm email alerts are set up correctly.
- Confirm the correct alert email address is configured
- Verify the alert email is received
Expected Result:
You receive an alert email confirming the system is actively monitoring events

What to Expect
Malicious files are automatically detected and blocked or quarantined
How to Test
- Google “EICAR antivirus test file” — a universal, harmless test file from the European Institute for Computer Antivirus Research used to verify anti-virus protection
- Attempt to download or open the test file
Expected Result:
The file is blocked or quarantined, and an alert may be generated

What to Expect
Access to unsafe or non-compliant websites is blocked by category
How to Test
- Visit a gaming website such as xbox.com
- Gaming sites are commonly restricted by policy
Expected Result:
The site is blocked, and you may see a warning or block page

What to Expect
Sensitive data is encrypted according to your organization’s security policy
How to Test
- For Windows: Search “BitLocker” in the Start menu and check the drive encryption status.
- For macOS: Open System Settings → Privacy & Security → FileVault to confirm encryption is enabled.
Note:
Encryption testing is environment-specific
Hardware Firewall (If Installed)
This section applies only to deployments that include a hardware firewall.

What to Expect
Certain websites, services, or applications may be restricted based on security or usage policies.
How to Test
- Attempt to access a website or service known to be blocked
Expected Result:
Access is Denied

What to Expect
Traffic from specific countries or regions is restricted to reduce risk from high-risk locations.
How to Test
- Attempt to visit a website hosted in a blocked region
- Example: A Russian consulate website (.ru domain)
Expected Result:
The site is blocked due to geographic restrictions

What to Expect
The firewall monitors for suspicious outbound connections that may indicate malware or botnet activity.
How to Test
- This feature runs automatically in the background
Expected Result:
Suspicious outbound traffic is automatically blocked

Tor Network Blocking
What to Expect
Connections to and from the Tor network are blocked to prevent anonymous or high-risk traffic.
How to Test
- Visit a known Tor test or Tor access site (support can provide examples)
Expected Result:
Access is blocked
Security Best Practices & Reminders
To maintain a secure environment:
- Use strong, unique passwords
- Do not share login credentials
- Keep devices locked when unattended
- Report unexpected behavior immediately

If anything doesn’t behave as expected:
- Recheck the steps above
- Confirm installation completed successfully
- Contact support for assistance
Our team is happy to assist and verify your setup.






