Clear endpoint safety
Options
- Block and detect superior assaults
- Trendy audited cryptography: RustCrypto for hashing and encryption
- Extremely suitable: Improvement centered on all platforms (incl. legacy) and architectures
- Supply out there: Audits welcome
- Reviewed by safety researchers with mixed 100+ years of expertise
In Motion
Set up
From Packages (Linux)
Distro-specific packages haven’t been launched but for WhiteBeam, verify once more quickly!
From Releases (Linux)
- Obtain the newest launch
- Guarantee the discharge file hash matches the official hashes (How-to)
- Set up:
./whitebeam-installer set up
From Supply (Linux)
- Run checks (Elective):
- Compile:
- Set up WhiteBeam:
Fast begin
- Turn into root (
sudo su
/su root
) - Set a restoration secret. You’ll use this with
whitebeam --auth
to make modifications to the system:whitebeam --setting RecoverySecret masks
Tips on how to Detect Assaults with WhiteBeam
A number of guides are offered relying in your desire. Contact us so we may help you combine WhiteBeam along with your surroundings.
- Serverless information, for passive overview
- osquery Fleet setup information, for passive overview
- WhiteBeam Server setup information, for lively response
Tips on how to Stop Assaults with WhiteBeam
WhiteBeam is experimental software program. Contact us for help safely implementing it.
- Turn into root (
sudo su
/su root
) - Assessment the baseline a minimum of 24 hours after putting in WhiteBeam:
- Add trusted conduct to the whitelist, following the whitelisting information
- Allow WhiteBeam prevention:
whitebeam --setting Prevention true