Control panel¶
Accessing the control panel¶
The Control Panel enables you to configure protection settings for your subscribed security modules and add-ons. The Control Panel is also where you administer your workspace, cloud applications, protected users, and their devices.
To access the Control Panel, log into the Coro console and select the Control Panel icon in the toolbar:
In addition, each dashboard panel (and optional module or add-on) in the Actionboard includes a Control panel icon, designed to allow you to quickly access the relevant settings page:
Using the Control Panel¶
The Control Panel contains the following options, separated into Protection and Workspace:
Note
Some options might appear disabled where that module is not currently subscribed.
Select an object to access the settings page for that component.
Protection¶
Cloud Security¶
Monitor and control access to connected cloud applications and data. See Setting Permissions for your cloud applications.
Endpoint Security¶
Manage the protection features for endpoint devices. See Introducing Coro Endpoint Security.
Email Security¶
Configure email security settings, including trusted and untrusted domain lists. See Introducing Email Security.
User Data Governance¶
Manage your users' access to sensitive information and configure how data sharing is monitored. See Introducing User Data Governance.
Endpoint Data Governance¶
Configure monitoring for storage of sensitive information on your users' endpoint devices. See Introducing Endpoint Data Governance.
EDR¶
Access the Endpoint Detection and Response module page. See Coro Endpoint Detection and Response (EDR).
Managed SOC¶
Access the Managed SOC Services page. See Managed SOC Services.
Network¶
Access the Network module page. See Network.
Workspace¶
Users¶
Manage lists of your users and user groups. See Adding users and user groups for protection.
Devices¶
Get Coro Agent deployment packages, manage device labels, and configure monitoring settings. See Introducing devices.
Cloud Applications¶
Connect cloud applications to be monitored for users. See Introducing cloud security.
Access Control¶
Manage admin users, add new admin users, set roles and permissions, and review active sessions. See Introducing Access Control.
Activity Logs¶
View the activity logs for your workspace. See Activity Log.
Connectors¶
Configure connectors for integrating Coro with external Security Information and Event Management (SIEM) services. See Security Information and Event Management (SIEM) integration.
Reports¶
View and download a summary report offering a detailed overview of the security status and activities within a workspace. See View a summary report.