Welcome to Your SILENT EDGE Setup Portal

Thank you for choosing SHEL INFOSEC and the SILENT EDGE Cyber Security suite to protect your digital environment. This page guides you through the onboarding process for your new subscription and details what to expect next.

 
What Happens Next? Overview of Your Security Setup Journey

Your account is being actively provisioned, and our expert team is preparing to onboard your device(s) to our Remote Monitoring & Management (RMM), Endpoint Detection & Response (EDR), and Managed VPN systems. We follow a phased rollout process to ensure smooth enrolment, minimal disruption, and full protection.

 
Step 1: Device Information Collection
To get started, please provide details about each device you want protected:
  • Device Type (PC, laptop, server, phone, tablet)
  • Operating System:
     - Windows / Mac / Linux (please specify version) for computers
     - Apple iOS or Android (including version) for mobile devices

This information aligns security policies with your environment and ensures the right agents and controls are deployed.

 
Step 2: Security Policy Setup

You will receive a brief questionnaire via email. This helps us tailor security configurations and compliance settings based on your specific needs and risk profile.

 
Step 3: Agent Installation & Enrolment (RMM & EDR Setup)

Within 24-48 hours of receiving your device info and completed questionnaire:

  • An automated email from our enrollment system will deliver installation instructions for your Remote Monitoring & Management (RMM) agent.
  • A technician will contact you to schedule a convenient 30-minute window for installation and configuration assistance.

Please ensure the device is available and connected to the internet during the scheduled session to facilitate a seamless setup.

 
Step 4: Secure VPN Onboarding

If your subscription includes VPN protection (such as through Silent Edge SiteSentinel):

  • Prior to setup, you’ll receive instructions to download the Proton VPN app on your mobile device(s):
     - Apple App Store (iOS)
     - Google Play Store (Android)
  • Do not open or log into the app yet. The VPN setup uses a password-free QR code authentication, requiring precise timing.
At your scheduled VPN onboarding session (5 minutes):
  • Wait for the SHEL infosec technician to 
  • Open the Proton VPN app
  • Tap “Sign In”
  • Select “Help” (top-right corner), then “Sign in with QR code”
  • Immediately screenshot the generated QR code and send it via WhatsApp to:
    +27 77 416 7672 (SHEL INFOSEC)
Note: The QR code expires within 2 minutes, so sending it promptly is critical. Our team scans the code in real-time to activate your secure VPN connection.
What to Expect Based on Your Subscription Tier

Tier

Main Features

Setup Highlights

SILENT EDGE WebGuard

Daily malware scans, one-click malware removal, real-time firewall, login protection, uptime monitoring, GDPR compliance (client data deletion on request)

Core RMM/EDR agent installation, baseline website security controls, tailored security policy based on questionnaire. VPN optional/available as add-on.

SILENT EDGE SiteSentinel

Enhanced malware detection, advanced firewall rules, vulnerability alerts, geo-blocking, priority support, PCI DSS & HIPAA readiness

All SILENT EDGE WebGuard features plus advanced security components and compliance support. Includes full VPN onboarding with QR authentication and priority support coverage.

SILENT EDGE Solo

AI-powered EDR with basic device monitoring, private VPN, and real-time ransomware blocking.

RMM agent install, basic monitoring enabled. Simple setup and protection for individual devices.

SILENT EDGE CoreGuard

Behavioral AI-enhanced EDR, advanced device management automation, business VPN, compliance-ready with HIPAA/GDPR templates.

Advanced automation with Core EDR agent install, monthly threat reviews, and compliance policy alignment.

SILENT EDGE Sentinel

Advanced threat hunting, forensic recovery, full policy enforcement, VPN with zero trust gateways, automated PCI/NIST compliance reports.

Full policy enforcement with Advanced EDR agent, bi-weekly assessments, and prioritized incident triage support.

SILENT EDGE ApexShield

Enterprise-grade XDR with SOC & SIEM integration, ultra-stealth Tor-over-VPN, forensic-level ransomware counterstrike, full audit & certification.

Enterprise orchestration with XDR suite, 24/7 SOC hotline, and dedicated threat response team support.

 
Supported Devices for Monitoring

We actively monitor and protect:

  • Windows desktops and laptops
  • Mac desktops and laptops
  • Linux servers and workstations
  • Apple iOS devices (iPhone, iPad)
  • Android mobile devices
For other devices or questions about compatibility, please contact us at ciso@shelinfosec.com.
 
Finalizing Policies & Ongoing Maintenance

After installation, your CySA+ certified analysts will:

  • Review and optimize security policies
  • Schedule regular maintenance and compliance updates
  • Provide ongoing monitoring and expert threat response

You’ll receive confirmations and any additional instructions via email to keep you informed every step of the way.

 
Need Assistance or Have Questions?
We’re here to help! For any setup questions or to discuss your device onboarding, contact us anytime at:
ciso@shelinfosec.com
Next Steps:
  1. Submit your device information as per the initial email or via reply.
  2. Watch for your agent installation email and schedule your setup session.
  3. Prepare for your scheduled VPN setup session as per instructions when applicable.

 

We look forward to securing your digital environment with SILENT EDGE.

 

WINDOWS AGENT version

Download Linux AGENT version