Welcome to the Setup Page for Your SILENT ASSASSIN Subscription!
Thank you for choosing SHEL INFOSEC to secure your digital environment. Follow the instructions below to complete the installation of our RMM (Remote Monitoring and Management) agent and initiate setup based on your chosen tier.
Step 1: Download and Install the RMM Agent
Please select the appropriate download link for your operating system below. The RMM agent is essential for enabling continuous monitoring, updates, and security management.
- Windows – [Download for Windows]
- Mac – [Download for Mac]
- Linux – [Download for Linux]
For mobile devices, please contact us at ciso@shelinfosec.com for specific instructions and assistance with onboarding.
Step 2: Additional Agents and Information (Based on Your Tier)
Depending on the tier you’ve selected, additional setup steps or security agents may be required:
- Web Protection & Additional Security Agents: Tiers that include advanced security features such as web protection may require additional agents on your device. After your RMM installation, we will guide you through any further installation steps if they apply.
- Additional Information: In some cases, we may require additional information to ensure that these agents are correctly configured and tailored to your unique environment. We will reach out to gather any necessary details.
Step 3: Finalizing Security Policies and Maintenance
Once your RMM installation is complete, we will confirm any relevant security policies and maintenance schedules for your device. You will receive an email from our team to finalize these details and ensure your security settings are aligned with the protection level of your selected tier.
For any questions during the setup process, feel free to reach out to us at ciso@shelinfosec.com. We’re here to help every step of the way!
Next Steps: Please download the appropriate agent to get started, and check your email soon for any follow-up instructions.