Welcome To Cyber Aeronautycs Ltd.
SECURING AIR & GROUND INFRASTRUCTURE
We are an aerospace and defense company in Bangladesh and engaged in research, design , development, manufacture, integration and sustainment of advanced technology systems, products and services.
CAL Defense is an all-in-one cyber protection solution that integrates data protection with cybersecurity. It provides an innovative combination of:
Key Features:
Identify
Protect
Detect
Respond
Recover
With CAL Defense, you can back up and restore Windows and Mac computers, Android smartphones or tablets, as well as iPhones, iPads and iPods. Backups that you can create include the following:
Backups of Windows/macOS Computers:
Mobile Devices:
When an administrator creates an account for you, an email message is sent to your email address. The message contains the following information:
Depending on the machine and data you want to back up, select and download the respective installation file:
Click OK . Congrats . The agent is successfully installed . You can now create a protection plan which you purchased .
The 'Full Disk Access' permission was not granted to the app. To grant it, go to the 'Utilities' folder in Finder, click 'Cyber Protection Agent Assistant', and then follow the instructions from the app.
Cause : The 'Full Disk Access' permission was not granted to the Cyber Protection agent. Some functionality may not work, for example, quarantine action on detection during real-time protection.
To grant full disk access permissions to Cyber Protection agent:
2. Click the "lock" button to allow changes and provide your password when prompted .
3. Drag the application icon from the window requesting to grant Full Disk Access to the Full Disk Access table.
For latest MacOS versions ( e.g. Monterey 12.3.1) - change the secure boot to medium security as newer MacOS versions have very strict 3rd party service filtering
Documentation reference: https://support.apple.com/en-us/HT208198
A protection plan can be applied to multiple machines at the time of its creation, or later. When you create a plan, the system checks the operating system and the device type (for example, workstation, virtual machine, etc.) and shows only those plan modules that are applicable to your devices.
A protection plan can be created in two ways:
Let's consider the first way.
To create the first protection plan
4. [Optional] To modify the protection plan name, click on the pencil icon next to the name.
5. [Optional] To enable or disable a protection plan module, click the switch next to the module name.
6. [Optional] To configure the module parameters, click the corresponding section of the protection plan.
7. When ready, click Create.
The Backup, Antivirus & Antimalware protection, Vulnerability assessment, Patch management, and Data protection map modules can be performed on demand by clicking Run now.
A protection plan can be in the following statuses:
You can apply several protection plans to a single device. As a result, you will get a combination of different protection plans assigned on a single device. For example, you may apply one plan that has only the Antivirus & Antimalware protection module enabled, and another plan that has only the Backup module enabled. The protection plans can be combined only if they do not have intersecting modules. If the same modules are enabled in more than one protection plan, you must resolve the conflicts between them.
When you create a new plan on a device or devices with already applied plans that conflict with the new plan, you can resolve a conflict with one of the following ways:
When you edit a plan on a device or devices with already applied plans that conflict with the changes made, you can resolve a conflict with one of the following ways:
If a device is included in a group of devices with an assigned group plan, and you try to assign a new plan to a device, then the system will ask you to resolve the conflict by doing one of the following:
The assigned quota on a device must be appropriate for the protection plan to be performed, updated, or applied. To resolve the license issue, do one of the following:
You can perform the following actions with a protection plan:
To apply an existing protection plan
To edit a protection plan
To revoke a protection plan from machines
To delete a protection plan
A protection plan with the Backup module enabled is a set of rules that specify how the given data will be protected on a given machine.
A protection plan can be applied to multiple machines at the time of its creation, or later.
To create the first protection plan with the Backup module enabled
To apply an existing protection plan
File-level backup is available for physical machines and virtual machines backed up by an agent installed in the guest system.
A file-level backup is not sufficient for recovery of the operating system. Choose file backup if you plan to protect only certain data (the current project, for example). This will reduce the backup size, thus saving storage space.
The OneDrive root folder is excluded from backup operations by default. If you select to back up specific OneDrive files and folders, they will be backed up. Files that are not available on the device will have invalid contents in the archive.
There are two ways of selecting files: directly on each machine or by using policy rules. Either method allows you to further refine the selection by setting the file filters.
[All Files]
selects all files on all volumes of the machine.[All Profiles Folder]
selects the folder where all user profiles are located (typically, C:\Users or C:\Documents and Settings).%ALLUSERSPROFILE%
selects the folder where the common data of all user profiles is located (typically, C:\ProgramData or C:\Documents and Settings\All Users).%PROGRAMFILES%
selects the Program Files folder (for example, C:\Program Files).%WINDIR%
selects the folder where Windows is located (for example, C:\Windows)./home
selects the home directory of the common users./root
selects the root user's home directory./usr
selects the directory for all user-related programs./etc
selects the directory for system configuration files.[All Profiles Folder]
selects /home. This is the folder where all user profiles are located by default.[All Profiles Folder]
selects /Users. This is the folder where all user profiles are located by default.Examples:
System state backup is available for machines running Windows 7 and later.
To back up system state, in What to back up, select System state.
A system state backup is comprised of the following files:
A disk-level backup contains a copy of a disk or a volume in a packaged form. You can recover individual disks, volumes, or files from a disk-level backup. A backup of an entire machine is a backup of all its non-removable disks.
The OneDrive root folder is excluded from backup operations by default. If you select to back up specific OneDrive files and folders, they will be backed up. Files that are not available on the device will have invalid contents in the archive.
There are two ways of selecting disks/volumes: directly on each machine or by using policy rules. You can exclude files from a disk backup by setting the file filters.
Direct selection is available only for physical machines. To enable direct selection of disks and volumes on a virtual machine, you must install the Cyber Protection agent in its guest operating system.
[All Volumes]
selects all volumes on machines running Windows and all mounted volumes on machines running Linux or macOS.[Fixed Volumes (physical machines)]
selects all volumes of physical machines, other than removable media. Fixed volumes include volumes on SCSI, ATAPI, ATA, SSA, SAS, and SATA devices, and on RAID arrays.[BOOT+SYSTEM]
selects the boot and system volumes. This combination is the minimal set of data that ensures recovery of the operating system from the backup.[BOOT+SYSTEM DISK (physical machines)]
selects all volumes of the disk on which the boot and system volumes are located. If the boot and system volumes are not located on the same disk, nothing will be selected. This rule is applicable only to physical machines.[Disk 1]
selects the first disk of the machine, including all volumes on that disk. To select another disk, type the corresponding number./dev/hda1
selects the first volume on the first IDE hard disk./dev/sda1
selects the first volume on the first SCSI hard disk./dev/md1
selects the first software RAID hard disk.To select other basic volumes, specify /dev/xdyN
, where:
To select a logical volume, specify its path as it appears after running the ls /dev/mapper
command under the root account. For example:
[[email protected] ~]# ls /dev/mapper/
control vg_1-lv1 vg_1-lv2
This output shows two logical volumes, lv1 and lv2, that belong to the volume group vg_1. To back up these volumes, enter:
/dev/mapper/vg_1-lv1
/dev/mapper/vg-l-lv2
[Disk 1]
Selects the first disk of the machine, including all volumes on that disk. To select another disk, type the corresponding number.
Bootable media is a CD, DVD, USB flash drive, or other removable media that enables you to run the agent without the help of an operating system. The main purpose of bootable media is to recover an operating system that cannot start.
We highly recommend that you create and test a bootable media as soon as you start using disk-level backup. Also, it is a good practice to re-create the media after each major update of the protection agent.
You can recover either Windows or Linux by using the same media. To recover macOS, create a separate media on a machine running macOS.
To create bootable media in Windows or Linux
To create bootable media in macOS:
To recover disks by using bootable media
To recover files by using bootable media
A backed-up OS image can have malware that can reinfect a machine after recovery.
The safe recovery functionality allows you to prevent recurrence of infections by using the integrated antimalware scanning and malware deletion during the recovery process.
Limitations:
How it works
If you enable the Safe recovery option during the recovery process, then the system will perform the following:
Bootable media is a CD, DVD, USB flash drive, or other removable media that enables you to run the agent without the help of an operating system. The main purpose of bootable media is to recover an operating system that cannot start.
We highly recommend that you create and test a bootable media as soon as you start using disk-level backup. Also, it is a good practice to re-create the media after each major update of the protection agent.
You can recover either Windows or Linux by using the same media. To recover macOS, create a separate media on a machine running macOS.
To create bootable media in Windows or Linux
Alternatively, you can create bootable media by using Bootable Media Builder.
To create bootable media in macOS
Cyber Protect provides you with remote access capability. You can remotely connect and manage your user machines right from the web console. This allows you to easily assist to your users in resolving issues on their machines.
Prerequisites:
A remote connection can be established from both Windows and macOS machines.
The remote access functionality can be used for connections to Windows machines with the Windows Remote Desktop feature available. That is why a remote access is not possible, for example, to a Windows 10 Home or macOS systems.
To establish a connection from a macOS machine to a remote machine, ensure that the following applications are installed on the macOS machine:
When you try to connect to a remote machine, the system first checks whether this machine has a Cyber Protect license. Then, the system checks whether the connection via the HTML5 or RDP client is possible. You initiate a connection via the RDP or HTML5 client. The system establishes a tunnel to the remote machine and checks whether the remote desktop connections are enabled on the remote machine. Then, you enter the credentials and, after their validation, you can access the remote machine.
To connect to a remote machine, do the following:
As a result, you are connected to the remote machine and can manage it.
Employees who are working from home may need access to their office computers, but it is possible that your organization may not have a configured VPN or other tools for remote connection. Cyber Protect provides you with the capability to share an RDP link with your users, thus providing them with remote access to their machines.
To enable the sharing remote connection functionality
As a result, when you select a device in Cyber Protect web console, a new option Share remote connection will appear.
To share a remote connection with your users
After getting the link, you can share it via email or other means of communication. The user with whom the link was shared, must click it and then select the connection type:
Remote wipe allows a Cyber Protect service administrator and a machine owner to delete the data on a managed machine – for example, if it gets lost or stolen. Thus, any unauthorized access to sensitive information will be prevented.
Remote wipe is only available for machines running Windows 10. To receive the wipe command, the machine must be turned on and connected to the Internet.
To wipe data from a machine
Troubleshooting
Operating Systems: Windows , Linux
Last update: Sep 07, 2022
In general, performance is constantly being optimized, so updating to the latest build is always recommended for the best performance of backup and other operations.
First of all, please check out the general system requirements, described in your product documentation, to make sure that the hardware usage in your particular scenario is actually outside the normal operating parameters of our product.
To investigate the issue with CAL Support, please collect the following diagnostic information:
In this case, both Windows defender and CAL real-time protection are enabled. It is not possible to run two antiviruses in one machine as they will conflict with each other.
Solution: if you want to use CAL Defense in full capacity, disable Windows Defender antivirus in the protection plan for that device.
In this case – A third-party antivirus is running on the machine(e.g. – Kaspersky antivirus) and both CAL real-time protection and Windows Defender antivirus are enabled in the protection plan. It is not possible to use multiple security products in one machine.
Solution 1: If you want to use third-party antivirus (e.g. Kaspersky) then please disable CAL Defense real-time protection, URL filtering and Windows Defender antivirus in the protection plan.
Solution 2: If you want to use CAL Defense real-time protection then you need to uninstall third-party antivirus from the system and disable Windows Defender antivirus from the device protection plan.
What this means: CAL Defense real-time protection is enabled in the protection plan and a third-party antivirus is installed on the machine.
Solution 1: If you want to use CAL Defense real-time protection then uninstall third-party antivirus on the machine.
Solution 2: If you want to use the third-party antivirus, disable CAL Defense real-time protection, URL filtering and Windows defender antivirus in the protection plan.
It is not necessary to completely disable antivirus and antimalware protection module in machine’s protection plan: disabling CAL Defense real-time protection is enough.
You have an antivirus or a different security solution in place and you want to install CAL Defense
OR
After CAL Defense is installed on a machine with a different security solution in place, the machine displays significant performance degradation, such as programs not running or running slowly, unexpected reboots, slow booting, etc
Two or more antivirus solutions are active on the same machine.
If more than one such program is running, there are a number of ways in which they can interfere with each other:
CAL Defense integrates with Windows Security Center to monitor the status of Real-time protection, the relevance of Protection updates, and product license status. If a different antivirus is set in Windows Security Center as Virus & Threat protection then the real-time protection module of CAL Defense will be deactivated automatically. That ensures that we will not initiate any conflict between two simultaneously running antivirus solutions. To eliminate any possibility of that conflict from the other antivirus part, we recommend that you leave only CAL Defense and uninstall the third-party antivirus.
In case the other antivirus solution is not detected by Windows Security Center, then CAL Defense and the other antivirus will conflict over resources. In this case, we recommend to deactivate either CAL Defense real-time protection module or deactivate/uninstall the other antivirus solution.
On Windows 7, Windows Security Center may incorrectly report the information about third-party antivirus software. If you use Windows 7, please manually deactivate real-time protection either in CAL Defense or in the other security solution, to avoid conflicts.
To deactivate antimalware protection in CAL Defense, go to Protection section, and click Turn off protection, then select for how long the protection should be disabled:
On Windows 8 and newer, web filtering can be used independently of installed third-party anti-malware solutions.
Aerospace & Defense Company
Important
Our Industry
Government
National Security
Aerospace
Defense
Healthcare
Information Technology
Financial Services
Maritime
© Copyright 2022 . All Rights Reserved. Cyber Aeronautycs Ltd .
Registered in Bangladesh . Company Registration Number C-172611