How to fix Failing CyberSmart Active Protect Security Controls

How to fix Failing CyberSmart Active Protect Security Controls

There are four easy-to-follow steps to correct failing security control checks in Active Protect.

  1.  Open CyberSmart Active Protect on your device

    For macOS devices, click on the CyberSmart Icon in the menu  



    For Windows, click on the system tray on the bottom right and click on CyberSmart Icon. 



  2. Check if the device passes all security checks.




  3. If any have failed, click on them and expand - an extra window will appear outlining why they are essential to information security. 

  4. Follow the manual steps to enable the security feature in the underlying operating system - it may need Administrator credentials to make the change. 



    • Related Articles

    • Checking User Device Status - CyberSmart Active Protect

      Ensure that every device in your organisation is secure is essential for peace of mind. CyberSmart Device Status checks the security of every user in your business, giving you the peace of mind that they are secure from cyber-attacks. The purpose of ...
    • CyberSmart Active Protect Installation Methods

      There are several ways to deploy Cybersmart Active Protect. Still, individual enrollment is preferred for businesses not using Microsoft Group Policy Objects or other Mobile device Management (MDM) or Remote Monitoring and Management (RMM) ...
    • Increasing Wireless Security with WPA3

      As wireless speeds approach those of wired connections, businesses are increasingly opting for the convenience of wireless networks and hybrid connections. Consequently, wireless security is more critical than ever. The ability to turn on a device, ...
    • What are GravityZone Bitdefender Security tools

      GravityZone provides Windows, Linux, and macOS physical and virtual machine protection with Bitdefender Endpoint Security Tools. On Windows and Linux, the security agent provides a flexible scanning system, making it ideal for mixed environments ...
    • Enhancing Router remote access security with 2FA authentication.

      Enhance Router remote access security with 2FA authentication. This article explains the process for setting up an additional two-factor authentication (2FA) security for logging in remotely to the router's WAN interface. Once implemented, gaining ...