Skip to content

Step-by-Step Instructions for Initial Setup

Initial Setup

Get Invited

  1. An administrator from your organization will send you an invitation to join RADAR.

  2. Check your email inbox for the invitation email. Make sure to check your spam or junk folder if you do not see it in your inbox.

Set Up Your Account

  1. Find the email in your inbox

  2. Click the invite link in the email to create your account.

  3. Create a password for your RADAR account.

Sign In to RADAR

  1. Open your web browser and navigate to the RADAR login page.

  2. Enter your username and password in the respective fields.

  3. Click the "Sign In" button to proceed.

Multi-Factor Authentication (MFA) Enrollment

Upon your first sign-in, you will be prompted to enroll in Multi-Factor Authentication (MFA). This is a mandatory security step to ensure enhanced protection for your account.

  1. Follow the on-screen instructions to set up MFA.

  2. Use an authentication app (e.g., Google Authenticator, Authy) to complete enrollment.

  3. After setting up MFA, you'll be required to authenticate with a second factor each time you log in.

Configure Your Profile

  • Navigate to the "Settings" section in the main menu.

  • Click on "Profile" and update your profile information.

  • Save your changes.

Define Threat Discovery* Configuration (Optional)

  • Go to the "Threat Discovery" section.

  • Click on "Configuration."

  • Enter the domains and IP addresses you want to monitor.

  • Save your settings to start monitoring these assets.

*Threat Discovery is an optional paid feature.

Request a Pen Test

  • Navigate to the "Penetration Tests" section.

  • Click on "Request a New Pentest."

  • Fill in the required fields with the general information about your pen test.

  • Select the penetration test type and provide scope details.

  • Review your request and click "Submit."

  • Await the proposal from a RADAR pen tester and review it. Once accepted, the penetration test will commence.

Continuously Monitor Threats

  • Go to the "Threat Discovery" section.

  • Use the "Dark Web Scan" and "Domain Squatting" features to view initial threats.

  • Regularly check the "Threat Feed" for continuous updates on potential threats.

By following these steps, you will have successfully set up RADAR and configured it to begin protecting your organization’s assets.

For additional support or to access detailed documentation, visit radarsecurity.ai/support.