# How to Configure

As we saw in the previous steps, we have made some configuration decisions already such as networking and container and queue sizing. The remaining configuration revolves around enabling scanning on your preferred buckets. We've made this simple for you. Now that we have subscribed to and deployed, let's jump into the Console to start scanning your buckets.

{% hint style="info" %}
&#x20;It may take a few minutes for DNS to propagate the URL of your management console. If you are unable to load the URL provided in the email/CloudFormation Outputs then wait a few minutes. If it continues to be an issue, check the [console access troubleshooting](https://help.cloudstoragesec.com/trouble-shooting/i-cannot-access-the-management-console) to see if it is another issue or [Contact Us](https://help.cloudstoragesec.com/contact-us).

The email with the login credentials arrives in your inbox even before the CloudFormation deployment completes. Please wait until you see the stack creation process complete to access the console.
{% endhint %}

## Step 1 - Launch and sign into the Management Console

Open your browser of choice (Chrome, Firefox, Edge, Safari, etc.) and navigate to the `access URL` you retrieved in the [Steps to Deploy section](https://help.cloudstoragesec.com/getting-started/how-to-deploy/steps-to-deploy). You will be taken to the Console Login page as seen below.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FuAzDWB2hQymAeFK8muzd%2FScreenshot%202023-09-13%20at%2023.30.44.png?alt=media&#x26;token=2ca1e6d9-3670-4c50-80fe-49e815e4563b" alt=""><figcaption><p>Management Console Sign In</p></figcaption></figure>

During deployment, you were sent an email with information on how to sign in to the console. This email contains the current `access URL` as well. You can simply click that to launch the console.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FotApeCLAtkUHrn4xHhYH%2Fimage.png?alt=media&#x26;token=87d0ddfb-645e-45df-a70a-cb292b0ec4d3" alt=""><figcaption><p>Invite Email</p></figcaption></figure>

Each additional user created through the console will also receive a similar email.

### Sign into the Management Console

As seen above, an email is sent to you to provide your `User Name` and `Temporary Password`. Place the username and temporary password into the appropriate fields and click `Log in`.

The first thing you must do is replace the temporary password by creating a new password for your user.&#x20;

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FcopqbASjIP6ueKncTa00%2FScreenshot%202023-09-13%20at%2023.32.17.png?alt=media&#x26;token=a145cc5e-9d3a-495b-ae02-22d3800ba127" alt=""><figcaption><p>Change Password</p></figcaption></figure>

Clicking `Change Password` will save your new password and pass you through to the console dashboard.

{% tabs %}
{% tab title="Antivirus for Amazon S3" %}

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FkAgsXZxM5qJf6FIm1lS6%2FScreenshot%202023-09-13%20at%2023.33.22.png?alt=media&#x26;token=837b157b-5d2b-402c-854e-5113ff15ad42" alt=""><figcaption><p>Antivirus for Amazon S3 Console Dashboard</p></figcaption></figure>
{% endtab %}

{% tab title="Data Classification for Amazon S3" %}

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FzTbTtmadvrmO1zTKPjnv%2Fimage.png?alt=media&#x26;token=b8cc5e08-24ea-4254-910b-e78bf70c7d32" alt=""><figcaption><p>Data Classification for Amazon S3 Console Dashboard</p></figcaption></figure>
{% endtab %}
{% endtabs %}

We'll get into [greater details](https://help.cloudstoragesec.com/console-overview/console-overview) about what you see here, but for now just know this is the overall status view into your environment.

{% hint style="info" %}
You can leverage SSO with our solution. Check out the [SSO FAQ](https://help.cloudstoragesec.com/faq/architecture-related#can-i-leverage-single-sign-on-sso-with-your-product) which discusses it.

You must have at least one internal user setup and usable to enable the SSO users (one time) within the console.
{% endhint %}

### Step 2 - Enable Scanning and/or Classification <a href="#step-2-enable-bucket-scanning" id="step-2-enable-bucket-scanning"></a>

Once you've signed in for the first time after deploying either of our products you'll notice the top information banner indicating the following:

{% tabs %}
{% tab title="Antivirus for Amazon S3" %}

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FOW5NF3Pcc6Ju8rfiiCV0%2Fimage.png?alt=media&#x26;token=93c0b8c8-4cda-40ec-b5e8-6900fb073094" alt=""><figcaption></figcaption></figure>

The information banner has 5 steps to get you started. All 5 steps have links to useful spots in the documentation to quickly get you started. The second will also direct you to the `Bucket Protection` page under Configuration where you will be able to enable your first bucket for scanning. Click the `Switch to the Protected Buckets page` link to enable your first Amazon S3 Bucket.

You could also have selected `Bucket Protection` from the left navigation.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FtSMe5sFPgywX8fWx5OAT%2FScreenshot%202023-09-13%20at%2023.38.57.png?alt=media&#x26;token=1294a6a1-adbc-474e-9ded-2f11b41cd0e3" alt=""><figcaption></figcaption></figure>

Displayed to you are all of the buckets within your AWS account. It is quite easy to enable scanning for a bucket, simply select one or multiple checkboxes (or leverage `Select Visible` to select all currently shown) for the buckets you wish to protect and select `Turn On Selected` from the `Actions` drop-down button at the top of the bucket list. To get started pick a bucket in the same region as your console and turn it on. This will enabled the bucket for new object, event-based scanning.

Info

There are 3 types of protection we will be getting into more detail as we go. But, those 3 types are: event-based (this is real-time protection), schedule-based (protection on a schedule) and on-demand protection. As stated above, you enabled the event-based real-time protection with what you just did above.

You will also be prompted to scan the existing objects in the bucket(s). You have the choice to skip this by clicking the `Don't Scan` button or follow the instructions to select some or all of the buckets you had turned on to scan the existing objects as well.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FpgbHQpTFp49zOIneEDUx%2FScreenshot%202023-09-13%20at%2023.46.24.png?alt=media&#x26;token=b134473c-e622-4706-902b-a7be2c730f44" alt=""><figcaption></figcaption></figure>

**That's it!**\
Once you are to this point, you should see a green shield (![green shield](https://help.cloudstoragesec.com/img/green-shield.png)) in the row for any bucket you "turned on" above.

[More details](https://help.cloudstoragesec.com/console-overview/protection/aws/protected-buckets#scan-existing-objects) about scanning existing objects will be covered.

{% hint style="info" %}
Clicking `Don't Scan` will not turn off event based scanning for those buckets you turned on. It will only skip the scanning of existing objects.

Enabling a bucket(s) will automatically deploy the Agent Scanner in the region the bucket is located. If you selected buckets from multiple regions, you will get an Agent Scanner in each.

Notice the `Account` identifier shows as `Primary`. This represents the default account you deployed the solution in. If you [link accounts](https://help.cloudstoragesec.com/console-overview/access-management/linked-accounts) for cross-account scanning, you will see a different identifier for those buckets that come from other accounts.
{% endhint %}

{% hint style="warning" %}
You may see rows with a yellow, red or purple background color (you should not see purple on your initial installation) to them. Yellow and red colors (as seen above) indicate there could be a conflict with activating event-based scanning for those particular buckets and you **may** have to take additional steps to enable scanning.

For information on how to resolve conflicted buckets, please read the [Trouble Shooting](https://help.cloudstoragesec.com/trouble-shooting/conflicted-buckets) section.

"Conflicted" buckets have no barrier for scan existing object scans. Since `scan existing` crawls the objects (read more [here](https://help.cloudstoragesec.com/how-it-works/object-scanning#retro-scanning)) and is not triggered by events, there are absolutely no conflicts. Scan existing away!
{% endhint %}

## Which Resources do I Protect? <a href="#which-buckets-do-i-enable" id="which-buckets-do-i-enable"></a>

Protect them all! As simple as that sounds, you can decide which resources you do and don't want to protect. All resources with any public aspects to them should be scanned. Any resources you share with others (public or not) should generally be scanned as you want to ensure what is shared is clean. No matter whether you choose to enable all or a subset it is easy and you can feel comfortable your files will be clean. Resources that may be written by trusted programs like CloudTrail may not need to be scanned, but can be if regulations require you to.

## Enabling Buckets in Other Regions <a href="#enabling-buckets-in-other-regions" id="enabling-buckets-in-other-regions"></a>

This solution is designed to scan all of your buckets, whether in one or multiple regions. If you select buckets in regions other than the console **for the first time**, you will be prompted to select a VPC and Subnet(s) for that region. Because we'll be deploying the Agent Scanner container to that region you must identify the networking for it to run on.

Selecting a bucket in a different region prompts you as follows:

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FA35lpcjbQuXhJzQa9NBq%2Fimage.png?alt=media&#x26;token=50b45ddc-43ca-4d41-8946-1abd1a81e958" alt=""><figcaption></figcaption></figure>

Select the VPC and Subnet(s). You will be presented with VPC and Subnet selections for each new region you are enabling buckets in. Click `Save and Close`.
{% endtab %}

{% tab title="Data Classification for Amazon S3" %}

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2F0bZ4wucnXiS0TNFjJtHD%2Fimage.png?alt=media&#x26;token=15074211-f4d9-46f0-b8af-1f78eecef70c" alt=""><figcaption></figcaption></figure>

The information banner has 5 steps to get you started. All 5 steps have links to useful spots in the documentation to quickly get you started. The second will also direct you to the `Schedules` where you will be able to create and execute your first schedule for classification scanning.

You could also have selected `Schedules` from the left navigation.

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FceM6UKXKbfGWBBLn9JEp%2FScreenshot%202023-09-14%20at%2000.05.06.png?alt=media&#x26;token=ada0f304-c420-4afc-b94e-aa2bd67dfa75" alt=""><figcaption><p>Schedules Page</p></figcaption></figure>

Initially displayed to you is the blank Schedules page as none are created by default. It is quite easy to create a schedule, simply click the `Create Schedule` button and follow the wizard. Creating a schedule includes three tasks: select which buckets to scan, the rules to check against and the timing to run. For this first schedule, pick buckets within the same region of the deployment.

## Creating a Classification Schedule

### Step 1: Select Buckets

![Create Schedule step 1](https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FVQtWfXtVO4B4nlQrGvJe%2FScreenshot%202023-09-14%20at%2000.03.37.png?alt=media\&token=587d05c2-ebb3-4dd9-8b0d-33ab1fef399f)

### Step 2: Select Rules

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FsQN13W48zjiCcGXiktjw%2FScreenshot%202023-09-14%20at%2000.03.53.png?alt=media&#x26;token=bd89a158-37b2-4fb8-8115-05d0a5d25cd0" alt=""><figcaption></figcaption></figure>

### Step 3: Select Run Time

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FOxM6kKSOZeFJ8pUI9VHk%2FScreenshot%202023-09-14%20at%2000.04.11.png?alt=media&#x26;token=ccdc69f5-a3c7-46cd-a362-b3bed0cc28cb" alt=""><figcaption></figcaption></figure>

### Step 4: Activate Schedule

To complete the process you must activate the schedule:&#x20;

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2F9YARZdU6ZjClXuHMDx9b%2Fdc.gif?alt=media&#x26;token=7af88db7-08db-449d-988d-efe18f5021ae" alt=""><figcaption></figcaption></figure>

You can choose to execute the first pass of the schedule now if desired.&#x20;

<figure><img src="https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FyQNrZsxMyskipdP8cJOl%2Fscannow.gif?alt=media&#x26;token=c33c8d3d-8967-4cbb-8d08-82368ef3a962" alt=""><figcaption></figcaption></figure>

We'll get into more details regarding creating and managing schedules on the [Scheduled Scans page](https://help.cloudstoragesec.com/console-overview/scheduled-scans)

**That's it!**

## Which Resources should I Classify? <a href="#which-buckets-should-i-scan" id="which-buckets-should-i-scan"></a>

Claissfy them all for sensitive data! As simple as that sounds, you can decide which resources you do and don't want to classify. You may already know which resources are leveraged in your workflows that could ingest sensitive data. You may be unaware of how and where that data has moved as individuals are processing it. All buckets with any public aspects to them should be scanned to ensure you are not leaking sensitive data. Any buckets you share with others (public or not) should generally be scanned as you want to ensure what is shared is clean and safe to share. No matter whether you choose to enable all or a subset it is easy and you can feel comfortable your files will be identified. Buckets that may be written by trusted programs like CloudTrail may not need to be scanned, but can be if regulations require you to.

## Classifying Resources in Other Regions <a href="#scanning-buckets-in-other-regions" id="scanning-buckets-in-other-regions"></a>

This solution is designed to scan all of your buckets, whether in one or multiple regions. If you select buckets in regions other than the console **for the first time**, you will be prompted to select a VPC and Subnet(s) for that region. Because we'll be deploying the Classification Scanner container close to the data in that region you must identify the networking for it to run on.

Selecting a bucket in a different region prompts you as follows:

![Select VPC and Subnets](https://905555942-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/spaces%2FlGcQw8I2CHyi1loKBlfi%2Fuploads%2FXrMinBkEKTxPkaLxqNXx%2Fspaces_lGcQw8I2CHyi1loKBlfi_uploads_A35lpcjbQuXhJzQa9NBq_image.webp?alt=media\&token=0b60a90d-af47-499f-ab48-619e6474a677)

Select the VPC and Subnet(s). You will be presented with VPC and Subnet selections for each new region you are enabling buckets in. Click `Save and Close`.
{% endtab %}
{% endtabs %}

{% hint style="danger" %}
The VPC and Subnets you choose must have an outbound path to reach Amazon ECR. If not, the agents will [never boot properly](https://help.cloudstoragesec.com/trouble-shooting/my-scanning-agents-keep-starting-up-and-immediately-shutting-down). As discussed in the troubleshooting topic, you can do with outbound access to the internet or through VPC Endpoints that give you access to ECR and API.

We now show `Public` / `Private` next to each VPC to indicate whether or not the VPC is tied to an Internet Gateway and therefor likely to have an outbound path. We also show `Public` / `Restricted` next to each Subnet to indicate whether each Subnet appears to have outbound routing.

Some regions only support Fargate in some of the Availability Zones. Regions ap-south-1 and ca-central-1 have limited AZs. If you get a message saying the container task cannot start up due to capacity or a Fargate instance isn't available, that could indicate you have found another AZ not supported. Switch which AZ the Fargate Service is pointing at and you should be fixed.

You can get more information at this [AWS Fargate](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/AWS_Fargate.html) page. \* You'll notice ap-south-1 is called out, but ca-central-1 is not although we found the same issue in both regions.
{% endhint %}

## Enable API Scanning for Antivirus for Amazon S3 (optional)

API-based scanning is an alternative option where you can leverage an API to perform file scanning. It is not directly S3-integrated as **Step 2** provides, but API scanning is very useful in many workflows where you want the file scanned before it is written to is destination.

Read more about [API Based Scanning](https://help.cloudstoragesec.com/how-it-works/object-scanning#api-driven-scanning).


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://help.cloudstoragesec.com/getting-started/initial-config.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
