Menu

User authentication to Appterix Agent

For security-relevant activities in the Appterix Agent, such as "on behalf of" enrollment, a second authentication via the EMPlatform is required in addition to the Windows login. Prerequisite: The user must be active in the EMPlatform and have at least the "User" role. Users can be created manually or retrieved from the existing Active Directory and EntraID […]

Setting up the EntraID connector

Adding a new connector: In the administration panel, click Settings > Integrations in the left-hand menu. Preparations in Azure AD / Entra ID: This article describes the necessary steps to configure Microsoft Entra ID, including registering the application and assigning the required API permissions. To configure Microsoft Entra ID […]

Automated PKI certificate renewal for YubiKey PIV

Challenge: Because certificates have a limited validity period, they must be renewed before expiration to maintain their trusted status and prevent authentication interruptions. Solution: Appterix offers the ability to automatically renew PKI certificates before they expire. Administrators define how many days should pass before renewal begins. Users receive a pop-up notification as soon as certificates are about to expire.

Installing the Appterix Agent

The Appterix client components are available under Downloads. This client includes all the features of YubiKey Lifecycle Management, Zero Trust Application Access, Zero Trust Storage Access, Password Manager, encryption, and Windows Privacy Policies. The agent installation files are available for Windows, Linux, and Android. Download the Appterix Agent for Windows. The Windows installation file contains login credentials for establishing a […]

Appterix licenses: allocation, trial version and FAQs

Appterix offers a modular SaaS/MSP/on-premise solution for IT security measures. Proper license management enables optimal use of the Appterix modules. How Appterix licenses are assigned: A user needs a valid license to use the respective Appterix modules. By assigning a license, the user gains access to the corresponding module. Once a valid license file has been uploaded […]

Reporting: All reports in one place

In the Reports section, you can view and analyze relevant data. This data is presented in tabular form. Reports can provide valuable insights, for example, into the assignment of YubiKeys and removable media, as well as other relevant areas. The following reports are available: Viewing Reports How to view a report

Automatic PKI certificate renewal: Simple and secure

Challenge: Since certificates have a limited validity period, they must be renewed before expiration to maintain their trusted status and prevent authentication interruptions. Our solution, Appterix, offers the ability to automatically renew PKI certificates before they expire. Administrators define the number of days after which renewal should begin. Users receive a pop-up notification as soon as certificates are about to expire.

Full control over YubiKeys with tags and status

Challenge: Managing a large number of YubiKeys can be complex. Administrators need to know not only which YubiKeys are in use, but also their status, condition, and activity history. Our Solution: We simplify YubiKey management and provide complete visibility and control over each device through YubiKey status, YubiKey tags, and YubiKey event tags. YubiKey Status: The status is used to […]

Managing fingerprints (FIDO2) on YubiKey BIO

In this Appterix tutorial, we'll show you how to manage the fingerprint function of the YubiKey 5 Series BIO! The YubiKey BIO uses fingerprint authentication for strong, passwordless authentication via FIDO2. To use this feature effectively, it's important to know how to securely add fingerprints and delete them when needed. https://youtu.be/e-GCPSImmLQ?si=uS43H7cTtdNZBtjP Further information: https://appterix.eu https://egomind.eu

Enrollment for additional FIDO2 users and PIV certificates

Learn how to optimally expand the security features of your YubiKey in this video tutorial! We show you step-by-step how to create a second PIV certificate and a second FIDO2 user for EntraID on the same physical YubiKey using the Appterix extension. https://youtu.be/eCktlLpUUwc?si=ZlYjFSR1E1mb9feN Further information: https://help.appterix.eu https://appterix.eu https://egomind.eu

Allow user-assigned USB drives

This tutorial shows you step-by-step how to implement USB drive sharing via automated inventory and user assignment. Learn how to grant access to your company systems only to authorized devices while ensuring complete logging. https://youtu.be/RlczFvq24n8 This tutorial is ideal for IT administrators, security officers, and anyone who needs a robust and automated […]

Registering YubiKeys in EntraID via Enrollment

The challenge: Companies must find secure and user-friendly solutions to effectively protect all employees. Without modern authentication methods, the effort required for IT security increases, as does the vulnerability to phishing attacks. Our solution: By registering YubiKeys with Microsoft Entra ID via enrollment, YubiKeys are automatically registered for all desired users—for secure, user-friendly, and phishing-resistant authentication.

Central management of YubiKeys with Enrollment

Challenge: Individually setting up YubiKeys for all users can be time-consuming and burdensome for IT. Solution: Appterix offers the option of centrally preparing YubiKey configurations. With YubiKey Enrollment, YubiKeys can be set up either by users themselves or by administrators on their behalf. This accelerates the entire process, […]

Always up to date with automatic notifications

With automatic notifications, you can specifically define who is informed and about which events. Appterix offers the option to send email notifications about the following events: Application blocked: A notification is sent if an application is not found in the global allowlist or has been blocked due to the multi-factor authentication (MFA) policy. New YubiKey used: A notification is sent […]

Connecting YubiKey Card Authentication (CCID) to MS AD Certificate Services (AD CS)

Appterix simplifies the creation and deployment of SmartCard authentication certificates. Administrators can easily enable users, via enrollment policy, to create their own certificates from their MS Active Directory Certificate Services and store them on YubiKeys, for example, for Windows authentication. The Certificate-Based Authentication (ZBA) enrollment step allows you to use a PKI certificate from […]

Appterix License Management

Appterix offers a modular SaaS/MSP/on-premise solution for IT security measures, including Zero Trust Application Access, Zero Trust Storage Access, Encryption Containers, Password Manager, YubiKey Lifecycle Management, and Windows Privacy Policies. Your license file allows you to activate the respective Appterix modules for the purchased number of user licenses and time period. This […]

Enrollment of OTP for YubiKey

Do you want to set up your YubiKeys for the Yubico OTP function? This video shows you the process within the Appterix YubiKey LifeCycle Management system. It guides you step-by-step through the enrollment process to ensure secure authentication. What is Yubico OTP? Yubico OTP (One-Time Password) is a secure method for two-factor authentication (2FA). It generates a […]

YubiKey Enrollment “on behalf of”

Managing YubiKeys made easy! With Appterix YubiKey Lifecycle Management, users can easily set up their keys themselves (self-enrollment) or administrators can handle the setup for them (on-behalf enrollment). All common standards are supported, including PIV, FIDO2, Windows login, and more. The "Start Enrollment on Behalf" function of YubiKey Enrollment in Appterix can be found in the respective enrollment settings […]

Self-Enrollment & On-Behalf-Of-Enrollment for YubiKey – Appterix YubiKey LifeCycle Management

With Appterix YubiKey LifeCycle Management, YubiKeys can be easily configured through user enrollment (self-enrollment) or authorized administrator enrollment (on-behalf-enrollment) for PIV (SmartCard), FIDO2, Windows authentication, EntraID registration, OTP, HOTP, Yubico OTP, etc. This Appterix tutorial shows how to manage and use the system: https://youtu.be/24IbiEUz9jI Further information: Appterix – […]

Automated enrollment of YubiKeys

Appterix's YubiKey LifeCycle Management greatly simplifies the administration and setup of YubiKeys. Thanks to automated enrollment, users receive a pop-up notification as soon as they plug in a YubiKey, allowing them to directly enroll the YubiKey. This video tutorial from Appterix shows how this works and how it can be managed:

Error message “PIV not available”

When enrolling with PIV reset or certificate-based authentication, ensure that at least the CCID and PIV functions of the USB and NFC applications are enabled first. Otherwise, you may encounter the error message "PIV not available" during enrollment. If the error message persists, install the latest YubiKey minidrivers on your clients. [… ]

Correct specification of the AD CS – CA name

Appterix offers the option to connect your AD CS for certificate enrollment on YubiKeys. Instructions for installing the AD CS connection can be found here: AD CS Connection - Specifying the CA Name. If you are only using one CA, you do not need to enter a CA name. To enter the CA name in the corresponding fields […]

PIN/PUK user query for YubiKey Enrollment

https://youtu.be/r11YTDN1SlM?feature=shared In diesem Video Tutorial erfahren Sie, wie Sie in Appterix YubiKey Management die Verwaltung von PIN bzw. PUK Eingaben während dem Enrollment der YubiKeys für PIV und FIDO2 vornehmen können. Weitere Informationen zum YubiKey Lifecycle Management von Appterix unter: Appterix Website: https://appterix.eu EgoMind Website: https://egomind.eu Appterix Help Center: https://help.appterix.eu

Inventory of applications in ZTAA

https://youtu.be/b_COp8nhNfc?feature=sharedIn diesem Video Tutorial erfahren Sie, wie Sie in Appterix Zero Trust Application Access die Inventarisierung von auf verwalteten Arbeitsplätzen ausgeführten Anwendungen vornehmen. Ebenfalls wird gezeigt, wie die Informationen von Herstellerzertifikaten einfach ausgewertet und für das Allow Listing verwendet werden. Weitere Informationen zu Appterix Zero Trust Application Access unter Appterix Website: https://appterix.eu EgoMind Website: https://egomind.eu […]

Managing passwords in Appterix Password Manager (Beta Version)

https://youtu.be/UZdm9frX7rI?feature=sharedIn diesem Video Tutorial erfahren Sie, wie Sie in Appterix Ihre Passwörter generieren und sicher ablegen können. Ob Zugangsdaten, Kreditkarteninformationen oder sicherheitsrelevante Schlüssel – alles ist an einem Ort sicher verschlüsselt gespeichert. Verwalten Sie sensible Daten sicher, komfortabel und getrennt – privat wie geschäftlich. Weitere Informationen zu Appterix Zero Trust Application Access unter Appterix Website: […]

Managing Zero Trust Storage Access

https://youtu.be/Brp8dpmsc3I?feature=shared In diesem Video Tutorial erfahren Sie, wie Sie in Appterix Zero Trust Storage Access die Verwaltung von Zugriffsrechten auf USB-Datenträger vornehmen können. Ebenfalls wird gezeigt, wie die Informationen von USB-Speichermedien einfach ausgewertet und für das Allow Listing nach Hersteller, Modell oder Gerät verwendet werden. Weitere Informationen zu Appterix Zero Trust Storage Access unter Appterix […]

Master password complexity

The master password protects the password manager from unauthorized access. In Appterix, you can configure the master password complexity under Settings in the Password Manager tab. The following options are available:

Which access rights have higher priority?

Access Settings: The highest priority for access rights is assigned to groups or users in the user management. If you have set access rights in Removable Storage at the group level, you can inherit these rights from all members (users or other groups). Inheritance can be enabled and disabled for individual objects. The inheritance priority depends on […]

Approval list by unique devices

In addition to the option of allowing specific models or manufacturers of USB storage devices via Allow Listing, Appterix Zero Trust Storage Access allows you to permit individual devices connected to USB removable media. To use the allow lists, please first activate the Allow List option in the user management settings under Users or Groups. Further information on user management […]

Approval list by model

In addition to the option of allowing individual USB drives or manufacturers via Allow Listing, Appterix Zero Trust Storage Access allows you to allow specific models of USB removable media. To use the allow lists, please first activate the Allow List option in User Management under Users or Groups. Further information on user management can be found […]

Approval list by manufacturer

In addition to the option of allowing individual USB drives or model series via Allow Listing, Appterix Zero Trust Storage Access allows you to allow USB removable media manufacturers. To use the allow lists, please first activate the Allow List option in User Management under Users or Groups. Further information on user management can be found […]

Software License Agreement (EULA)

You can read, print, copy, and accept the Software License Agreement (EULA) when you first register with a new organization in Appterix. If you haven't saved the agreement, you can find the current version of the EULA here as a PDF file: EULA-EgoMind-April-2025.pdf

Filter from user import

Filter Active Directory User Import: User import from Active Directory can be restricted by the starting OU. In the Entry DN field, specify the Distinguished Name (DN) of directory entries from which data should be synchronized. Add a new line for each DN. Valid entry types: Domain, Domain DNS, Organizational Unit, Container. Filter Entra ID User Import: During the import […]

Deactivate YubiKey from Appterix Management

If you no longer wish to manage a YubiKey, you can deactivate it in Appterix. This will remove the device from the dashboard and inventory. Furthermore, you can also block deactivated YubiKeys from being used on the client. This tutorial shows you how to deactivate and block YubiKeys.

Using Container Encryption

Appterix container encryption offers the following advantages: Depending on the scenario, you can store the encrypted container locally for your own use, on a network share, USB drive, or cloud storage to securely share data with others. The encryption is very efficient and can therefore also be used on devices with less processing power. This tutorial shows you how […]

ZTAA: Approval list of products

Appterix offers the option to allow application launches only if the applications have been approved based on manufacturer, product, or file information in the Zero Trust Application Access allowlists. This tutorial shows you how to authorize application launches based on product information.

User administration

This tutorial shows you how to manage users in Appterix. Learn how to centrally configure data protection settings, product activations, and basic settings for Zero Trust Storage Access, Zero Trust Application Access, and YubiKey Management for users and groups. Further information is available at https://appterix.eu and https://help.appterix.eu

Slot selection for certificate enrollment

Appterix offers the option of setting up certificate-based authentication in the enrollment area. This automates the process of creating certificates in the Active Directory Certificate Authority (AD DC). The certificates are then stored directly on the YubiKey. You can select the appropriate YubiKey slot for this. Please note […]

Privacy Protection for Windows CoPilot

Appterix Privacy Protection policies allow you to disable Windows Copilot and the AI ​​tool Recall. Enabling the "Disable Windows Copilot" policy setting prevents users from using Copilot, and the Copilot icon will not appear on the taskbar. Disabling this policy setting allows users to use Copilot if it is available to them. […]

Installation AD CS connection

To connect Appterix to the Microsoft PKI, it is sufficient to assign the AD CS role to the domain controller. During the installation of the EgoMind AD Sync Service, a certificate template for Windows SmartCard authentication (Appterix SmartCard Logon) is automatically created in AD CS. When using AD CS in the enrollment of the Appterix YubiKey […]

YubiKey Enrollment with AD CS connection

Appterix makes it easy to create and deploy SmartCard authentication certificates. Administrators can use an enrollment policy to easily allow users to create certificates from their MS Active Directory Certificate Services themselves, for example for Windows authentication, and store them on YubiKeys.

FIDO2 administration to Appterix Agent

Server-side enrollment allows users to change and reset their FIDO2 PIN. This functionality is also available to users via the Appterix Agent. To access it, users open the Appterix Agent using the Appterix tray icon (located in the Windows system tray next to the clock) and open the YubiKey section. Then, they select […]

Allow all trusted certificates (Local Computer)

When you allow applications via the Allow Listing using vendor certificates, you have the option to allow all trusted certificates (local computer) from a vendor or specific vendor certificates. This option can be found under Global Allow List in the Vendors section when you select one of the listed vendors. When this option is active, the Vendor Certificates selection disappears, as this […]

Unlocking YubiKey's

If the PIN has been locked due to multiple incorrect entries, it can be unlocked using the PIV reset function via enrollment. Further information on enrollment can be found here: https://appterix.eu/help/erstellen-eines-yubikey-enrollment/ The user can then assign a new PIN via the agent. (https://appterix.eu/help/yubikey-pin-puk-und-management-key-aendern/) If the entire YubiKey has been locked (tag "Locked in Management"), the lock can be removed under […]

Manage access to removable storages

Appterix allows you to manage access rights to external storage devices. This setting can be configured for users and groups. To manage access rights, open the Users or Groups navigation item in the User Management section. Then open the Removable Storage Management tab and select the objects you want to manage. Here you can now configure the Removable Storage […]

ZTAA: AllowListing with MFA function

Applications with insufficient or no authentication can be further protected against unauthorized access using Appterix ZTAA with multi-factor authentication (MFA). Applications permitted via AllowListing can only be executed with this feature if a YubiKey assigned to the user in Appterix YubiKey Management is connected. This tutorial shows you how to combine MFA and ZTAA […]

Multi-factor authentication (YubiKey) for application launches

Applications with insufficient or no authentication can be further protected against unauthorized access using Appterix ZTAA with multi-factor authentication (MFA). Applications allowed via the Allow Listing can only be executed with this feature if a YubiKey assigned to the user in Appterix YubiKey Management is plugged in. You can find instructions on how to assign a YubiKey to a user here: […]

User Assignment of YubiKeys

Appterix offers the option to automatically or manually assign users to a YubiKey. Automatic YubiKey Assignment: You can activate automatic YubiKey assignment in the YubiKey Management tab of the Settings section. Here you have three options. For automatic YubiKey assignment, the Appterix Agent must be installed on the respective devices. During assignment […]

First steps in Appterix and EgoMind platform

In this video tutorial, we'll show you how to take the first steps after creating a user account on the EgoMind Platform and in Appterix. Within minutes, Zero Trust Application Access (ZTAA), Appterix YubiKey Management, encryption, and Windows Privacy Policies will be active. Chapters in the video: 00:00 Introduction 00:20 First login to the EgoMind Platform 01:00 User profile 01:54 Inviting […]

Contactless management of YubiKeys (NFC)

Appterix offers centralized management of YubiKeys – regardless of whether the YubiKey is connected via NFC (contactless) or USB. How? We'll show you in this Appterix video tutorial! https://youtu.be/WHiJplDUde4 Further information can be found on the Appterix website: https://appterix.eu, the EgoMind website: https://egomind.eu, and the Appterix Help Center: https://appterix.eu/help/appterix-tutorial-kontaktlose-verwaltungvon-yubikeys-nfc/

ZTAA: Enable logging of application starts

Appterix offers the option to log application launches in Application Access. These logs are visible in the journal and show which applications were allowed and blocked. However, such application launch logging can lead to a significant increase in data volume on the client, server, and database. Therefore, Appterix offers configuration options for data collection. How? This will be shown […]

data collection from applications

Appterix offers the option to log application launches in Application Access. These logs are visible in the journal and show which applications were allowed and blocked. However, such application launch logging can significantly increase the data volume on the client, server, and database. Therefore, Appterix offers data collection configuration options. Data collection options […]

Encryption with YubiKey certificates

To protect your data from unauthorized access, Appterix offers the option of storing sensitive information in an encrypted container. This file container can be encrypted using YubiKey certificates. Requirements for using a YubiKey for encryption: In order for a YubiKey to be used for encryption, one of the YubiKey slots 9a to 9e must be configured with an RSA […]

Encryption with YubiKey certificates

To protect your data from unauthorized access, Appterix offers the option of storing sensitive information in an encrypted container. This file container can be encrypted using YubiKey certificates. Requirements for using a YubiKey for encryption: In order for a YubiKey to be used for encryption, one of the YubiKey slots 9a to 9e must be configured with an RSA […]

Global Application Authorization List

Appterix offers the ability to centrally authorize application access for users based on vendor certificates or application files. Several options are available for this. Applicant access can be granted based on vendor certificates. This minimizes the administrative overhead of the Zero Trust Application Access (ZTAA) solution while preventing unauthorized applications from accessing the application.

YubiKey PIN, PUK and Management Key

Appterix offers the option to centrally define the PIN, PUK, and management key for your YubiKeys and personalize them using the Appterix Agent. This allows the IT department to configure the basic settings for the YubiKeys, which employees can then implement via enrollment on the Appterix Agent and subsequently assign their own PIN and PUK.

Change YubiKey PIN, PUK and Management Key

Appterix offers the option to centrally define the PIN, PUK, and management key for your YubiKeys and personalize them using the Appterix Agent. This allows the IT department to configure the basic settings for the YubiKeys, which employees can then implement via enrollment on the Appterix Agent, after which they can personally assign their own PIN and PUK. […]

Lock computer after removing YubiKey

Many YubiKey users want their computer to lock automatically when they remove the YubiKey. Appterix has made this a reality! How? We'll show you in this Appterix video tutorial or in the Appterix Help Center: https://appterix.eu/help/windows-nach-abziehen-von-yubikeys-sperren/ Further information: Appterix website: https://appterix.eu EgoMind website: https://egomind.eu Yubico website: https://yubico.com

Lock Windows after removing YubiKey's

Many YubiKey users want their computer to lock when they remove the YubiKey. Appterix has made this possible! Enable YubiKey Windows Lock for Groups: If you want to manage the lock function when YubiKeys are removed at the user group level (Microsoft Active Directory, Microsoft Azure EntraID, EgoMind Platform), go to User Management in the Appterix administration panel […]

YubiKey Enrollment

Appterix offers the option of centrally configuring YubiKeys. This feature can be found in the Appterix administration interface under YubiKey Management – ​​Enrollment. Once an enrollment configuration has been created and assigned to users or user groups, affected users can apply the enrollment to their respective YubiKeys via the Appterix Agent. How? You can see that […]

Limited Agent-Server Connection

If a connection between the Appterix Agent and the Appterix Server cannot be established, this can have various causes, which can, however, be resolved quickly. Faulty Installation: If a connection between the client component and the server is not possible immediately after installation, this may be due to the fact that the required MSI parameters were not entered during installation […]

Checking the agent-server connection

Checking the connection: To see if the connection between the client component (agent) and the server component was successfully established after installation, there are two ways to check: Connection indicator on the agent: The tray icon (in the system tray next to the clock) indicates whether the client is offline or in "standalone mode" by displaying a red dot next to […]

YubiKey Certificate Management

Certificates on YubiKeys: YubiKeys are small, portable hardware tokens that can be used for secure authentication. They have built-in storage where certificates can be stored. These certificates can be used for various purposes, such as: YubiKey certificate management in Appterix: Appterix offers a solution for managing certificates stored on YubiKeys. […]

Exchange YubiKey certificates

Certificates for authentication, signing, key management, and card authentication (CCID) can be stored on YubiKeys. Appterix provides a centralized way to manage YubiKey certificates. Appterix notifies you when a certificate is about to expire or has already expired. You can also view the fingerprints of the respective YubiKey certificates and, if needed, export the certificates to […]

YubiKey Lost & Found

The Lost & Found feature in Appterix helps you find lost or stolen YubiKeys. With this feature, you can report a YubiKey as lost. Once a YubiKey has been reported lost, a notification will appear in the Journal, Dashboard, Inventory, and on the Agent device if the lost YubiKey has been attached by a finder. Additionally, […]

Requirements for local installations

As a SaaS solution, Appterix offers the advantage that you don't have to worry about installation, updates, maintenance, reliability, etc. Furthermore, the SaaS solution provides the added value that your IT service providers can offer Appterix as a managed service. Should you opt for a local installation, you can find the relevant requirements for a local installation here […]

Interaction: EDR and ZTAA

Is ZTAA a useful security feature or merely an addition to an EDR solution? Zero Trust Application Access (ZTAA) aims to prevent the execution of unwanted applications. ZTAA can help prevent the spread of malware and other threats by restricting attackers' access to critical systems and data through […]

Try Appterix now!

Would you like to try Appterix? We'd be happy to offer you a free, no-obligation trial. During this time, you can test our product in your company and see for yourself that it meets your needs. You'll receive your own SaaS access for your company during the trial period. Upon purchasing a subscription, you'll have the option to choose between […]

Creating and managing encryption containers

Data is the gold of the future and the IT jewels of any company – therefore, it should be encrypted. This video shows you how to create encrypted containers in Appterix. Post-quantum encryption is also available if needed! Appterix container encryption offers the following advantages: Maximum security: We use AES256 or Kyber, two of the most secure encryption algorithms available. Efficiency: Our encryption is very […]

Installation of the client component – ​​Appterix Agent

This video shows you how to download and install the Appterix Agent. Appterix protects your IT assets and is the solution for increasing security, productivity, and cost optimization in your company's information technology and OT areas. The Appterix Agent takes over the protection of these IT assets on the client systems to be protected. Appterix offers you freedom of choice! Decide between […]

ZTAA: Inventory, Allow & Block Applications

Appterix Zero Trust Application Access (ZTAA) blocks all unauthorized applications, including zero-day attacks. This makes your network an impenetrable bulwark against cyberattacks. With Appterix Zero Trust Application Access (ZTAA), you can ensure that your users can only launch applications that you have authorized. This dramatically increases your security, because it eliminates […]

YubiKey Management – ​​Administration

Central YubiKey Management in Appterix: Increase the security of your company data! Direct link to the tutorial: https://youtu.be/C0mbBXoLAhs YubiKeys are physical security keys that authenticate your users when logging into company systems, in addition to their passwords. They offer strong protection against brute-force attacks, phishing, and other security threats. Central YubiKey management in Appterix simplifies the management of YubiKeys in your […]

Using an encryption container

You can open an existing encryption container in the Appterix Agent under Encryption using the Open button or under Recently Used. The Appterix encryption container can be stored locally, in the cloud, on the network, or on external storage media as -emec. Storing the encryption container created in Appterix on external storage media, cloud storage, and network paths can be helpful if you […]

Which hash value is used in Application Access?

In Appterix's Application Access, the identity of applications is determined using SHA-256 (SHA2) hash values. These hash values, along with vendor certificates, are used to allow access in the Allow Lists and to block access to the respective applications in the Block Lists. Each application, as well as each version of the application, has its own unique hash value. This allows […]

Enabling/disabling Application Access on the Appterix Agent

The Zero Trust Application Access (ZTAA) features can be enabled and disabled depending on the agent's permissions. When Application Access is enabled, data about the startup and usage of applications is recorded and sent to the server. Permitted applications are allowed or blocked based on their hash value or vendor certificate. When Application Access is disabled […]

Creating an encryption container

To protect your data from unauthorized access, Appterix offers the option of storing sensitive information in an encrypted container. This file container can be encrypted using state-of-the-art AES 256 or, optionally, post-quantum resistant encryption with Kyber and YubiKey certificates. Creating a new encrypted container: To create a new encrypted container, install Appterix […]

Post-Quantum Resistant Encryption in Appterix

The Kyber encryption in Appterix is ​​post-quantum resistant because it is based on a supposedly NP-hard method, the lattice learning problem with errors. This method is so difficult to comprehend that even quantum computers cannot solve it in an acceptable time. Quantum computers could theoretically solve the lattice learning problem with errors in an acceptable time by […]

YubiKey Lost & Found

The Lost & Found feature in Appterix increases the likelihood of owners finding their lost YubiKeys. When an owner reports their YubiKey as lost, it is marked accordingly in the database. If someone finds a YubiKey, the YubiKey management system will indicate that the device has been connected to a managed system. […]

How do I see which users are using certain YubiKey models in the company?

Appterix offers automated inventory management of YubiKeys. When a new YubiKey is plugged into an Appterix-managed device, information about the YubiKey, the logged-in user, and the device is transmitted to the server. This data makes it easier, for example, to identify users who are using a specific YubiKey series. This is particularly useful when replacing old devices with new ones.

What is learning mode?

The learning mode in Appterix's Zero Trust Application Access (ZTAA) solution is a mode in which the software learns which new applications are allowed to run on a computer. This is important because new applications are constantly being developed. In learning mode, Appterix ZTAA analyzes the running applications and learns which applications are trustworthy. Once Appterix […]

Why is data collected in Windows 11 and 10?

Microsoft uses the collected data to improve and secure Windows. The data is used to perform the following tasks: Security experts, such as the German Federal Office for Information Security (BSI), warn about the data collection in Windows 10 and 11. What data is collected? The exact data collected by Windows 10 and 11 depends on the settings […]

How do I inventory a new YubiKey in Appterix?

To inventory a new YubiKey in Appterix, only the following conditions need to be met: Afterwards, information about the YubiKey, such as name, serial number, used by, specifications, certificates, etc., will be displayed on the Appterix Agent and in the Appterix YubiKey Manager.

Which YubiKeys can be managed with Appterix?

In general, Appterix's YubiKey Management allows you to manage all common devices supported by Yubico. These include: The YubiKey is a powerful security key that helps businesses protect their accounts from takeovers and phishing attacks. It offers a range of features that make it an ideal solution for two-factor authentication (2FA).

What is a YubiKey?

The YubiKey is a powerful security key that helps businesses protect their accounts from takeovers and phishing attacks. It offers a range of features that make it an ideal solution for two-factor authentication (2FA), including: Appterix YubiKey Management. With Appterix YubiKey Management, YubiKeys can be inventoried, assigned to users, usage analyzed, and more.

Manage user groups

You can group users to apply settings and permissions to multiple users. Groups can either be imported from Azure AD/EntraID and Active Directory or created manually. Importing Groups: The process for importing groups is the same as the process for importing users from Azure AD and Active Directory. The users in the imported groups will be located under […]

Edit user

You can adjust your users' information and configurations at any time. This applies to both manually created and imported users. Two-factor authentication: In the Verification tab, you can specify whether and which two-factor authentication method should be used for the user. Activate the Two-factor authentication option (Enable two-factor authentication) to enable two-factor authentication when logging into the web console of […]

Invite users manually

Unlike user import, where the user's email address and name are automatically filled in, this method of adding users requires manually defining these credentials for each user. To add a user manually, in the administration area, click User Manager > Users in the left-hand menu. Then, in the toolbar, click Users […]

Add Identity Provider

An identity provider is added to an organization to make external sign-in available to all users in the organization. Each type of identity provider can only be added to an organization once. For example, one Azure AD/Entra ID and one FIDO2 provider are allowed. However, two Azure AD/Entra IDs cannot be added simultaneously. Adding a […]