How can we help?

Find help articles, troubleshooting guides, and tutorials

Search

image
Explainer Videos

Video tutorials explaining how to set up various aspect of Timus tutorials listed on this Knowledge Base page

image
Quick Set-Up

A quick guide to setup Timus and be up and running in no time

image
Use Cases

Learn how others use Timus to secure their clients

image
FAQ

Browse the frequently asked questions when using Timus

image
YouTube Videos

Explore our YouTube channel for how-to videos, partner use, and insights on Timus and the MSP space.

image
Certified Specialist Exam

This exam assesses your proficiency and understanding of some of the key functionalities of the Timus’ Zero Trust Network Security Solution.

logo

Documentation

Here, you'll find comprehensive guides, tutorials, and references to help you seamlessly navigate our products and services.

Read More
logo

Feature Request

Looking for a feature? Share your suggestion and get the community to vote, helping us improve our products and services.

Read More

Popular articles

Explainer Videos

Welcome to our explainer videos page! Here, you'll find a variety of guides that walk you through essential features and configurations of Timus Networks. These quick, easy-to-follow videos are designed to help you with everything from setup and configuration to more advanced topics, making your experience with Timus smoother and more efficient. Whether you're a beginner or looking for advanced tips, these videos will guide you every step of the way.

Setting up Zero Trust Access, The Timus Way

Configuring Firewall Rules

Web Filtering and Content Blocking 

Segmenting Traffic With Split Tunneling 

Timus Connect Installation Walk Through 

See more
Setting up Zero Trust Access, The Timus Way

The Zero trust framework is build around the mindset where you never trust, always verify. See the two minute video below showing how Timus verifies key user behaviors to ensure you are who you say you are.

See more
Configuring an IPsec Tunnel

The Timus Gateway hosts a cloud firewall that performs various functions. See below video showing configuration of an IPsec tunnel from the gateway to an on-premise firewall, giving users connectivity to data no matter where it lives.

 

See more
Configuring Firewall Rules

With users working from anywhere, the security perimeter is wherever the user is. The Timus adaptive cloud firewall rules follow the user and their identity, not just their device or location, enabling true secure access at the edge.

 

See more
How a Static IP Address Provides Maximum Network Control

Each Timus gateway comes standard with a private, static IP address. Benefits include: - Lock down SaaS apps via IP Whitelisting - Single point of entry to the network, providing deeper visibility - Further defining conditional access

 

See more
Web Filtering and Content Blocking

At the network layer, Timus' Secure Web Gateway enables web filtering, content blocking and anti-virus to ensure that users are accessing safe applications and sites while working.

 

See more
Timus Dashboard

This article explains an overview of the primary dashboard within the Timus Manager. Including key indicators, actionable items & insights

The Timus Dashboard is part of Timus Manager. It allows the administrator a comprehensive view of the network, including active users, devices, sites, and events occurring on the client network.

Dashboard components include:

  • Users Online: displays the number of users currently connected to the network, providing the administrator with real-time information.
  • Devices Online: informs the administrator about the number of devices connected to the network at any given time.
  • Sites Online: displays the number of gateways online.
  • Traffic: provides the administrator with live and historical data on network traffic, including average upload and download information over the past 4/12/24 hours.

 

By clicking one of these areas, such as Users Online, you will be redirected to the Users screen. On this screen, the status of the online users within your network is displayed as Active.

 

 

Similarly, for Devices Online or Sites Online, you can view the devices and sites listed as Online in the Status section on the respective Devices or Sites screens that will open after clicking.

 

Most Active Devices: displays the devices that frequently login and out of the network. A maximum of 30 devices can be displayed in the widget.

Most Active Users: displays in order of the users who frequently login and out of the network. A maximum of 30 users can be displayed in the widget.

Events: displays the login and out of users on the network. A maximum of 30 events can be displayed in the widget.

Alerts: shows the total number of events in the upper right corner of the Dashboard as shown in the image below.

These alerts are generated in response to the user/admin sign-in policies under the  Zero Trust Security section.

When you click on the icon, you will be directed to the Alerts page, where you can get more detailed information about the alert.

Profile: Located in the upper right corner of the Dashboard allows you to edit your Account information, Change Password, and change the Session Expiration Time.

Additionally, you can access the Setup Guide or Log out of the interface here.

 

See more
Partner Portal

The partner portal dashboard will provide visibility into customers' relevant information & all data pertaining to your partnership with Timus Networks.

MSPs will leverage the Timus Networks partner portal as their primary dashboard for day to day management of the Timus solution. Within the portal, you will be able to add, remove & manage all clients for both billing and technical management.

Link to - partner portal

 

See more
Timus Connect App Management
This article explains how to download and install versions of the Timus Connect App that are suitable for different operating systems.
To install Timus Connect App on your device:
  1. Open Timus Manager and go to Settings > Downloads page.
  2. Find the row on the Downloads page that corresponds to the name, version and icon of your device's operating system.
  3. Click the "Copy Link" button, then paste the link you copied into your browser's search bar and press Enter to begin the download.
  4. Alternatively, you can directly click the "Download" button to start the download process.

For more information on Timus Connect App versions for different operating systems, go to:

See more
Timus Connect App for Microsoft Windows® User Guide
You will get a notification message as shown in the image below once you click on Collect log. This process can take up to 10 seconds.
This document is a guide explaining the use of the Timus Connect App for Microsoft Windows® application. This application secures your connection by establishing an encrypted tunnel to the Timus Platform

Download Steps

  1. Download and install the Timus Connect App from https://www.timusnetworks.com/resources/documents-and-downloads/.
    • Administrators can also download the app from Timus Manager > Settings > Downloads page.

When installing Timus Connect App onto desktop devices for the first time, the account must have administrator permission in order to install the application onto the device.

If Timus Connect App's background service is completely stopped for any reason, administrator permission will be required to access the application.

  • Administrator permission is not required for version updates.
Open the application. You will see the Timus Connect App End User License Agreement on the screen.
  • Read and agree to the EULA.
The e-mail address screen will appear. Enter the e-mail address of your Timus account.
  • In the next screen, Select a Network and enter your Password to login. If there is only one network, that network will be selected automatically.If this account is synchronized from a directory service like Microsoft Entra ID(Azure AD), Okta, or Google Workspace, at this moment the login screen will be forwarded to the login screen of that directory service.
  • If you check the Keep me logged in option on this screen, the app keeps your login information for your next login.
 
If you trigger a user sign-in policy of Timus Manager with a behavior when you try to login, you may encounter a different authentication method like two-factor authentication.
The screen that opens is the application's main screen. On this screen, you will see the following menu items:
  • Connection
  • Account
  • Settings
  • Support
 

Connection

Follow the steps below to establish a connection by using the Timus Connect Windows application:
  • Enter the login information provided by your company to connect you to the screen.
  • The Gateway/Connection screen will appear.
  • Here, you will need to select the Gateway. In the gateway selection list, the active sites to which the user is allowed to access will be available.

The round-trip traffic duration to each active gateway will be displayed next to the gateway. The lower the duration, the faster the connection.
  • If you want the application to select the gateway for the fastest connection by default, choose Select Fastest.
  • If you want to connect via a specific gateway, select this gateway from the drop-down list.
 
 
  • Click Connect and wait for the connection to be established. Connection information will be updated as Connected in a short time.
  • On the connection status screen, you can view the connection status, Private IP Address, and Public IP Address information.
  • Click on Disconnect to disconnect.
 
 

 

Account

On the Account menu, you can
  • View your account name,
  • Manage account,
  • End your login session using the Sign Out feature.

To change your password:

  1. Click Manage account.
  2. Enter your current password and then enter your new password and click Confirm.

Settings

On the Settings menu,

  • You can select one of the VPN protocols we offer, WireGuard or OpenVPN.
  • By enabling the Start on Boot feature, you can ensure that the Timus Connect App is always running without needing to be manually launched every time your device is turned on.
  • If you are unable to modify or turn features on or off, it indicates that the administrator has closed that feature to user selection based on their preference.

Split tunnel configuration works on Windows when the tunnel protocol is WireGuard.

Support

On the Support menu, you can

  • Install SSL certificates.
  • Share your feedback with us.
  • Collect logs: When you click this button, a file containing application and system logs will be created in the file patch you specified. This file will mainly be used for support purposes when necessary.
  • About: This page will give you some information regarding Timus Connect Version, Device Model, OS Type, OS Name, OS Version, OS Architecture.
Once you have any issues with the Timus Connect Application, you click on Collect log. it will want you to select a folder to create a log file, which will have all the .log files needed for troubleshooting. You can send the file to one of our technical support specialists to have it analyzed.
 
 

You will get a notification message as shown in the image below once you click on Collect log. This process can take up to 10 seconds.

Once the log file has been successfully created, you will see the pop-up message as shown in the image below.

 
 
To install an SSL Certificate, follow these steps:
  1. Open the Timus Connect app.
  2. Enter your E-mail Address and click on the Continue button.
  3. Choose your Network to connect with.
  4. Enter your Password.
  5. Click on the Sign In button.
  6. Go to Support, located at the bottom right of the application.
  7. Click on Install Certificate.
  8. Confirm the successful installation of the certificates, as shown in the image below. If you do not see the message, please contact your administrator immediately.
 
However, if you get the SSL Certificate Error while using the Timus Connect app, follow the steps below:
  • Click on the Support menu and select Install SSL Certificate.
  • If you cannot see the Certificate is Successfully Installed message, follow these steps:
 
  1. Login to my.timusnetworks.com/login with your account information,
  2. Download the SSL Certificate by clicking the Desktop icon,
  3. Open the downloaded certificate,
  4. Install the certificate,
  5. Select the Local Machine option,
  6. Click Next,
  7. Select Place All Certificates in the following store option,
  8. Select the Trusted Root Certification Authorities file as the place to store the certificate,
  9. Click OK > Next,
  10. Complete the process by clicking Finish on the screen that opens.
See more
Timus Connect App for macOS® User Guide

This document is a guide explaining the use of the Timus Connect for macOS® application.

This application secures your connection by establishing an encrypted tunnel to the Timus Platform.

Timus Connect App supports macOS Monterey or higher versions.

Login

When installing Timus Connect App for the first time, the account must have administrator permission in order to install the application onto the device.

If Timus Connect App's background service is completely stopped for any reason, administrator permission will be required to access the application.

Administrator permission is not required for version updates.

  • Launch the application. You will see the End User License Agreement on the screen.
  • After reading the EULA by scrolling down, you will see I have read and agre to the EULA at the bottom of the agreement. Once you click on it, you will see the email field to sign in the Timus Connect Application on macOS
  • The login screen will appear. Enter the e-mail address of your Timus account.
  • In the next screen, Select a Network and enter your Password to login. If there is only one network, that network will be selected automatically.

If this account is synchronized from a directory service like Microsoft Entra ID(Azure AD), Okta, or Google Workspace, at this moment the login screen will be forwarded to the login screen of that directory service.

  • If you check the Keep me logged in option on this screen, the app keeps your login information for your next login.

If you trigger a user sign-in policy of Timus Manager with a behavior when you try to login, you may encounter a different authentication method like two-factor authentication.

The screen that opens is the application's main screen, you will see the following menu items:

  • Connection
  • Account
  • Settings
  • Support

Connection

Follow the steps below to establish a connection by using the Timus Connect Windows application:

  • Enter the login information provided by your company to connect you to the screen.
  • The Gateway/Connection screen will appear.
  • Here, you will need to select the Gateway. In the gateway selection list, the active sites to which the user is allowed to access will be available.

The round-trip traffic duration to each active gateway will be displayed next to the gateway. The lower the duration, the faster the connection.

  • If you want the application to select the gateway for the fastest connection by default, choose Select Fastest.
  • If you want to connect via a specific gateway, select this gateway from the drop-down list.
  • Click Connect and wait for the connection to be established. Connection information will be updated when Connected.
  • On the connection status screen, you can see the connection status, Private IP Address, and Public IP Address information.
  • To disconnect click on Disconnect.

Account

On the Account menu, you can

  • View your account name,
  • Manage Account to change your password and send a request to the admin regarding Always-on VPN disconnection,
  • Sign Out to end your login session.

Settings

On the Settings menu,

  • The Start on Boot feature allows the application to start when the operating system boots,
  • Connect on application start feature allows you to connect to your gateway automatically when you turn on your macOS,
  • With the Change tunnel mode feature, you can change the tunnel mode of VPNs such as WireGuard and OpenVPN.

If you are unable to modify or turn features on or off, it indicates that the administrator has closed that feature to user selection based on their preference.

Split tunnel configuration works on macOS when the tunnel protocol is WireGuard.

Support

On the Support menu, you can

  • Install certificate,
  • Give feedback,
  • Collect logs: When you click this button, a file containing application and system logs will be created in the file patch you specified. This file will mainly be used for support purposes when necessary.

Once you have any isues with the Timus Connect Application, you click on Collect log. it will want you to select a folder to create a log file, which will have all the .log files needed for troubleshooting. You can send the file to one of our technical support specialists to have it analyzed.

You will get a notification message as shown in the image below once you click on Collect log. This process can take up to 10 seconds.

Once the log file has been successfully created, you will see the pop-up message as shown in the image below.

To install an SSL Certificate, follow these steps:

The SSL Certificate can be installed by clicking "Install Certificate" on the Support menu. However, in order for the SSL Certificate to function properly, its trust settings must be configured as follows.

  1. Navigate to the 'Applications' folder on your Mac. You can use Finder to find 'Application'.
  2. Inside the 'Applications' folder, find and open the 'Utilities' folder.
  3. In the 'Utilities' folder, select 'Keychain Access'.
  4. Once 'Keychain Access' is open, locate the search box at the top right corner.
  5. In the search box, enter the name of your SDN. In this example, our SDN name, which is the company name, is TimusNetworks. Please make sure that you enter your SDN name correctly into the search box.
  6. The corresponding certificate will appear in the search results. Select it.
  7. After opening the certificate, find and select the 'Trust' option. The detail page will be opened automatically. Please make sure that you have chosen the Trust on the dropmenu.
  8. In the 'Trust' settings, change the status to 'Always Trust'.


Please note that altering the trust settings of any certificate should be done with caution. Always ensure that the certificate is from a reliable source.

See more
Timus Connect App for iOS User Guide

This document is a guide explaining the use of Timus Connect for iOS application.

This application secures your connection by establishing an encrypted tunnel to the Timus Platform.

Timus Connect App supports iOS 14 or later versions.

Login

  • Download and install the Timus Connect App from https://www.timusnetworks.com/resources/documents-and-downloads/.
  • Administrators can also download the app from Timus Manager > Settings > Downloads page.
  • Open the application. You will see the Timus Connect App End User License Agreement on the screen.
  • Read and agree to the EULA.
  • The e-mail address screen will appear. Enter the e-mail address of your Timus account.
  • Click Sign In.
  • In the next screen, Select a Network and enter your Password to login. If there is only one network, that network will be selected automatically.
  • Click Sign In.

If you trigger a user sign-in policy of Timus Manager with a behavior when you try to login, you may encounter a different authentication method like two-factor authentication.

The screen that opens is the application's main screen. On this screen, you will see the following menu items:

  • Connection
  • Support
  • Settings

Connection

Follow the steps below to establish a connection by using the Timus Connect Windows application:

If this account is synchronized from a directory service like Microsoft Entra ID(Azure AD), Okta, or Google Workspace, at this moment the login screen will be forwarded to the login screen of that directory service.

  • The Gateway/Connection screen will appear.
  • Here, you will need to select the Gateway. In the gateway selection list, the active sites to which the user is allowed to access will be available.

If you have just connected to one of the gateways, it will ask for your permission as shown in the image below to be able to let you use the Timus Connect iOS Application. You need to click on Allow to continue.

If you click on Don't Allow not to give the permission for the Timus Connect iOS Application, you will not able to connect to your gateways.

The round-trip traffic duration to each active gateway will be displayed next to the gateway. The lower the duration, the faster the connection.

  • If you want the application to select the gateway for the fastest connection by default, choose Select Fastest.
  • If you want to connect via a specific gateway, select this gateway from the drop-down list.
  • Click Connect and wait for the connection to be established. Connection information will be updated as Connected in a short time.
  • On the connection status screen, you can view the connection status, Private IP Address, and Public IP Address information.
  • While connected, you can click on the Details button to see further details about the connection.
  • Click on Disconnect to disconnect.

Support

On the Support menu, you can

  • Send us your feedback,
  • Report any issues you encounter,
  • Install a configuration profile,
  • Access logs,
  • View the Timus Connect App and system information using the About feature.

Settings

  • On the Settings menu, you can change the tunnel protocol to WireGuard or OpenVPN.
  • You can click on Manage Account for changing password, sending an Always-on VPN disconnect request and installing the certificate.
  • You can use the Sign out feature to end your session on Timus Connect App.

If you are unable to modify or turn features on or off, it indicates that the administrator has closed that feature to user selection based on their preference.

See more
Timus Connect App for Android™ User Guide
This document is a guide explaining the use of Timus Connect for Android™ application.

This application secures your connection by establishing an encrypted tunnel to the Timus Platform.

Timus Connect App supports Android 10 or higher versions.

Login

  1. Open the application. You will see the Timus Connect App End User License Agreement on the screen.
  2. Read and agree to the EULA.

• The e-mail address screen will appear. Enter the e-mail address of your Timus account to sign into your network.

In the next screen, Select a Network and enter your Password to login. If there is only one network, that network will be selected automatically.

If this account is synchronized from a directory service like Microsoft Entra ID(Azure AD), Okta, or Google Workspace, at this moment the login screen will be forwarded to the login screen of that directory service.

  • Click Sign In.

If you trigger a user sign-in policy of Timus Manager with a behavior when you try to login, you may encounter a different authentication method like two-factor authentication.

The screen that opens is the application's main screen will have the following menu items:

  • Connection
  • Support
  • Settings

Connection

Follow the steps below to establish a connection by using the Timus Connect Android™ application:

  • Enter the login information provided by your company.
  • The Gateway/Connection screen will appear.
  • Here, you will need to select the Gateway. In the selection list, the active sites to which the user is allowed to access will be available.

The round-trip traffic duration to each active gateway will be displayed next to the gateway. The lower the duration, the faster the connection.

  • If you want the application to select the gateway for the fastest connection by default, choose Select Fastest.
  • If you want to connect via a specific gateway, select this gateway from the drop-down list.
  • Click Connect and wait for the connection to be established. Connection information will be updated when Connected.
  • On the connection status screen, you can see the connection status, Private IP Address, and Public IP Address information.
  • While connected, you can click on the Details button to see further details about the connection.
  • Click on Disconnect to disconnect.
 

Support

On the Support menu, you can:

  • Send us your feedback,
  • Report any issues you encounter,
  • Install a configuration profile,
  • Access logs,
  • View the Timus Connect App and system information using the About feature.

Settings

  • On the Settings menu, you can change the tunnel protocol to WireGuard or OpenVPN.
  • You can click on Manage Account for changing password, sending an Always-on VPN disconnect request and installing the certificate.
  • You can use the Sign out feature to end your session on Timus Connect App.

If you are unable to modify or turn features on or off, it indicates that the administrator has closed that feature to user selection based on their preference.

Split tunnel configuration works on Android when the tunnel protocol is WireGuard.

See more
Create User(s)

There are three methods for creating users: manually, through importing, or by using directory synchronization

IDP Integrations:

Follow these steps to manually add new user(s) on your network with Timus Manager:

  1. Go to Timus Manager > Users & Teams page.
  2. Click the Create User button in the upper right corner of the page.
Enter a First Name and Last Name.
  1. Enter an Email address.
  2. Select the Status as Active or Inactive.
  3. Assign the user to a Team like Sales or Unassigned if needed.
  4. Select Allowed Sites for secure remote access. You can select multiple sites for the user to connect or All to include all Allowed Sites instead of selecting them one by one.
  5. Click the "Save" button to complete the process. It is important to note that activation emails will be automatically sent to the users that are imported.
              • The created user will be notified by email.
  6. Once you click on Set Password, you will be forwarded to the page, which you can set your password.
  7. On this page, you can set your password depending on Password Policies defined by the network admin.
  8. While setting or resetting your user's password, you may see the pop-up as shown in the image below.
  9. If you have seen the pop-up above while setting or resetting your user's password, you need to check your password policies as shown in the image below. There 5 password policies, which can cause Invalid Password issue.

In this example, I have used "john" in my password. Therefore, I have seen Invalid Password pop-up on my screen.

You need to set your Password Policies, which totally depend on the network admins, for the users.

Import Users

  • Within the Users tab, you can take advantage of the convenient Import and Export functionality for users in CSV format.
  • This enables you to easily transfer multiple users in a single step, as opposed to the laborious task of manually adding them one by one.
  • This valuable Import Users feature saves you time and simplifies the management of users within your network.
    1. Click the Import button on the Users tab.
    2. You can view the Timus_Users_Sample document by clicking Download Sample text in the upper left corner of the pop-up window.
    3. To import users, you have two options. You can either drag and drop the CSV document onto the designated area on the screen, as shown in the image below, Or you can simply click on the area to browse for the document. Please note that the maximum file size allowed for import is 5MB.
Pay attention to the following points for the CSV document you will prepare:
  • First Name, Last Name, and E-mail fields must be filled.
  • Up to 70 characters can be entered in the First Name and Last Name fields.
  • Up to 120 characters can be entered in the E-mail field.
  • Remote Access Sites must be one of the sites in the system, or you can leave them empty.
  • Teams that are not in the system will be created as new teams.
  • Team fields can be empty.
  • You can upload up to 500 users at a time.
  • Users whose Remote Access Sites field is empty will not be able to establish a remote connection.
  • Multiple sites in the system can be entered in the Remote Access Sites fields by placing a comma (,) between them.
After successfully importing your users to Timus Manager, you have the option to export them as Timus Users directly from your network.
Inactive accounts are not able to login to the system, and do not consume user subscriptions.
Timus will scan the dark web for users with disclosed or breached email addresses. If scan discovers email exposure, the warning below will arise upon attempting to save.

Account Security as a part of Vulnerability Assessment

If the Account Security window appears on your screen with the Breaches tab, you can view this informational text and important data about past breaches:
"It has been determined that the e-mail address in this account has been included in the following data breaches that have occurred before. A data breach is an event in which data is accessed and exposed in an unauthorized manner, usually due to inadequate access controls or security weaknesses in software."
  • During this step, an Account Security window will appear as part of Timus's Vulnerability Assessment, presenting you with two options:
  • If you select the Cancel option, the user will not be created due to being breached, and you wil go back to the Create User screen again automatically.
  • If you choose to Continue, the user will be created. We strongly advise you to carefully review the list of Breaches, which includes details such as the Source, Domain, Data Classes, Data Count, and Date. This information will help you make an informed decision about the user's security.
The breached email address check does not include a check for breached or disclosed passwords.
See more
Manage Users

This article contains guidance on managing users, executing bulk actions, and resetting passwords.

 

Users and Teams Bulk Actions

  • You can select multiple users on the Users tab on the Users & Teams page and take the desired action on the users at the same time.
  • To take bulk action on multiple users, click Users & Teams in the left-side navigation.
  • The Users tab appears. From this screen, select the users you want to take action on.
  • The bulk Actions menu appears above the devices list. Select the action you wish to take (Reset Password, Reset 2FA, Ban/Unban, Delete) from the Actions drop-down menu:
     
 

Edit Settings

 

Account Status

  • Keep Existing Settings: This action will not affect the status of the selected users.
  • Activate All: The status of the selected users will be set as active.
  • Deactivate All: The status of the selected users will be set as inactive.
 

Team

  • Keep Existing Settings: In this case, you do not need to make a selection.
  • Replace All with: Select a team from the dropdown menu. This team will be assigned to all users, including unassigned users.
  • Remove These from All: You can select more than one team from the dropdown menu on the right. The selected teams will be removed from the selected users, and these users will be classified as unassigned in your network after saving the changes.

Tags

  • Keep Existing Settings: The existing tags of users in your network will not be affected by this action.
  • Add to Existing: The existing tags of users in your network will not be affected by this action. In addition to these tags, the tags you choose from the dropdown menu below will be included in the user's account.
  • Replace All with: The existing tags of the selected users will be replaced with the tag you choose. However, the automatically assigned tags of the users you synchronize with Timus using Integrations will not be changed.
  • Remove These from All: These tags will be removed from the selected users.
     

Allowed Sites

  • Keep Existing Settings: The existing sites of users in your network will not be affected by this action.
  • Add to Existing: The existing sites of users in your network will not be affected by this action. The site you select will be added alongside the current sites of the selected users.
  • Replace All with: The current sites of the selected users will be replaced with the site you select from the options provided.
  • Remove These from All: These sites will be removed from the selected users.
     

Ban/Unban

 
With the 'Ban/Unban' action, you have the ability to restrict users from accessing your network. Whether it is for a specific duration, custom or an permanent period, you can prevent individuals from entering your network.
 
This functionality can be used for both individual users and multiple users.
 

Reset Password

Selecting the 'Reset Password' action will reset the password for the selected users. An email will be sent to guide them through the process of creating a new password.

 

Reset 2FA

Selecting the 'Reset 2FA' action will reset the two-factor authentication code for the chosen users. Timus will then send an email to guide them through the process of setting up two-factor authentication.
 
The user sign-in policies in Zero Trust Security require users to use two-factor authentication.
 

Drop Connection

You can manually activate the 'Drop Connection' action if you detect any suspicious activity. This will safeguard your network's security by quickly responding to potential threats.
 

Delete

You can delete multiple users from your network all at once using the 'Delete' action.
See more
Agent Profiles
All users, all teams and all tags will be selected automatically here for you. Also, you will not be able to take any actions on any fields here but Description field, because this is a Default Agent Profile.
Once you create a new Agent Profile, you are able to change all the fields however you want

Windows and MacOS:

This article explains the process of creating and managing Agent Profiles on the Users & Teams page.

  • To manage the Agent Profiles, you can go to Users & Teams > Agent Profiles and you can click on 3 dots to edit the Default Agent Profile or you can create a new Agent Profile if needed.
 
 
  • The Agent Profile page has a drag-and-drop feature, allowing you to prioritize a profile by moving it to the top. Once you move the Agent Profile test to top as shown in the image below, you need to Apply Order to save the configurations.

  • Once you click on 3 dots to edit the Agent Profile, you will see 5 tabs, Source, Windows, MacOS, Android, iOS.

Source

  • All users, all teams and all tags will be selected automatically here for you. Also, you will not be able to take any actions on any fields here but Description field, because this is a Default Agent Profile.
  • Once you create a new Agent Profile, you are able to change all the fields however you want
 

Windows and MacOS:

  • You can decide the Tunnel Protocol, WireGuard or OpenVPN, as default here.
  • If you want to let the users decide the options such as Tunnel Protocol, you can click on User can modify. As long as User can modify has been marked, the users will be able to decide the options.
  • If you don't want to let the users decide the options, you can keep User can modify unmarked so that you will be able to force them to use whatever you have decided on the Agent Profiles
  • Start on boot: When enabled, the Timus Connect App will start when the device boots.
  • Connect on application start: When the device is turned on, it will automatically connect to the selected or last connected gateway.
  • Always-on VPN: Enabling Always-on VPN will allow admins to control users' ability to disconnect VPN in Timus Connect app. 'Users cannot disconnect' means users cannot disconnect. 'Users can disconnect with admin approval' means users must submit a request to disconnect, and admin must approve the request. 'Users can disconnect without admin approval' means users must submit a request to disconnect, and request is automatically approved, without the need for admin approval. One request is valid for one disconnect only.
  • You can see the admin approvals for Always-on VPN on the page Insights -> Alerts -> Requests.
  • Trusted Networks: When a device is connected to a trusted network, VPN will automatically disconnect as this is recognized as a secure environment.
 
  • Productivity tracker: If this is enabled, application usage tracking of the user will be enabled. Otherwise tracking will be disabled.
  • Enforce local DNS responder: When enabled, Timus Connect agent will resolve DNS queries locally. When disabled, it will disable domain-based split tunneling.
  • Auto Update: When enabled, Timus Connect application will automatically check for updates.

Start on boot, Connect on application start, Always-on VPN, Trusted Networks and Productivity tracker options are only available on Windows and MacOS.

 

Android and iOS:

  • You can decide the Tunnel Protocol, WireGuard or OpenVPN, as default here.
  • If you want to let the users decide the Tunnel Protocol, you can click on User can modify. As long as User can modify has been marked, the users will be able to decide the Tunnel Protocol. vv
     
     
 
See more
Password Policies

This article explains the process of managing Password Policies on the Users & Teams page.

  • To manage the Password Policies, you can go to Users & Teams > Password Policies and you can click on Edit button to edit both Policy for All Administrators and Policy for All Users
 

Policy for All Administrators:

This password policy applies to all administrator accounts of the management portal.

Policy for All Users:

This password policy applies to all user accounts that require a Timus password. Users that single sign-on with their third party Identity Provider accounts do not have Timus passwords, thus they are not bound by this policy.

Active Rules:

We have 11 password policies. 6 of them are active and 5 of them are inactive in default as shown in the images below. You are able to change the password policies however you want

Once you click on Edit, you will be able to configure the policies however you want.

Minimum character length

This will be active all the time. You are able to change the minimum character length, which is 8 in default, to any numbers that you want.

Minimum number of lower case letters

We recommend using at least 1 lower-case letter to make the passwords stronger.

Minimum number of upper case letters

We recommend using at least 1 upper-case letter to make the passwords stronger.

Minimum number of digits (0-9) We recommend using at least 1 digit to make the password stronger.

Minimum number of special characters

If selected, password must include special characters such as !@#$-%&*+. We recommend using at least 1 special character to make the password stronger.

Maximum number of consecutive digits

For example; if 3 is selected, up to 3 consecutive digits such as 01, 012, 123, 456, 789 can be included in the password, 4 consecutive digits like 0123 cannot.

Cannot use commonly used passwords

Commonly used passwords can be very easily detected by automated tools of bad actors, thus using them leads to a vulnerability. This check is insensitive for upper-case and lower-case letters.

Cannot contain keywords

You can add the keywords, which you don't want the users/admins to use in their passwords, into here so that the users/admins are not able to use these keywords. Maximum 10 keywords can be entered.

Cannot contain first part of user's email address

For example, the password of the user with the email address johndoe@abc.com cannot contain the text 'johndoe'.

Cannot contain user's first name

If you activate this, the users/admins will not be able to use their user's first name in their passwords. This check is insensitive for upper-case and lower-case letters.

Cannot contain user's last name

If you activate this, the users/admins will not be able to use their user's last name in their passwords. This check is insensitive for upper-case and lower-case letters.

Password expires in

Entered value will be set as the administrator's password expiration limit. Minimum value is 1 day and maximum value is 10.000 days.

See more
Productivity Tracker
This articles explain the process of using and managing Productivity Tracker on the Users & Teams page.
If Productivity Tracker is enabled, application usage tracking of the user will be enabled. Otherwise tracking will be disabled.
This feature is only available on Windows and MacOS.
  • To activate Productivity tracker, you need to go to the page Users & Teams -> Agent Profile -> Edit Default Profile or create a new Agent Profile by clicking on Create New button at the top right of the screen as shown in the image below
  • Once you click on Edit the Default Profile, you will see the pop-up as shown in the image below. You will not able to change Users, Teams and Tags here. They have already been selected as all users, teams and tags due to being the Default Profile. If you want to specify these such as selecting specific users, teams or tags, you need to create a new Agent Profile.
  • Once you select one of the tabs, Windows or MacOS, at the top of the pop-up screen, you will see the screen where you can enable/disable the Productivity tracker as shown in the image below.
This feature does not provide User can modify option. Therefore, if it is enabled by the admin, the users, selected by admin, will be tracered
  • To analyze the data belonging to the users of Productivity tracker, you need to go to the page Users & Teams -> Users -> select a user here -> click on 3 dots on the right of the user row -> View as shown in the image below.
 
  • Once you click on View, you will see the page as shown in the image below to be able to analyse the Productive, Unproductive and Neutral tabs regarding the Productivity tracker.
  • Windows: Certain security applications, such as Kaspersky and McAfee, may interfere with the functionality of the Productivity Tracker feature, specifically C:\Program Files\Timus Connect\resources\service\lib\active-win\active-win-windows.exe process. To ensure proper operation, verify that this executable is not obstructed by any Endpoint Protection Platforms (EPPs) or other security software. It is crucial to whitelist active-win.exe in your security configurations.
  • macOS: To prevent any interference with the Productivity Tracker, please ensure that the Timus Connect Application has been granted Full Disk Access, Accessibility, and Screen Recording permissions as illustrated in the accompanying image. Failure to provide these permissions may result in suboptimal performance of the Productivity Tracker. If you use Privilege Manager, please ensure that the Timus Connect Application is whitelisted.

 
See more
Always-on VPN
This article explains the process of using and managing Always-on VPN on the Users & Teams page.

Always-on VPN will allow admins to control users' ability to disconnect VPN in Timus Connect app. 'Users cannot disconnect' means users cannot disconnect. 'Users can disconnect with admin approval' means users must submit a request to disconnect, and admin must approve the request. 'Users can disconnect without admin approval' means users must submit a request to disconnect, and request is automatically approved, without the need for admin approval. One request is valid for one disconnect only.

This feature is only available on Windows and MacOS.

  • To activate Always-on VPN, you need to go to the page Users & Teams -> Agent Profile -> Edit Default Profile or create a new Agent Profile by clicking on Create New button at the top right of the screen as shown in the image below
  • Once you click on Edit the Default Profile, you will see the pop-up as shown in the image below. You will not able to change Users, Teams and Tags here. They have already been selected as all users, teams and tags due to being the Default Profile. If you want to specify these such as selecting specific users, teams or tags, you need to create a new Agent Profile.
  • Once you select one of the tabs, Windows or MacOS, at the top of the pop-up screen, you will see the screen where you can enable/disable the Always-on VPN as shown in the image below.

This feature does not provide User can modify option. Therefore, if it is enabled by the admin, the users, selected by admin, will be tracered.

When you click on Disconnect on Timus Connect Application while you are connected to one of your gateways, you will see a pop-up as shown in the image below as long as Always-on VPN feature is selected as Users cannot disconnect.

Once Always-on VPN is selected as Users can disconnect with admin approval and you try to disconnect from the VPN, you will see a pop-up as shown in the image below. You will need to click on Go to My Timus page.

Once you click on Go to My Timus page, you will see the page as shown in the image below to send a request to your admin to be able to disconnect from the VPN.

Once you click on Create Request as shown in the image above, you will be able to see the pop-up screen as shown in the image below. The request will be selected as Disconnect VPN automatically, you need to write a reason why the admin should let you disconnect from the VPN.

The reason field is not required, you can leave it blank.

Once you save the pop-up screen above, you will be able to see your all requests on the main page my.timusnetworks.com located on the tab Requests if they have been approved or not.

If you have already sent a request to the admin to be able to disconnect from the VPN, you cannot send a new request until the admin responses your request.

You can cancel your request anytime that you want while the status is pending.

The selected admins by the super admin

Enabling notifications means that selected admins will get notification emails when a disconnect request is submitted, approved, denied, or cancelled. Emails will be sent for all requests, regardless of whether admin approval is required or not. Maximum 10 admins can be selected.

The status of Always-on VPN:

Pending: You have sent a request to the admin to let you disconnect from the VPN, you need to wait on your admin's response.

Approved: Your request has been approved by the admin. You are allowed to disconnect from the VPN if needed.

Denied: Your request has been denied by the admin. You are not allowed to disconnect from the VPN.

Cancelled: You have cancelled the request by yourself. It is no longer under consideration by the admin.

Once your request has been approved or denied, you will also be notified by an email as shown in the images below.

The deny reasons by the admins are as follows:

  • Invalid justification.
  • Insufficient justification.
  • Insufficient justification, please provide more details.
  • Company security policy violation.
 
See more
Heimdal for Endpoint Integration Guide

What is Heimdal EPP?

Heimdal Endpoint Protection Platform (EPP) is a comprehensive cybersecurity solution that provides advanced threat detection, prevention, and response capabilities. It integrates seamlessly with the Timus platform to collect, monitor, and analyze data from devices within your network, helping to enforce security policies and ensure a strong security posture.

How Heimdal EPP Integration Works?

  • Data Collection: Heimdal collects endpoint data such as device status, threat detections, and more.
  • Data Transmission: This data is securely transmitted to Timus via APIs.
  • Policy Enforcement: Timus uses this data to enforce Device Posture Checks and manage user access based on security policies.
  • Security Posture Management: Administrators can monitor the security status of devices in real-time and take proactive actions if necessary.

Obtain the Necessary Credentials from Heimdal

Before you can integrate Heimdal EPP with Timus, you’ll need to gather the following details from your Heimdal Management console:

  • Customer ID
    • The Customer ID is a unique identifier assigned to your account by Heimdal.
      1. Sign in to your Heimdal Management Console
      2. Go to Guide -> Your Heimdal API Key
      3. Copy Current selected customer ID value
  • API Key
    • The API Key is generated from the API section within the Heimdal Management console.
      1. Sign in to your Heimdal Management Console.
      2. Go to Guide > Your Heimdal API Key
      3. Copy Your Personal API Key value
    • This key is used to authenticate requests made by Timus to the Heimdal API.
  • Management URL
    • The Management URL is the base URL you use to access your Heimdal Management Console (e.g. https://rc-dashboard.heimdalsecurity.com/api/heimdalapi).
    • This URL allows Timus to send and receive data from Heimdal by communicating with the correct server.

Integrate with Timus

Once you have gathered all the necessary credentials and completed setup on the Heimdal side, follow the steps below to integrate Heimdal EPP with Timus:

  1. Access Timus Manager:

    • Sign in to Timus Manager.
    • Go to Settings -> Integrations.
  2. Manage Heimdal Integration:

    • Click Manage under Heimdal.
    • Fill in the fields with the copied Customer ID, API Key and URL values.

    Untitled.png

Testing and Verification

After completing the integration setup:

  • Test the Integration: Ensure that Timus can successfully communicate with Heimdal by checking if device data is being collected and displayed in the Timus Manager.
  • Verify Policies: Configure a simple Device Posture Check using the data from Heimdal to ensure policies are enforced as expected.

See more
(AD) Active Directory

This article explains the process of synchronizing your Active Directory users and groups with Timus Manager

To use this integration, you must install the Directory Connector Agent to your main Active Directory server. This agent will sync your AD with your Timus Manager account.
Before initiating the synchronization process and downloading the agent, follow the steps below:
  • Create API Access by going to Timus Manager -> Settings -> Configuration -> API Access tab.
  • Click Create API Access on the top right of the page.
  • Enter a Title.
  • Choose the Application Type. (Active Directory/ Custom)
  • Click Save.
 
  1. After creating an API Access, you will view the required information to log in to Directory Connector.
  2. Copy and Save this Client ID and Client Secret you see on the screen.
  3. Go back to the Active Directory integration screen and click on Download Agent.
  4. Open Timus Directory Connector Agent.
  5. Enter the key and secret here.
  6. Click the Sign in button.
 
  1. When you open the Timus Directory Connector, you will be presented with the main screen that features two tabs: Sync and Logs.
  2. Enter the requested AD domain and admin credentials in the Synchronization tab.
  3. Click Save.

In the Logs tab, you can view all traffic on the agent under Log Time/ Type and Details parameters.

 
  1. Navigate to the Active Directory integration area in Timus Manager and enable the Synchronization Status.
  2. Groups transferred from the directory can now be viewed here.
  3. Map groups with Timus Manager.
  4. Select the Remote Access that users will be able to connect to.
 
Select the sites that users will be able to connect. This selection only applies during the initial synchronization of a user. You can change the allowed sites of the existing users in user settings or bulk actions.
The synchronization process may require up to 30 minutes, but it could potentially take longer.
The duration of the synchronization depends on the amount of information you are synchronizing from Active Directory.
See more
Bitdefender for Endpoint Integration Guide
  1. Log in to BitDefender GravityZone:
  2. Navigate to API Keys:
    • Once logged in, click on your username at the upper right corner of the console and select 'My Account'.
    • Go to the 'API keys' section.
  3. Generate an API Key:
    • Click on the 'Add' button in the API keys section.
    • Enter a description for the API key and select the Network API.
    • Click 'Generate'. Ensure you copy and save your API key as it is crucial for the integration.
  4. Copy the Management URL:
    • The Management URL is generally the URL you use to access the GravityZone control panel, like https://cloud.gravityzone.bitdefender.com
    • You might also find the specific API endpoint URLs under the API section if your integration requires targeting specific services.
  5. Enter your details in Timus Manager portal:
    • To be able to enable Bitdefender you need to go to the page Settings -> Integrations and click the “Enable” button of Bitdefender integration.
    • Enter your API Key and Management URL, and click the “Confirm” button.

To integrate Bitdefender for using the getManagedEndpointDetails and getEndpointList API calls, you need to follow these steps:

1. Obtain API Access

Step 1: Access the Bitdefender GravityZone Console

  • Log in to your Bitdefender GravityZone console.

Step 2: Create an API Key

  • Navigate to the API section in the GravityZone console.
  • Generate an API key if you don't already have one.
  • Note down the API key as you will need it to authenticate your API calls.

2. Assign Necessary Permissions

To use the getManagedEndpointDetails and getEndpointList API calls, ensure the API key has the following permissions:

  • Endpoints: Read access to retrieve endpoint details.
  • Network: Read access to retrieve the list of managed endpoints.

3. Permissions Summary

Ensure your API key has the following permissions:

  • Read access to the Endpoints and Network sections in the Bitdefender GravityZone console.

By following these steps, you should be able to integrate Bitdefender and use the getManagedEndpointDetails and getEndpointList API calls effectively.

  • Endpoints: Read access to retrieve endpoint details.
  • Network: Read access to retrieve the list of managed endpoints.
  • Read access to the Endpoints and Network sections in the Bitdefender GravityZone console.

Now, you are ready to integrate with Timus. Please continue the article below to complete the integration. Device Posture Check and EPP

 
 
 
See more
Device Posture Check and EPP
This article explains the process of enabling EPP and Device Posture Check configurations on Timus Manager.
  • Please complete the EPP integration guide(s) below before taking any actions on the Timus Manager. Without taking the needed permission configuration actions of the EPPs below, the EPP integrations will not work as expected.

Microsoft Defender for Endpoint Integration Guide

SentinelOne for Endpoint Integration Guide

Bitdefender for Endpoint Integration Guide

  • To be able to enable the EPPs, BitDefender, SentinelOne or Microsoft Defender, you need to go to the page Settings -> Integrations.

BitDefender:

  • Once you enable BitDefender, you need to enter the API Key and Management URL to activate it. After entering the needed fields, you need to click on Confirm.

SentinelOne:

  • Once you enable SentinelOne, you need to enter the API Key and Management URL to activate it. After entering the needed fields, you need to click on Confirm.

Microsoft Defender:

  • Once you enable Microsoft Defender, you need to enter the Tenant ID, Client ID and Client Secret to activate it. After entering the needed fields, you need to click on Confirm.
  • After enabling the EPP, you will be allowed to configure the Device Posture Checks. In order to configure it, you need to go to the page Zero Trust Security -> Device Posture Checks.
  • If you want to create new Device Posture Checks, you need to click on Create New as shown in the image above. If you have already got some Device Posture Checks, it will be listed as shown in the image above as well.
  • Once you click on Create New, you will see the page as shown in the image below. This page has 2 tabs, General and Attributes. Without entering the field on the tab General, you are not allowed to skip to the Attributes tab.

Assigned Operating Systems:

Select the operating system for which you wish to perform device posture check. Please note that only one posture check can be created for each operating system.

  • Windows
  • macOS
  • Linux
  • Windows Server
  • iOS
  • Android
  • After you assign the Operating System and enter the required fields, you can click on Save. You will be able to configure the tab Attributes now. You need to click on Add Attribute as shown in the image below.
  • Device Posture Check will fail if any attribute value is missing: Enable this option to fail the device posture check if any attribute values are missing, ensuring only complete datasets pass the check.

Data Source:

Select the source from which the attribute data is retrieved. This data source provides the information used to evaluate the device posture.

  • BitDefender
  • Microsoft Defender
  • SentinelOne

Attribute:

Choose the specific attribute that is gathered from the data source.

The Attributes if the Data Source has been selected as either BitDefender or Microsoft Defender.

  • Antivirus Agent Outdated
  • Antivirus Agent Signature Outdated
  • Antivirus Agent Signature Update Disabled
  • Antivirus Agent Update Disabled
  • Device Infected
  • Disk Encryption
  • Agent Installed
  • Malware Detected
  • Operating System
  • Risk Score

The Attributes if the Data Source has been selected as SentinelOne.

  • Antivirus Agent Outdated
  • Device Infected
  • Disk Encryption
  • Agent Installed
  • Operating System

Condition can be is any of or is equal to depending on the Attribute you have selected.

Pass Value: Define the expected value that the attribute must have to pass the check. It can two options, True and False.

After you define the Attribute successfully, you will see a pop-up as shown in the image below.

After completing the Device Posture Checks process, you can use ZTNA to apply some policies for the users. To be able to do it, you need to go to the page Zero Trust Security -> Behaviors -> Create New as shown in the image below.

Once you click on Create New, you need to enter a Name and select Device Posture Check as a Type.

And, you need to select your Device Posture Check, which you have named it, and decide if the Trigger is Passes or Fails as shown in the image below.

After creating the behavior, you need to go to the page Zero Trust Security -> User Sign-in Policies -> Create New as shown in the image below.

After clicking on Create New, you will be able to see the pop-up, which will allow you to define some ZTNA policies based on the behavior, which you have created, based on the Device Posture Check.

You can modify the example policy as shown in the image below according to your needs.

Here is an example ZTNA policy based on the Device Posture Check below.

If you would like to get more details regarding ZTNA policies in general, you can take a look at the article User Sign-In Policy.

 
See more
Google Sheets

This article explains the process of enabling Google Sheets on Timus Manager.

Timus Manager integration lets you import network users or device login/ logout activities to Google Sheets.
  1. Click Enable.
  2. Click the Authorize button.
  3. This will redirect you to the page where you can complete the synchronization of your Google account with Timus.

See more
Google Workspace
This article explains how you can integrate Timus with Google Workspace to enable users to log into your corporate network using their Google Workspace credentials.
Use your Google credentials in Timus applications.
To integrate your Google Workspace users with Timus and allow them to log in to your network using their Google credentials, you need to configure Google Workspace through Google Cloud Console:
Go to the Manage Resources page in the Google Cloud console. https://console.cloud.google.com/cloud-resource-manager
  1. On the Select Organization drop-down list at the top of the page, Select the organization resource in which you want to create a project.
  2. Click Create Project.
  3. In the New Project window that appears, enter a Project Name.
  4. Select an Organization to attach it to a project.
  5. Enter the Parent Organization or folder resource in Location.
  6. When you are finished entering new project details, click Create.

Enable Admin SDK API

  1. Type Admin SDK in the Search bar of the
  2. Select the Admin SDK API option in the Marketplace drop-down list at the bottom of the page.
  3. Click the Enable button on the page that opens.
 
 

Client ID

  1. After enabling it, click Credentials from the APIs & Services menu on the left.
  2. On the screen that opens, click the Create Credentials button.
  3. In the Credential Type pop-up window, you will see the Select an API section. Please select Admin SDK API for this.
  4. Select User Data for: What data will you be accessing?
  5. Click Next.
  6. In the next step, enter App Information on the OAuth Consent Screen.
  7. Upload a Logo for the application
  8. Enter email addresses for Developer Contact Information
  9. Select Web application for the OAuth Client ID step.
  10. Enter an URL for Authorized redirect URls.
  11. Copy and save Client ID under Download your credentials in the Your Credentials step.
  12. Click Done.
 

Client Secret

  1. Go to APIs & Services> Credentials screen from the left menu.
  2. Click on OAuth 2.0 Client IDs you just have created.
  3. Click on Web Client.
  4. You can view Client Secret on the left of the Client ID for Web Application screen.
  5. Copy and save to the client secret before leaving the page.

Service Account

  1. Go to the IAM & Admin> Service Accounts screen from the left menu.
  2. Click the Create Service Account button.
  3. In the Service Account Details step on this screen, enter the information requested from you.
  4. Click Create and Continue.
  5. In the step Grant this service account access to project, select a role as Basic> Viewer.
  6. Continue and click Done.
  7. At the end of the page, you will view the Service account created text box.
 

JSON Key

  1. Click on the Service Account name you have just created.
  2. On this screen that opens, click the KEYS tab.
  3. Click the ADD KEY button here.
  4. Select Create New Key from the Create private key for “Workspace” screen that opens.
  5. Choose JSON as Key type.
  6. Click Create.
  7. The JSON key will be automatically downloaded to your device after this step.

Assign Admin Roles

  1. Open the Google Workspace Admin page https://admin.google.com/
  2. Click the Account> Admin Roles title on the left menu.
  3. Select the Group Reader role and and click the Assign Admin button at the right of the page.
  4. On the Admins section that opens, click the Assign Service Accounts text.Click on Assign Service Accounts text on here.
  5. You will see the Assign role- Groups Reader window on the screen.
  6. Go to the Service Accounts page. You can see the service account you have just created and its email address under the Email title. Copy this email address and go back to the Assign role- Groups Reader window.
  7. Paste this email address text into the Assign role- Groups Reader window and click the ADD button.
  8. Then click the "Assign Role" button to complete the process.
 
Similarly, select User Management Admin on the same screen and click the Assign Admin button.
Click on User Management Admin
Paste the email address text you have copied into the Assign role-User Management Admin window and click the ADD button. Then click the "Assign Role" button to complete the process.
Click on Enter up to 20 accounts separated by commas

Customer ID

To copy and save Customer ID:
  1. Go to Account> the Account Settings page.
  2. You will view Customer ID on the page.
  3. Please copy and save the ID and open Timus Manager on your browser.
 

Google Workspace Integration on Timus Manager

To integrate Google Workspace with Timus Manager, follow these steps:
  1. Go to Settings on Timus Manager and select Integrations.
  2. You will see a list of integrations, including Google Workspace. Click the Enable button next to it.Click on Enable
  3. On the Google Workspace Integration screen that opens, enter the information you received from the Google Cloud Console. This includes your Client ID, Client Secret, and Customer ID that you have copied and saved.
  4. To synchronize your Google Workspace users with Timus, drag and drop the JSON file (no more than 10 KB) or click to browse and select the file.
  5. After uploading the file, click Confirm to complete the integration.
Click on Confirm
 
 
The synchronization process may require up to 30 minutes, but it could potentially take longer.
 
The duration of the synchronization depends on the amount of information you are synchronizing from the Google Workspace.
 

Google Workspace Integration Preferences

  • To enable Synchronization Status, go to the Preferences tab on the integration window.
  • In this tab, you can view your Last Synchronization date and select the groups you want to synchronize with the Mapping feature.
  • Any users in these groups that you select will be added to the Google Workspace Users team on Timus and tagged with the name of their associated Google Workspace group.
See more
View ZTNA Dashboard

This article explains how to access data on the ZTNA Dashboard and enhance productivity and security by leveraging all available information in zero trust scenarios.

The Zero Trust Network Access (ZTNA) Dashboard provides a complete overview of all user and admin events within your network, all displayed on one page.

To filter the data displayed in widgets, start by using the User & Admin Events filter and the time filter located in the upper-right corner of the ZTNA Dashboard.

Access the information on successful logins, failed logins, high-risk login attempts, lockouts for failed logins, sign-in rule denies, and sign-in locations on graph and a map.

  • You can also access the locations of all events using the map in the Sign-In Locations widget.
  • To zoom in on the map, use ctrl+ scroll. In addition, you can view the event types included in the widget by using the map filter in the upper-right corner.
  • Double-click the purple number icons on the map to access login information such as the username, public IP, location, and time.
  • For a better view, use the Keyboard Shortcuts dialog located in the lower-right corner of the map.
  • By clicking on the widgets, you will be directed to the Events page where you can see all the User Events and Administrator Events, including their respective details with the IP Intelligence information about their device. Click the View Events page to see more.
See more
User Sign-In Policy

This article will guide administrators on how to create behavior-based, user sign-in policies Timus ZTNA.

Timus ZTNA offers a unique and improved access control method that allows businesses to expand without compromising the fundamental security of their network, which includes infrastructure, applications, data, users, and devices.

  • In the "User Sign-in Policies" page, you can see the following information from left to right: Name, Description, and Status of both default and custom policies.
  • You can use the search filter in the upper left corner to find and adjust policies quickly.

The policies within Timus' Zero Trust Network Access (ZTNA) security framework are organized and prioritized by its place in the policy table. A policy, which is placed higher in the table, is more prioritized than the other User Sign-In policies.

It means that you are able to prioritize the Timus ZTNA rules by yourself.
  • To create a custom policy for a user, click the "Create User Sign-in Policy" button on the right side of the page.
  • The total number of policies defined in your network will be displayed just below.
  • To manage