How can we help?
Find help articles, troubleshooting guides, and tutorials
Search
Common searches:
Find help articles, troubleshooting guides, and tutorials
Common searches:
Video tutorials explaining how to set up various aspect of Timus tutorials listed on this Knowledge Base page
A quick guide to setup Timus and be up and running in no time
Learn how others use Timus to secure their clients
Browse the frequently asked questions when using Timus
Explore our YouTube channel for how-to videos, partner use, and insights on Timus and the MSP space.
This exam assesses your proficiency and understanding of some of the key functionalities of the Timus’ Zero Trust Network Security Solution.
Welcome to our explainer videos page! Here, you'll find a variety of guides that walk you through essential features and configurations of Timus Networks. These quick, easy-to-follow videos are designed to help you with everything from setup and configuration to more advanced topics, making your experience with Timus smoother and more efficient. Whether you're a beginner or looking for advanced tips, these videos will guide you every step of the way.
The Zero trust framework is build around the mindset where you never trust, always verify. See the two minute video below showing how Timus verifies key user behaviors to ensure you are who you say you are.
The Timus Gateway hosts a cloud firewall that performs various functions. See below video showing configuration of an IPsec tunnel from the gateway to an on-premise firewall, giving users connectivity to data no matter where it lives.
With users working from anywhere, the security perimeter is wherever the user is. The Timus adaptive cloud firewall rules follow the user and their identity, not just their device or location, enabling true secure access at the edge.
Each Timus gateway comes standard with a private, static IP address. Benefits include: - Lock down SaaS apps via IP Whitelisting - Single point of entry to the network, providing deeper visibility - Further defining conditional access
At the network layer, Timus' Secure Web Gateway enables web filtering, content blocking and anti-virus to ensure that users are accessing safe applications and sites while working.
This article explains an overview of the primary dashboard within the Timus Manager. Including key indicators, actionable items & insights
The Timus Dashboard is part of Timus Manager. It allows the administrator a comprehensive view of the network, including active users, devices, sites, and events occurring on the client network.
Dashboard components include:
By clicking one of these areas, such as Users Online, you will be redirected to the Users screen. On this screen, the status of the online users within your network is displayed as Active.
Similarly, for Devices Online or Sites Online, you can view the devices and sites listed as Online in the Status section on the respective Devices or Sites screens that will open after clicking.
Most Active Devices: displays the devices that frequently login and out of the network. A maximum of 30 devices can be displayed in the widget.
Most Active Users: displays in order of the users who frequently login and out of the network. A maximum of 30 users can be displayed in the widget.
Events: displays the login and out of users on the network. A maximum of 30 events can be displayed in the widget.
Alerts: shows the total number of events in the upper right corner of the Dashboard as shown in the image below.
These alerts are generated in response to the user/admin sign-in policies under the Zero Trust Security section.
When you click on the icon, you will be directed to the Alerts page, where you can get more detailed information about the alert.
Profile: Located in the upper right corner of the Dashboard allows you to edit your Account information, Change Password, and change the Session Expiration Time.
Additionally, you can access the Setup Guide or Log out of the interface here.
The partner portal dashboard will provide visibility into customers' relevant information & all data pertaining to your partnership with Timus Networks.
MSPs will leverage the Timus Networks partner portal as their primary dashboard for day to day management of the Timus solution. Within the portal, you will be able to add, remove & manage all clients for both billing and technical management.
Link to - partner portal
For more information on Timus Connect App versions for different operating systems, go to:
ChaCha20 encryption is used for WireGuard.
AES-256-CBC encryption is used for OpenVPN.
When installing Timus Connect App onto desktop devices for the first time, the account must have administrator permission in order to install the application onto the device.
If Timus Connect App's background service is completely stopped for any reason, administrator permission will be required to access the application.
To change your password:
On the Settings menu,
Split tunnel configuration works on Windows when the tunnel protocol is WireGuard.
On the Support menu, you can
You will get a notification message as shown in the image below once you click on Collect log. This process can take up to 10 seconds.
Once the log file has been successfully created, you will see the pop-up message as shown in the image below.
This document is a guide explaining the use of the Timus Connect for macOS® application.
This application secures your connection by establishing an encrypted tunnel to the Timus Platform.
Timus Connect App supports macOS Monterey or higher versions.
When installing Timus Connect App for the first time, the account must have administrator permission in order to install the application onto the device.
If Timus Connect App's background service is completely stopped for any reason, administrator permission will be required to access the application.
Administrator permission is not required for version updates.
If this account is synchronized from a directory service like Microsoft Entra ID(Azure AD), Okta, or Google Workspace, at this moment the login screen will be forwarded to the login screen of that directory service.
If you trigger a user sign-in policy of Timus Manager with a behavior when you try to login, you may encounter a different authentication method like two-factor authentication.
The screen that opens is the application's main screen, you will see the following menu items:
Follow the steps below to establish a connection by using the Timus Connect Windows application:
The round-trip traffic duration to each active gateway will be displayed next to the gateway. The lower the duration, the faster the connection.
On the Account menu, you can
On the Settings menu,
If you are unable to modify or turn features on or off, it indicates that the administrator has closed that feature to user selection based on their preference.
Split tunnel configuration works on macOS when the tunnel protocol is WireGuard.
On the Support menu, you can
Once you have any isues with the Timus Connect Application, you click on Collect log. it will want you to select a folder to create a log file, which will have all the .log files needed for troubleshooting. You can send the file to one of our technical support specialists to have it analyzed.
You will get a notification message as shown in the image below once you click on Collect log. This process can take up to 10 seconds.
Once the log file has been successfully created, you will see the pop-up message as shown in the image below.
To install an SSL Certificate, follow these steps:
The SSL Certificate can be installed by clicking "Install Certificate" on the Support menu. However, in order for the SSL Certificate to function properly, its trust settings must be configured as follows.
Please note that altering the trust settings of any certificate should be done with caution. Always ensure that the certificate is from a reliable source.
This document is a guide explaining the use of Timus Connect for iOS application.
This application secures your connection by establishing an encrypted tunnel to the Timus Platform.
Timus Connect App supports iOS 14 or later versions.
If you trigger a user sign-in policy of Timus Manager with a behavior when you try to login, you may encounter a different authentication method like two-factor authentication.
The screen that opens is the application's main screen. On this screen, you will see the following menu items:
Follow the steps below to establish a connection by using the Timus Connect Windows application:
If this account is synchronized from a directory service like Microsoft Entra ID(Azure AD), Okta, or Google Workspace, at this moment the login screen will be forwarded to the login screen of that directory service.
If you have just connected to one of the gateways, it will ask for your permission as shown in the image below to be able to let you use the Timus Connect iOS Application. You need to click on Allow to continue.
If you click on Don't Allow not to give the permission for the Timus Connect iOS Application, you will not able to connect to your gateways.
The round-trip traffic duration to each active gateway will be displayed next to the gateway. The lower the duration, the faster the connection.
On the Support menu, you can
If you are unable to modify or turn features on or off, it indicates that the administrator has closed that feature to user selection based on their preference.
This application secures your connection by establishing an encrypted tunnel to the Timus Platform.
Timus Connect App supports Android 10 or higher versions.
• The e-mail address screen will appear. Enter the e-mail address of your Timus account to sign into your network.
In the next screen, Select a Network and enter your Password to login. If there is only one network, that network will be selected automatically.
If this account is synchronized from a directory service like Microsoft Entra ID(Azure AD), Okta, or Google Workspace, at this moment the login screen will be forwarded to the login screen of that directory service.
If you trigger a user sign-in policy of Timus Manager with a behavior when you try to login, you may encounter a different authentication method like two-factor authentication.
The screen that opens is the application's main screen will have the following menu items:
Follow the steps below to establish a connection by using the Timus Connect Android™ application:
The round-trip traffic duration to each active gateway will be displayed next to the gateway. The lower the duration, the faster the connection.
On the Support menu, you can:
If you are unable to modify or turn features on or off, it indicates that the administrator has closed that feature to user selection based on their preference.
Split tunnel configuration works on Android when the tunnel protocol is WireGuard.
There are three methods for creating users: manually, through importing, or by using directory synchronization
Follow these steps to manually add new user(s) on your network with Timus Manager:
In this example, I have used "john" in my password. Therefore, I have seen Invalid Password pop-up on my screen.
You need to set your Password Policies, which totally depend on the network admins, for the users.
This article contains guidance on managing users, executing bulk actions, and resetting passwords.
This article explains the process of creating and managing Agent Profiles on the Users & Teams page.
Start on boot, Connect on application start, Always-on VPN, Trusted Networks and Productivity tracker options are only available on Windows and MacOS.
This article explains the process of managing Password Policies on the Users & Teams page.
This password policy applies to all administrator accounts of the management portal.
This password policy applies to all user accounts that require a Timus password. Users that single sign-on with their third party Identity Provider accounts do not have Timus passwords, thus they are not bound by this policy.
We have 11 password policies. 6 of them are active and 5 of them are inactive in default as shown in the images below. You are able to change the password policies however you want
Once you click on Edit, you will be able to configure the policies however you want.
Minimum character length
This will be active all the time. You are able to change the minimum character length, which is 8 in default, to any numbers that you want.
Minimum number of lower case letters
We recommend using at least 1 lower-case letter to make the passwords stronger.
Minimum number of upper case letters
We recommend using at least 1 upper-case letter to make the passwords stronger.
Minimum number of digits (0-9) We recommend using at least 1 digit to make the password stronger.
Minimum number of special characters
If selected, password must include special characters such as !@#$-%&*+. We recommend using at least 1 special character to make the password stronger.
Maximum number of consecutive digits
For example; if 3 is selected, up to 3 consecutive digits such as 01, 012, 123, 456, 789 can be included in the password, 4 consecutive digits like 0123 cannot.
Cannot use commonly used passwords
Commonly used passwords can be very easily detected by automated tools of bad actors, thus using them leads to a vulnerability. This check is insensitive for upper-case and lower-case letters.
Cannot contain keywords
You can add the keywords, which you don't want the users/admins to use in their passwords, into here so that the users/admins are not able to use these keywords. Maximum 10 keywords can be entered.
Cannot contain first part of user's email address
For example, the password of the user with the email address johndoe@abc.com cannot contain the text 'johndoe'.
Cannot contain user's first name
If you activate this, the users/admins will not be able to use their user's first name in their passwords. This check is insensitive for upper-case and lower-case letters.
Cannot contain user's last name
If you activate this, the users/admins will not be able to use their user's last name in their passwords. This check is insensitive for upper-case and lower-case letters.
Password expires in
Entered value will be set as the administrator's password expiration limit. Minimum value is 1 day and maximum value is 10.000 days.
C:\Program Files\Timus Connect\resources\service\lib\active-win\active-win-windows.exe
process. To ensure proper operation, verify that this executable is not obstructed by any Endpoint Protection Platforms (EPPs) or other security software. It is crucial to whitelist active-win.exe in your security configurations.
Always-on VPN will allow admins to control users' ability to disconnect VPN in Timus Connect app. 'Users cannot disconnect' means users cannot disconnect. 'Users can disconnect with admin approval' means users must submit a request to disconnect, and admin must approve the request. 'Users can disconnect without admin approval' means users must submit a request to disconnect, and request is automatically approved, without the need for admin approval. One request is valid for one disconnect only.
This feature is only available on Windows and MacOS.
This feature does not provide User can modify option. Therefore, if it is enabled by the admin, the users, selected by admin, will be tracered.
When you click on Disconnect on Timus Connect Application while you are connected to one of your gateways, you will see a pop-up as shown in the image below as long as Always-on VPN feature is selected as Users cannot disconnect.
Once Always-on VPN is selected as Users can disconnect with admin approval and you try to disconnect from the VPN, you will see a pop-up as shown in the image below. You will need to click on Go to My Timus page.
Once you click on Go to My Timus page, you will see the page as shown in the image below to send a request to your admin to be able to disconnect from the VPN.
Once you click on Create Request as shown in the image above, you will be able to see the pop-up screen as shown in the image below. The request will be selected as Disconnect VPN automatically, you need to write a reason why the admin should let you disconnect from the VPN.
The reason field is not required, you can leave it blank.
Once you save the pop-up screen above, you will be able to see your all requests on the main page my.timusnetworks.com located on the tab Requests if they have been approved or not.
If you have already sent a request to the admin to be able to disconnect from the VPN, you cannot send a new request until the admin responses your request.
You can cancel your request anytime that you want while the status is pending.
The selected admins by the super admin
Enabling notifications means that selected admins will get notification emails when a disconnect request is submitted, approved, denied, or cancelled. Emails will be sent for all requests, regardless of whether admin approval is required or not. Maximum 10 admins can be selected.
The status of Always-on VPN:
Pending: You have sent a request to the admin to let you disconnect from the VPN, you need to wait on your admin's response.
Approved: Your request has been approved by the admin. You are allowed to disconnect from the VPN if needed.
Denied: Your request has been denied by the admin. You are not allowed to disconnect from the VPN.
Cancelled: You have cancelled the request by yourself. It is no longer under consideration by the admin.
Once your request has been approved or denied, you will also be notified by an email as shown in the images below.
The deny reasons by the admins are as follows:
Heimdal Endpoint Protection Platform (EPP) is a comprehensive cybersecurity solution that provides advanced threat detection, prevention, and response capabilities. It integrates seamlessly with the Timus platform to collect, monitor, and analyze data from devices within your network, helping to enforce security policies and ensure a strong security posture.
Before you can integrate Heimdal EPP with Timus, you’ll need to gather the following details from your Heimdal Management console:
https://rc-dashboard.heimdalsecurity.com/api/heimdalapi
).Once you have gathered all the necessary credentials and completed setup on the Heimdal side, follow the steps below to integrate Heimdal EPP with Timus:
Access Timus Manager:
Manage Heimdal Integration:
After completing the integration setup:
This article explains the process of synchronizing your Active Directory users and groups with Timus Manager
In the Logs tab, you can view all traffic on the agent under Log Time/ Type and Details parameters.
To integrate Bitdefender for using the getManagedEndpointDetails
and getEndpointList
API calls, you need to follow these steps:
Step 1: Access the Bitdefender GravityZone Console
Step 2: Create an API Key
To use the getManagedEndpointDetails
and getEndpointList
API calls, ensure the API key has the following permissions:
Ensure your API key has the following permissions:
By following these steps, you should be able to integrate Bitdefender and use the getManagedEndpointDetails
and getEndpointList
API calls effectively.
Now, you are ready to integrate with Timus. Please continue the article below to complete the integration. Device Posture Check and EPP
Microsoft Defender for Endpoint Integration Guide
SentinelOne for Endpoint Integration Guide
Bitdefender for Endpoint Integration Guide
Select the operating system for which you wish to perform device posture check. Please note that only one posture check can be created for each operating system.
Select the source from which the attribute data is retrieved. This data source provides the information used to evaluate the device posture.
Choose the specific attribute that is gathered from the data source.
The Attributes if the Data Source has been selected as either BitDefender or Microsoft Defender.
The Attributes if the Data Source has been selected as SentinelOne.
Condition can be is any of or is equal to depending on the Attribute you have selected.
Pass Value: Define the expected value that the attribute must have to pass the check. It can two options, True and False.
After you define the Attribute successfully, you will see a pop-up as shown in the image below.
After completing the Device Posture Checks process, you can use ZTNA to apply some policies for the users. To be able to do it, you need to go to the page Zero Trust Security -> Behaviors -> Create New as shown in the image below.
Once you click on Create New, you need to enter a Name and select Device Posture Check as a Type.
And, you need to select your Device Posture Check, which you have named it, and decide if the Trigger is Passes or Fails as shown in the image below.
After creating the behavior, you need to go to the page Zero Trust Security -> User Sign-in Policies -> Create New as shown in the image below.
After clicking on Create New, you will be able to see the pop-up, which will allow you to define some ZTNA policies based on the behavior, which you have created, based on the Device Posture Check.
You can modify the example policy as shown in the image below according to your needs.
Here is an example ZTNA policy based on the Device Posture Check below.
If you would like to get more details regarding ZTNA policies in general, you can take a look at the article User Sign-In Policy.
This article explains the process of enabling Google Sheets on Timus Manager.
This article explains how to access data on the ZTNA Dashboard and enhance productivity and security by leveraging all available information in zero trust scenarios.
The Zero Trust Network Access (ZTNA) Dashboard provides a complete overview of all user and admin events within your network, all displayed on one page.
To filter the data displayed in widgets, start by using the User & Admin Events filter and the time filter located in the upper-right corner of the ZTNA Dashboard.
Access the information on successful logins, failed logins, high-risk login attempts, lockouts for failed logins, sign-in rule denies, and sign-in locations on graph and a map.
This article will guide administrators on how to create behavior-based, user sign-in policies Timus ZTNA.
Timus ZTNA offers a unique and improved access control method that allows businesses to expand without compromising the fundamental security of their network, which includes infrastructure, applications, data, users, and devices.
The policies within Timus' Zero Trust Network Access (ZTNA) security framework are organized and prioritized by its place in the policy table. A policy, which is placed higher in the table, is more prioritized than the other User Sign-In policies.