How to Activate
Step-by-step guide for activating and configuring Aegister Cloud Defender to secure your web application.
1. Required Information
To enable Aegister to create your organization and activate the service, you must provide the following details:
- Organization Details: Legal name and industry.
- Primary Contacts: Names and email addresses of technical and/or administrative contacts.
- Domain (FQDN): The full domain name of your site (e.g., www.example.com).
- Endpoint: The public address (IP or URL) where your web application is hosted.
- Technical Contact Email: For notifications and technical communications.
- Requested Services: A list of services to activate (e.g., Caching, DDoS, Threat Intelligence, WAF).
2. DNS Update
Once Aegister configures Cloud Defender, you will need to update your domain’s DNS records. Follow these steps:
-
Access the DNS Control Panel:
Log in to your DNS provider or hosting control panel where you manage your domain records. -
Modify the A or CNAME Record:
Update the primary record for the web application (whether an A record or a CNAME) so that it points to:
secure.aegister.com
-
Confirmation and Propagation:
Save your changes and wait for DNS propagation, which typically takes between 1 and 24 hours depending on your provider.
3. Final Verification
After DNS propagation, perform the following tests to ensure that your site is properly protected by Aegister Cloud Defender:
-
Browsing Test:
Visit your domain (e.g., www.example.com) to verify that the site loads correctly. -
Traffic Monitoring:
If available, request reports or logs from Aegister to confirm that traffic is being routed through the Cloud Defender platform.
4. Support and Contacts
If you have any questions or encounter issues during the DNS update or after configuration, please contact Aegister Support for assistance:
- Technical Support: …
5. Conclusion
By following the steps outlined above, your website will be protected by Aegister Cloud Defender once the DNS records are updated correctly. The activated services (Caching, DDoS, Threat Intelligence, WAF) will begin operating seamlessly, providing advanced protection and optimization for your web application.
For additional information or clarification, please do not hesitate to contact our support team.