Core Configuration
Deployments
Deployments Overview
4 min
overview the deployments section is the central command center for connecting your locations and devices to the filtering system here, you define how your internet traffic is routed to our security filter to access this section, navigate to deployments in the main sidebar the menu is divided into two key areas networks the site wide protection networks are the foundation of your fixed location filtering a network deployment protects an entire site like a corporate office or a school instead of installing software on every computer, you update the dns settings on your main router this extends protection to every single device connected to that network static networks standard setups for locations with a fixed public ip address, an ip range, or a cidr block dynamic networks setups for locations where the public ip address changes automatically doh & dot advanced configurations for encrypted dns traffic, ensuring maximum privacy and security over the network routers direct hardware integrations, coming soon to simplify your deployment even further learn how to register your public ips and configure site wide dns protection docid\ pzfsgoi 0kubyuwp7soz9 endpoints the roaming device protection while networks handle fixed locations, endpoints handle individual devices on the move use this section to deploy our lightweight agent application on laptops, tablets, or smartphones this ensures the device remains fully protected and filtered no matter where it connects to the internet mobile devices protection for smartphones and tablets connected to cellular networks or public wi fi remote laptops continuous filtering for employees working from home or traveling learn how to download, install, and manage our roaming client applications endpoints (coming soon) how the deployment flow works to secure your users, follow this logical workflow choose the method decide whether you need to protect a whole building or specific roaming devices configure the deployment add your network ip address or install the endpoint agent on your devices assign a policy link your newly created deployment to a specific security profile to define its filtering rules