Skip to main content

Protect the Devices

General process

Generally, EIV sends its alerts to the Sternum Platform. Before deploying EIV to your devices, login and configure the associated device information on the Sternum Platform as explained in the next section.


If the device is not connected, please work with Sternum to define the best Linux EIV configuration.

The general steps to protect a device are:

  1. Create a Device Profile on the Sternum Platform to model the device and the current version of the firmware. See the Onboard Device section of the Sternum Platform's Getting Started guide.
  2. Install Linux EIV on the device or the device image as explained in the integration section
  3. Test the protected device
  4. Monitor the device and security alerts on the Sternum Platform.