First Steps After Deployment
Once you've signed in to ThetaSecure for the first time, follow this checklist to configure your environment properly.
Initial Setup Checklist
1. Review the Dashboard
Navigate to the Dashboard to get an overview of your current environment state. The Operations Dashboard provides real-time health metrics including app usage, directory sync status, and authentication trends. See Operations Dashboard for a full walkthrough.
2. Configure Directory Sync
If your organization uses Active Directory, LDAP, or a cloud identity provider, set up Directory Sync to automatically import and synchronize user accounts.
- Navigate to Configuration → Directory Sync
- Create a new Sync Profile for your identity source
- Configure a Connector to establish the connection
- Run an initial sync and verify imported users
See Directory Sync for detailed instructions.
3. Set Up User Roles and Groups
Organize your users by creating appropriate roles and groups:
- Go to Identity Management → Groups to create user groups
- Go to Identity Management → Roles to define roles with specific permission sets
- Assign users to groups and roles based on their responsibilities
4. Configure Authentication Policies
Strengthen your security posture by setting up authentication policies:
- Navigate to Authentication → Sign-in Policies to define login rules
- Set up MFA Policies to enforce multi-factor authentication
- Choose from TOTP, SMS, Email, or Push notification methods
5. Define Network Policies
Control network-level access by configuring access policies:
- Go to Access Management → Network Policies
- Create policies that define which users/groups can access which resources
- Configure RADIUS clients if applicable
6. Register Applications
Register the applications your organization uses:
- Navigate to My Apps or Access Management
- Add Web Apps and Network Apps that your users need access to
- Assign access permissions per application
7. Enable Monitoring
Once your environment is configured, use the dashboard to monitor:
- Operations Dashboard — Authentication trends, sync health, failed logins
- Security Dashboard — Identity health score, anomaly detection, privilege creep
- Statistics Dashboard — At-a-glance counts for all managed resources
8. Review Security Recommendations
Check the Security Dashboard for actionable recommendations. Common first-deployment recommendations include:
- Enabling MFA for all users
- Reviewing privileged access assignments
- Monitoring failed login rates
Bookmark the Security Dashboard and review it daily during the first week of deployment. This helps you catch configuration issues early and establish a security baseline.