-
Notification on licnese pool
Hi! We have a M365 Intune procedure set up so that when a customer end user logs in to their new computer for the first time with their account, WithSecure is downloaded to the device automatically. Is there a way to get notified by email when the customers free license pool is about to run out / has run out, so we can be…
-
[Insight] How to Use WithSecure Elements to Prioritize Threats Effectively
Not all threats are equal — and chasing every alert can burn out your team. Here’s how to focus on what matters: 1. Use Risk-Based Prioritization WithSecure Elements ranks detections based on severity, context, and potential impact. 🛠 Learn more about Broad Context Detection and how it helps prioritize threats.…
-
API charset encoding
When I retrieve the list of devices, the character encoding is incorrect. The character "é" becomes "é" I tried adding "charset=utf-8" and other encodings in the header but it does not work. $Header2 = @{ 'Content-Type' = 'application/json; charset=utf-8' "Authorization" = "Bearer $sToken" } ((Invoke-WebRequest -Headers…
-
Where should we open bug cases ?
Hello, There is a (very) minor bug (see details below) on WSLS64. Is there a specific place to submit bug cases ? ### Versions ### FSBG = 1.0.921 Linuxsecurity = 12.0.503 ### Bug ### While WSLS64 was installed as standalone agent, and configured as offline it still try to connect to a Policy Manager and generate error logs…
-
[Insight] Did You Know? You Can Simulate Attacks with WithSecure Labs
Testing your defenses is just as important as deploying them. WithSecure Labs offers tools to simulate real-world threats safely. Why Simulations Matter: Validate detection capabilities Train your team in real-world scenarios Identify blind spots before attackers do 🛠 Explore WithSecure Labs for red teaming, attack…
-
remove customers them from my customer list
I searched the community but couldn't find a solution. When a customer decides not to purchase WithSecure Elements after trying the product with a Trial License, how can I remove them from my customer list in Partner Portal (partnerportal.withsecure.com) and (elements.withsecure.com)? Thank you.
-
Cannot Load the Page when trying to access devices list or profiles
Hey all, I've been trying to access the backend to make some changes, and while the elements dashboard logs in ok, the Endpoint protection widget on the dashboard errors and then changes to "No devices", while the Detection and response widget lists the correct number of devices. When I try to go to the devices page it…
-
Policymanager schedule
We have a customer where we use Policymanager 16.10. There is a patch window on every third tuesday of the month between 10.00-12.00 AM. I can´t find how I can apply a schedule for automatic updates for this specific time. Its only specific days of the week. Can you help me?
-
error access
Hi, I can't access the site. Does it work properly or am I wrong? Thanks Roberto
-
Renewal Business Suite
My Licence has expired as I didnt get a reminder from the reseller as usual. Now cant get any response from them. I have also filled in the renewal form online but no response from Withsecure. please help.
-
[Insight] How to Spot Gaps in Your Incident Response Plan
Even mature organizations miss key elements in their response strategy. Here’s how to identify and fix them: 1. No Clear Escalation Path Who gets called first? Who makes decisions? 🛠 Use WithSecure’s Incident Readiness Framework to build a clear escalation tree. 2. Lack of Containment Procedures Can you isolate a device or…
-
Elements Vulnerability Management: Feature changes as End-of-Life approaches
We are preparing the End of Life (EOL) of WithSecure Elements Vulnerability Management (EVM), where EVM is replaced with the more comprehensive and intelligent solution - WithSecure Elements Exposure Management (XM). Read the full article here:…
-
Microsoft messages about Elements Collaboration Protection
Several Collaboration Protection customers have received messages from Microsoft relating to their use of WithSecure Elements Collaboration Protection. The message from Microsoft is legitimate, but appears to be automatically generated for any M365 tenant who has any application using Exchange Web Services (EWS). It is not…
-
[Insight] 3 Ways to Use WithSecure Logs to Uncover Hidden Threats
Your logs are more than just records — they’re a goldmine of threat intelligence. Here’s how to make the most of them: 1. Look for Process Anomalies Unusual parent-child process relationships (e.g., winword.exe spawning powershell.exe) can indicate malicious behavior. 🛠 Use WithSecure Elements EDR to visualize process…
-
Upcoming Retirement of the Environments -> Devices → Vulnerability assets page in Elements
We would like to inform you that the Environments -> Devices → Vulnerability assets page in Elements will be gradually retired by the end of 2025. Read the full article here: https://community.withsecure.com/en/kb/articles/32679-upcoming-retirement-of-the-environments-devices-vulnerability-assets-page-in-elements
-
[Insight] How to Build a Threat-Informed Defense Strategy
A threat-informed defense means aligning your security controls with real-world attacker behavior — not just compliance checklists. Step 1: Know Your Adversaries Use threat intelligence to understand the tactics, techniques, and procedures (TTPs) most relevant to your industry. 🛠 Check out WithSecure’s Threat Intelligence…
-
[Insight] 3 Signs Your Security Tools Are Working Against You
Sometimes, the very tools meant to protect your environment can introduce risk — especially when misconfigured or misunderstood. 1. You’re Getting Too Many Alerts High alert volume = alert fatigue = missed real threats. 🛠 WithSecure’s Broad Context Detection helps reduce noise and prioritize what matters. 2. You’re Not…
-
[Insight] Did You Know? You Can Submit Custom IoCs in WithSecure Elements
You’re not limited to default detections — WithSecure Elements lets you define your own Indicators of Compromise. Why It Matters: Tailor detection to your environment Catch threats specific to your industry or region Respond faster to emerging campaigns 🛠 Learn how to submit custom IoCs in WithSecure Elements. 📌 Your…
-
The admin panel at elements.withsecure.com is currently inaccessible.
組織が見つかりません。 組織リストの取得中にエラーが発生しました。後でもう一度試してください。 と表示されて管理画面が利用できなくなっており、非常に困っております。 解消方法をご存じでしたらお教えください。 From @LiselotteP in English: Organization not found. An error occurred while retrieving the organization list. Please try again later." This message is being displayed, and the admin panel has become inaccessible, which…
-
[Insight] How to Spot Early Signs of a Breach — Before It Escalates
Early detection is key to minimizing damage. Here are subtle signs to watch for: 1. Unusual Login Patterns Logins at odd hours or from unexpected locations can signal compromise. 🛠 WithSecure Elements EDR tracks user behavior anomalies — see how. 2. Sudden Privilege Escalation Accounts gaining admin rights without a clear…
-
[Insight] 3 Questions to Ask When Reviewing Your Cybersecurity Stack
Your cybersecurity stack might be full of tools — but are they working together effectively? Ask yourself: 1. Are My Tools Integrated or Isolated? Disconnected tools create blind spots. 🛠 WithSecure Elements offers unified visibility across endpoints, cloud, and email — learn more. 2. Do I Have Overlapping Capabilities?…
-
[Insight] How to Identify Living-off-the-Land (LotL) Attacks — Without a Sandbox
LotL attacks use legitimate tools already in your environment, making them hard to detect with traditional methods. What to Look For: PowerShell or WMI used by non-admin users Scripts running from temp folders Scheduled tasks created without IT approval 🛠 WithSecure Elements EDR detects suspicious behavior even when no…
-
New Feature: Identity Inventory
Identity Inventory is a new capability in WithSecure™ Elements that provides a unified place for administrators to configure and manage Entra ID tenants. It simplifies Tenant management by centralizing visibility and control within the Elements Security Center. Read the full article here:…
-
[Insight] Did You Know? Most Breaches Start with Misconfigured Tools
It’s not always zero-days or sophisticated malware — often, it’s a misconfigured setting that opens the door. Common Misconfigurations: Overly permissive firewall rules Disabled or outdated endpoint protection Unrestricted PowerShell access 🛠 WithSecure Elements helps you audit and enforce secure configurations — see how.…
-
[Insight] 3 Ways to Detect Lateral Movement Without Full Network Visibility
Even without full network telemetry, you can still catch lateral movement with the right endpoint insights: 1. Monitor for Unusual Remote Access Tools Look for tools like PsExec, RDP, or SMB being used in unexpected ways or by non-admin users. 🛠 WithSecure Elements EDR can flag suspicious use of legitimate tools — learn…
-
[Insight] How to Identify Misconfigured Security Tools — Before They Fail You
Misconfigurations are one of the most common causes of security incidents. Here’s how to spot them early: 1. Audit Your Policies Regularly Are your endpoint protection profiles aligned with your current threat model? 🛠 Use the WithSecure Elements Policy Manager to review and adjust. 2. Check for Alert Fatigue Too many…
-
Blocked google search results open automatically
When using Chrome browser to search on Google, blocked websites (such as social media sites) will open automatically. On rare occasions one needs to hover over the search result to reproduce the automatic redirecting. This only happens on devices with the WithSecure browser extension enabled. Windows 10 and 11 devices are…
-
Upcoming Retirement of the Management → Organization Settings → Vulnerability users page in Elements
We would like to inform you that the Management → Organization Settings → Vulnerability users page in Elements will be retired by the end of 2025. Read the full article here: https://community.withsecure.com/en/kb/articles/32543-upcoming-retirement-of-the-management-organization-settings-vulnerability-users-page-in-elements
-
[Insight] EDR vs MDR vs XDR — What’s the Difference and Which Do You Need?
Cybersecurity acronyms can be confusing. Here’s a breakdown of three key detection and response solutions: EDR (Endpoint Detection & Response) Focuses on endpoint visibility Detects and investigates threats on individual devices Ideal for teams with in-house security expertise 🛠 Explore WithSecure Elements EDR for advanced…
-
System maintenance: Elements login - October 8th 2025
We will be performing system maintenance on October 8th 2025, to make important changes to the Access Control System used by WithSecure Elements. This maintenance is planned to start at 18.00 UTC, and is expected to last for a period of 15 minutes. Read the full article here:…