Skip to main content

Who is this article for?

Incydr Professional, Enterprise, Horizon, and Gov F2
Incydr Basic, Advanced, and Gov F1

Find your product plan in the Code42 console on the Account menu.

Instructor, no.

Incydr Professional, Enterprise, Horizon, and Gov F2, yes.

Incydr Basic, Advanced, and Gov F1, yes.

CrashPlan Cloud, yes.

CrashPlan for Small Business, no.

HOME
GETTING STARTED
RELEASE NOTES
FAQs
APIs
SYSTEM STATUS
Code42 Support

Monitor your Code42 environment health

Overview

A healthy Code42 environment is one that actively collects file activity from active endpoints or data connections and reports it in the Code42 console for review and investigation in Forensic Search, on dashboards, and in Alerts. If devices and data connections aren't reporting events as expected, you may be blind to activity that's putting your valuable business data at risk.

In addition, an unmanaged environment can include any number of users who are no longer with the organization or devices that are no longer used to connect to Code42. These unneeded users and unused devices pose risks to your organization's security strategy:

  • Unnecessary data may violate your organization's data retention policies.
  • They delay investigations by making it difficult to understand which questions need to be answered.
  • It's difficult to diagnose which users or devices are involved in risky activity, resulting in unfocused investigations and unclear outcomes.
  • They cause processing delays and inefficiencies.

This page lists resources for monitoring the health and status of your Code42 environment.

Code42 system status

To see the current status of the Code42 cloud and our support services, including ticket, chat, and phone systems, visit our Code42 status page.

Additional resources

Code42 has a number of additional resources available to help you get the most value from your Code42 environment while securing your organization's vital data.

  • Use the tools in our customer toolkit to get up and running quickly and discover how to optimize Code42 to elevate your security and insider risk programs.
  • Consult with our Professional Services team for help with deploying Code42 across your organization and integrating with tools you already use.
  • Engage one of our Technical Account Managers (TAMs) to gain extensive insights about the health of your environment and fully leverage all Code42 features, customized for your organization. (TAM services may already be included in your support plan.)
  • Visit the Code42 University to access on-demand and instructor training to learn how to get the most value from your Code42 security monitoring. Classes are available to help you develop an insider risk program; practice configuration, administration, and workflow tasks; and workshop Code42 CLI skills to integrate with other security tools you already use. 

Contact your Customer Success Manager (CSM) for more information about how to access these resources. If you do not know your CSM, please contact our Customer Champions.

  • Was this article helpful?