Step 1 - Check supported operating systems

Before you install our software, verify your devices are running one of the supported operating systems and versions.

  •   Windows: 11, 10, 8.1, 8, 7
  •   Windows ARM: 11
  •   macOS: Sequoia 15, Sonoma 14, Ventura 13, Monterey 12, Big Sur 11, Catalina 10.15, Mojave 10.14, High Sierra 10.13, Sierra 10.12, El Capitan 10.11

Step 2 – Install two-factor authentication app

To log in to Nebula, you must set up two-factor authentication (2FA) with an authenticator app on your mobile device. If you already have the Google or Microsoft authenticator app installed on your mobile device, go to step 3.

To install the Google or Microsoft authenticator app:

  1. Go to the Apple App Store or Google Play Store on your mobile device.
  2. Search for Google Authenticator or Microsoft Authenticator.
  3. Install the Google Authenticator or Microsoft Authenticator app onto your mobile device.

Step 3 – Verify Nebula account

An email with the subject Verify your ThreatDown Request was sent from do_not_reply@cloud.threatdown.com asking you to verify your account.

  1. Locate the email and click Verify.
  2. Enter your name, create and confirm a password, accept the terms, and click Submit.

Step 4 – Log in to Nebula

It’s time to log in to Nebula and set up 2FA.

  1. Navigate to Nebula.
  2. Enter your email address and password.
  3. Follow the instructions on the screen to set up 2FA.

You’ve arrived on the Security Advisor dashboard. It shows a message You don’t have any deployed endpoints. This means you haven’t installed our software, the endpoint agent, on your devices.

2fa.gif

Step 5 – Download endpoint agent

We recommend you install on a nonessential device, first, in case there are issues.

  1. Go to the device and log in to Nebula.
  2. From the Download Center, select the device’s operating system.
  3. Click Start Download.
  4. Save the file to the Downloads folder. Do not rename the file when saving it.
download.gif

Step 6 - Install endpoint agent

Run the downloaded file to install it. Follow the instructions below for the correct operating system.

 

Windows

  1. Note the device’s name. It is needed for Step 7 – Check for successful deployment.
  2. From the downloads folder, run Setup.MBEndpointAgent.x64.msi.
  3. When prompted, click Next.
  4. On the internet proxy configuration screen, leave the fields blank and click Next.
  5. On the ready to install screen, click Install.
  6. If prompted by Windows User Account Control for permission to make changes to the device, click Yes.
  7. Click Finish.
 

macOS

  1. Note the device’s name. It is needed for Step 7 – Check for successful deployment.
  2. From the downloads folder, run the pkg file starting with Setup.MBEndpointAgent.
  3. When prompted, click Continue.
  4. On the license screen, click Continue then Agree.
  5. On the destination select screen, click Continue.
  6. On the installation type screen, click Install.
  7. Enter the password for the user, click Install Software.
  8. Click Close.
  9. If the ThreatDown icon in the top menu bar displays a red dot, you must take action to enable Full Disk Access.
threatdown-fda.png

Step 7 – Check for successful deployment

It takes a few minutes for the device to check in with Nebula. Let’s verify everything went smoothly.

  1. In Nebula, go to Manage and select Endpoints.
  2. Find the endpoint by its device name. If it is not listed, contact Support.
  3. Check the Protection status column. If it’s Unprotected or Unknown, that means the installation was unsuccessful. Contact Support.
  4. Check the Status column. It will show a Scan Needed icon   because a scan hasn‘t been run yet.
  5. Click on the icon and select Scan + Quarantine to run a manual scan. Once the scan is complete, the status field is blank.

Step 8 – Install on remaining devices

Proceed with installing the endpoint agent on the rest of your company’s devices. You can either download the installer on each device or send a download link to share with your other users.

Option 1 – Manual installation

Log onto Nebula on each device and repeat steps 5-7.

Option 2 – Remote installation

For devices in remote locations, send a download link to your users. From the Nebula Download Center:

  1. Select the operating system from the platform drop-down list.
  2. Click Copy installer link to copy a link to your clipboard.
  3. Open your preferred email or messaging program and add your recipients.
  4. Paste and send the link from your clipboard.
  5. Ask the device owners to click on the link to download and install the endpoint agent.
  6. Have the device owner report back to you when the installation is complete.
  7. Verify the endpoint displays on the Endpoints page.

Nebula Quick Start Guide

Learn how to setup and manage Nebula to protect your devices.

Thank you for becoming a Nebula customer!

Nebula is the perfect solution for monitoring and protecting your devices with ease and complete peace of mind.

Your Nebula environment comes pre-configured with our recommended default settings. These settings are designed to provide you with the best protection possible.

Here's what you can expect from Nebula.

Real-time Protection

Protection is always running, working hard to prevent any threats from executing on your devices.

Daily Scheduled Scans

We've set up automatic scans to run every day. This keeps your devices protected by checking for threats on a daily basis.

Automatic Software Updates

We’ve enabled automatic software updates to keep your security software up-to-date and equipped with the latest features.

Uninstall protection

We've taken extra measures to prevent unauthorized uninstallation. This ensures that your security software remains in place and protecting your devices.

Let’s take the first step towards enhancing your security.

Nebula Training and Certification

Gain knowledge and hands on experience to successfully implement Nebula and protect your business from cybersecurity threats.

Learn more