Getting Started
Admin guide
Instruction for use
Instruction for use
The user guide mainly introduces all the functional modules and operation instructions of SealSuite Admin Console, in order to help enterprise administrators quickly understand and use the SealSuite functions. This article provides a summary of the descriptions of all functional modules in the Admin Console, coupled with relevant topic links for your reference.

Introduction to SealSuite's Admin Console

  • The functional modules in the Admin Console will be displayed according to the actual SealSuite functions purchased by your enterprise.
  • All operations in the user guide must be completed by the enterprise administrator, and enterprise users do not have access to the Admin Console. If you need to set up SealSuite administrator permissions for enterprise users, you need to log in to the Admin Console for configuration. For more information, please refer to .

Operations in Admin Console

  • SealSuite provides a portal website and Admin Console.
  • For more information about the SealSuite Portal website, please refer to .
  • For more information about the homepage of Admin Console, please refer to .
  • For instructions on the use of the functions in the Admin Console, please refer to .

Function introduction

Function Module Description Related Documents
Identity Management The identity management module provides management capabilities of your enterprise’s subsidiaries, departments, members, and roles. It is a powerful management tool that provides integration with different platforms across the enterprise and supports the unified management of identities and authentication processes. It also provides fine-grained control over the full life cycle management of identities within your enterprise and automates authorization processes for all identity and access requests, thus strengthening the security of user accounts.
Application Management The application management module supports integrating third-party applications or custom applications into the Admin Console. These applications can be easily accessed by users though the single sign-on capability provided by SealSuite. With this module, you can set up an application gateway to proxy requests to layer 7, allowing employees to remotely access internal applications without the need to download SealSuite clients or establish VPN connections.
Wi-Fi Management The Wi-Fi management module provides you with the ability to set up a secured and stable wireless network or wired network within the enterprise. Building on the identity management capability, SealSuite helps you establish a Wi-Fi network that enables both employees and visitors to have secure access to the corporate network, and ensures one user can only connect to only one account. You can configure multiple permission groups for different network resources based on users’departments, roles or device statuses, determining the types of access that devices or users use to connect to the corporate network. In addition, you can connect dumb terminal devices to the corporate network via a wired network, and centrally manage the connected dumb devices in the Admin Console.
VPN Management SealSuite’s virtual private network (VPN) adpots the next generation network tunneling techniques and support UDP and TCP protocols, and automatic selections of nodes, ensuring user will have the optimal network experience. Besides, SealSuite is developed with multi-tier architecture, and can be used across multiple data centers. This reduces the potential disaster recovery risks a data center may face and ensures a highly stable and highly available network. In addition, you can centrally configure VPN nodes, and grant permissions for users to access specific VPN nodes or use specific network resources, ensuring a secure and efficient working environment.
Device Assets Device is an important tool that helps employees communicate and collaborate. In a digital workplace, the effective management of terminal devices, including desktop PCs and mobile devices, becomes ever more important in building a secure and efficient working environment. After enterprise users log in to the SealSuite client on their respective devices, SealSuite automatically collects the hardware information and software information from user devices. The collected information will be passed to other functions to support device-based operations, such as permission management, software distribution, or device security checkup and monitoring.
Device Control The device control module provides detection and monitoring capabilities of application-related risks, process-related risks, and security baselines for PCs and mobile phones that leveraging different operating systems. This module also offers the ability to configure detection rules and remediation plans, helping you better handle the detected security threats according to your security needs. Besides, with the help of identity management capability, SealSuite can provide configured remediation plans for users who own the devices that trigger the detection rules and record detected risk events in the Admin Console. This module also provides a holistic view of the security statuses of devices, helping you effectively locate at-risk devices.
Anti-virus Control SealSuite is integrated with various virus detection software developed by leading companies and provides device protection in risk scenarios where a potentially malicious document is downloaded, or a potentially malicious file is received via instant messaging applications installed on the SealSuite client. Equipped with well-practice virus detection software, SealSuite provides multiple protection modes, such as the scheduled monitoring mode, document scanning mode, real-time protection mode, and much more, which help you effectively detect and remediate security threats such as viruses, trojan horses or malware.
Dynamic Control The dynamic control module provides various built-in security rule templates for you to establish a dynamic control mechanism, greatly reducing the difficulty and cost of implementing enterprise security measures. The module is integrated with other functions, such as the identity management, network management, and device management capabilities. With this module, you can allow SealSuite to dynamically evaluate the security statuses of devices and respond to the specific security threats as defined by the dynamic rules in real-time. When the specified changes of device statuses or user actions occur, the configured dynamic control rules will be immediately triggered. To enable the dynamic decision-making mechanism provided by SealSuite, you only need to add parameter configurations and logical expressions to dynamic control rules under this module.
General Settings General settings integrate notifications, client settings and allowlist settings modules.
  • Notifications: You can configure an enterprise email gateway in the notification to unify the content format of the email notification; you can associate with a third-party IM robot to push the SealSuite notification to the third-party IM through the robot.
  • Client configuration: Combined with the enterprise security requirements, the security and startup mode of the SealSuite client can be configured to ensure the stable use of the SealSuite client by users.
  • Allowlist configuration: The allowlist is a global allowlist within SealSuite. You can set an allowlist for one or more functional modules. Users or devices within the effective range of the allowlist will not be affected by the rules of the specific functional modules.
IT Application The IT application function includes user feedback, help center, quick tools and software library capabilities, mainly to help enterprises improve the efficiency of network and equipment failure repair.
  • When a problem occurs, users can perform network diagnostics on the client, or seek answers to common questions in the help center, and resolve issues based on preset solutions or IT tools (such as DNS reset). For complex problems, you can use the client log provided by this module to further troubleshoot the cause of the problem.
  • The software library is used to enhance users' office experience. To satisfy the software needs of users who own devices with different operating systems, you can operate and maintain the software library in the Admin Console, allowing users to download their desired Mac or Windows software on the SealSuite clients.
Integration With integration, you can manage SealSuite OpenAPI AccessKey in a unified way, manage the operation of each component (RADIUS, VPN, application gateway, and branch site) and corresponding servers.
System Settings The system settings integrate System Settings, Branding, Audit Log and Admin Access Management modules.
  • System Settings: Manage basic enterprise information, obtains client installation links, and configures enterprise user agreements and privacy policies.
  • Branding: With this function, you can customize the client to align with your branding requirements.
  • Audit Log: You can view or send out various log data recorded by SealSuite, including user or administrator operation log, VPN connection and access log, Wi-Fi connection log and dumb terminal network connection log.
  • Admin Access Management: Manage SealSuite's administrators, scope of authority, and security rules in a unified manner.
License View the expiration date of SealSuite's services and modules, along with the usage situation of each module.
Versions This module is used to manage the versions of SealSuite clients installed on various operating systems. After you retrieve the latest version of the SealSuite client's software package from the SealSuite technical support team, you can add a new version using the retrieved software package in this module and synchronize this update to all SealSuite clients on user devices.