Introduction
🚀 Welcome to Myrmex! This guide was designed to provide a quick and productive initial experience, allowing you to explore the power of our platform from the very first moment.
Welcome to Myrmex
Your Journey Starts Here
Welcome to Myrmex, the security operations platform that centralizes and automates cybersecurity management. We are happy to have you on board and ready to transform your digital security experience.
What you will achieve with this guide
Main Objective
By the end of this guide, you will have a clear understanding of how to take your first steps in Myrmex. Our goal is to focus on high-value actions so you can see the platform’s benefits immediately.
You will interact with Myrmex agents to perform security analyses, threat investigations, and executive report generation.
What you will learn
1
Connect Devices
Connect your first device and verify its status
2
Security Analysis
Perform an initial security analysis of the device
3
Threat Investigation
Consult information about external threats related to device characteristics
4
Executive Reports
Generate your first executive report
Essential Step by Step
Step 1: Connecting your First Device (Perseus)
🎯 Objective
Connect your devices to Myrmex to have complete visibility and control over your infrastructure.
1
Understanding Perseus
Perseus Agent
The device specialist. He is responsible for actions on all your assets, allowing analysis of status, operating system and other important details.
2
Initial Command
First Command
Use a simple command to list all devices already known by the platform:If no device is connected, Brontes will guide you through the process of registering a new agent.
Command:
brontes, list all computers3
Expected Result
Complete Visibility
After connecting a device, you will have complete access to status, operating system and important details, centralizing all management of your assets in one place.
Step 2: Performing your First Security Analysis (Perseus & Hermes)
🎯 Objective
Verify the security posture of the connected device through collaboration between specialized agents.
1
Getting to Know the Agents
Perseus
The technical executor that runs commands directly on the device to collect security information.
2
Analysis Command
Analysis Command
Execute this command to perform a complete security analysis:
Command:
perseus, on device <DEVICE_NAME>, check pending security updates and ask hermes to analyze the result.3
Intelligent Collaboration
🤝 Teamwork
This command demonstrates how Myrmex agents work together to transform raw data into actionable security intelligence, providing a complete view of the security posture.
Step 3: Investigating an External Threat (Iris & Orion)
🎯 Objective
Investigate external threats through collaboration between research and reconnaissance specialists to assess risks and protect your environment.
1
Understanding External Threats
Security Beyond Devices
Security is not limited to your own devices. It is crucial to understand external threats that can affect your environment. Iris and Orion work together to investigate the digital world.
2
Getting to Know the Specialists
Iris
Our research specialist who searches for information in open sources about threats associated with suspicious IPs, domains or emails.
Orion
Our reconnaissance analyst who tracks digital infrastructures and analyzes indicators of compromise.
3
Investigation Command
Collaborative Investigation
Execute this command to investigate an external threat:
Command:
orion, investigate the domain 'examplemaliciousdomain.com' and ask iris to search for related threat reports.4
Investigation Result
Actionable Intelligence
With this capability, you can quickly assess external risks and make informed decisions to protect your environment, transforming investigations into proactive security actions.
Step 4: Generating your First Report (Scribe)
🎯 Objective
Transform technical data into professional executive reports to effectively communicate the results of security analyses.
1
Getting to Know Scribe
Documentation Specialist
Collecting data and analyses is fundamental, but communicating them effectively is what drives action. Scribe is Myrmex’s documentation and report generation specialist.
2
Scribe's Capabilities
Professional Reports
After other agents complete their analyses, Scribe can compile the results into an executive report, with charts, tables and explanatory texts. The entire process is automated to ensure professional finishing.
3
Generation Command
Report Command
Execute this command to generate your first executive report:
Command:
scribe, create a security assessment report with the data collected by hermes and perseus.4
Final Result
✅ Executive Document
In minutes, you will have a PDF document ready to be shared with managers and teams, transforming technical data into strategic insights that drive security actions.
Exploring Myrmex
Meet your Specialist Agents
Myrmex operates through a team of specialist agents, each with a unique function. Getting to know them will help you get the most out of the platform:Centurion
The master orchestrator. He understands your requests and coordinates other agents to execute the task.
Brontes
The infrastructure specialist. Manages the inventory of all your devices (Windows, Linux, macOS).
Perseus
The technical executor. Performs direct actions on devices, such as executing commands or analyzing files.
Iris
The researcher. Searches and verifies information on the internet to provide context about threats and vulnerabilities.
Orion
The reconnaissance specialist. Investigates threats, maps digital infrastructures and analyzes indicators of compromise.
Hydra
The integration specialist. Connects Myrmex to other security tools such as firewalls and cloud platforms.
Scribe
The report generator (me!). I transform technical data into executive and professional reports.
Getting Help and Support
Complete Documentation
This guide focused on the first steps. For a deep dive into all functionalities, commands and agent capabilities, consult our complete documentation. It is the central resource for detailed information and advanced usage examples. You can access it at: docs.myrmex.ioTechnical Support
If you encounter any difficulties, have questions or need technical assistance, our support team is ready to help. Do not hesitate to contact us through our support portal or by email: Email: [email protected]Portal: soc.ainext.com.br