Introduction
🚀 Welcome to Myrmex! This guide was designed to provide a quick and productive initial experience, allowing you to explore the power of our platform from the very first moment.
Welcome to Myrmex
Your Journey Starts Here
Welcome to Myrmex, the security operations platform that centralizes and automates cybersecurity management. We are happy to have you on board and ready to transform your digital security experience.
What you will achieve with this guide
Main Objective
By the end of this guide, you will have a clear understanding of how to take your first steps in Myrmex. Our goal is to focus on high-value actions so you can see the platform’s benefits immediately.
You will interact with Centurion to orchestrate security analyses, strategic threat investigations, and executive intelligence reporting.
What you will learn
Essential Step by Step
Step 1: Connecting your First Device (Perseus)
🎯 Objective
Connect your devices to Myrmex to have complete visibility and control over your infrastructure.
Understanding Perseus
Perseus Specialist Agent
Centurion’s expert for endpoint management. It provides the visibility and technical execution required for orchestrated response across all your assets.
Initial Command
First Command
Use a simple command to list all devices already known by the platform:If no device is connected, Perseus will guide you through the process of registering a new agent.
Command:
perseus, list all computersStep 2: Performing your First Security Analysis (Perseus)
🎯 Objective
Verify the security posture of the connected device through collaboration between specialized agents.
Getting to Know the Agents
Perseus
The technical executor that runs commands directly on the device to collect security information.
Analysis Command
Analysis Command
Execute this command to perform a complete security analysis:
Command:
perseus, on device <DEVICE_NAME>, check pending security updates and analyze the result.Step 3: Investigating an External Threat (Iris & Orion)
🎯 Objective
Investigate external threats through collaboration between research and reconnaissance specialists to assess risks and protect your environment.
Understanding External Threats
Strategic Intelligence
Myrmex extends your defense beyond your own devices. Centurion orchestrates specialists like Iris and Orion to provide deep visibility into external threats.
Getting to Know the Specialists
Iris
Our research specialist who searches for information in open sources about threats associated with suspicious IPs, domains or emails.
Orion
Our reconnaissance analyst who tracks digital infrastructures and analyzes indicators of compromise.
Investigation Command
Collaborative Investigation
Execute this command to investigate an external threat:
Command:
orion, investigate the domain 'examplemaliciousdomain.com' and ask iris to search for related threat reports.Step 4: Generating your First Report (Scribe)
🎯 Objective
Transform technical data into professional executive reports to effectively communicate the results of security analyses.
Getting to Know Scribe
Documentation Specialist
Collecting data and analyses is fundamental, but communicating them effectively is what drives action. Scribe is Myrmex’s documentation and report generation specialist.
Scribe's Capabilities
Professional Reports
After other agents complete their analyses, Scribe can compile the results into an executive report, with charts, tables and explanatory texts. The entire process is automated to ensure professional finishing.
Generation Command
Report Command
Execute this command to generate your first executive report:
Command:
scribe, create a security assessment report with the data collected by perseus.Exploring Myrmex
Meet your Specialist Agents
Myrmex operates through a team of specialist agents, each with a unique function. Getting to know them will help you get the most out of the platform:Centurion
The master orchestrator. He understands your requests and coordinates other agents to execute the task.
Perseus
The endpoint specialist. Manages inventory and performs direct actions on devices, such as executing commands or analyzing files.
Iris
The researcher. Searches and verifies information on the internet to provide context about threats and vulnerabilities.
Orion
The reconnaissance specialist. Investigates threats, maps digital infrastructures and analyzes indicators of compromise.
Hydra
The integration specialist. Connects Myrmex to other security tools such as firewalls and cloud platforms.
Scribe
The report generator. I transform technical data into executive and professional reports.
Getting Help and Support
Complete Documentation
This guide focused on the first steps. For a deep dive into all functionalities, commands and agent capabilities, consult our complete documentation. It is the central resource for detailed information and advanced usage examples. You can access it at: docs.myrmex.ioTechnical Support
If you encounter any difficulties, have questions or need technical assistance, our support team is ready to help. Do not hesitate to contact us through our support portal or by email: Email: suporte@ainext.com.brPortal: soc.ainext.com.br