Manage Registration Tokens

Manage Registration Tokens

Logging in to the Cyber Protection Console

To manage registration tokens for your company, such as creating a new token to use for registering devices, you will start by going to console.esilo.com in your web browser. 

You may be prompted to log in, enter your email address and password to log in, followed by your authentication code. 

Alert
If you have not previously logged in and do not have an account activation email in your email inbox, your account may not have been configured yet. Please email support@esilo.com for assistance.

Next click on "Cyber Protection"



View Registration Tokens

To view the current registration tokens, click "Devices" on the left sidebar



Then click "+ Add" in the top right corner



Scroll the right side panel all the way down and click "Manage Active Tokens"



Here you can view current tokens and delete them if they are no longer in use. Note the entire token is not displayed, only the first two characters for reference. 

Generate a Token

To create a new registration token for use registering devices, click "Generate" at the bottom of the right side panel



Here you can specify the duration of time you would like the token to be valid for, up to 12 months. If there are multiple administrators configured for your company you can assign the registration code to a different administrator for management of those devices via the web console. If you are managing backup or security settings for your devices, you can select a Protection Plan to assign automatically to devices registered with the activation code. If your backup and security settings were configured by eSilo staff or an MSP partner, you can ignore the "Select Plan" option as appropriate settings will be applied automatically after registration or manually by eSilo staff or an MSP partner as needed. 

Click "Generate Token" to create your registration token



You can then conveniently copy the token to your clipboard by clicking "Copy" 

 

Warning
Note the full token will not be displayed again after you close the panel, so should be saved elsewhere if needed for future reference. 

    • Related Articles

    • Managing Backup and Security Settings

      Logging in to the Cyber Protection Console To manage registration tokens for your company, such as creating a new token to use for registering devices, you will start by going to console.esilo.com in your web browser. You may be prompted to log in, ...
    • Recovering Disks Using Bootable Media

      This article explains how to recover an entire disk using the bootable media, this is useful for recovering disks of a non-booting computer or recovering an entire disk after a malware incident. If you only need to recover files or folders to a ...
    • eSilo Cyber Protect Software Installation

      Click here to download the eSilo Cyber Protect software Click the above download link to download the eSilo software before proceeding with the following instructions. Getting Started Thank you for downloading eSilo's Cyber Protect software, this ...
    • Creating Bootable Media

      You can recover either Windows or Linux by using the same media. To recover macOS, create media on a device running macOS. For instructions on using bootable media to perform a recovery, use this article: ...
    • Configure Encryption as a Machine Property

      There are certain scenarios, such as for compliance reasons, where it may be required to configure backup encryption via the Cyber Protect application on a device rather than via the Cyber Protect Console. In this case, backup encryption is not ...