Logging in to the Cyber Protection Console
To manage registration tokens for your company, such as creating a new token to use for registering devices, you will start by going to
console.esilo.com in your web browser.
You may be prompted to log in, enter your email address and password to log in, followed by your authentication code.

If you have not previously logged in and do not have an account activation email in your email inbox, your account may not have been configured yet. Please email
support@esilo.com for assistance.
Next click on "Cyber Protection"
View Registration Tokens
To view the current registration tokens, click "Devices" on the left sidebar
Then click "+ Add" in the top right corner
Scroll the right side panel all the way down and click "Manage Active Tokens"
Here you can view current tokens and delete them if they are no longer in use. Note the entire token is not displayed, only the first two characters for reference.
Generate a Token
To create a new registration token for use registering devices, click "Generate" at the bottom of the right side panel
Here you can specify the duration of time you would like the token to be valid for, up to 12 months. If there are multiple administrators configured for your company you can assign the registration code to a different administrator for management of those devices via the web console. If you are managing backup or security settings for your devices, you can select a Protection Plan to assign automatically to devices registered with the activation code. If your backup and security settings were configured by eSilo staff or an MSP partner, you can ignore the "Select Plan" option as appropriate settings will be applied automatically after registration or manually by eSilo staff or an MSP partner as needed.
Click "Generate Token" to create your registration token
You can then conveniently copy the token to your clipboard by clicking "Copy"

Note the full token will not be displayed again after you close the panel, so should be saved elsewhere if needed for future reference.
Related Articles
Managing Backup and Security Settings
Logging in to the Cyber Protection Console To manage registration tokens for your company, such as creating a new token to use for registering devices, you will start by going to console.esilo.com in your web browser. You may be prompted to log in, ...
Recovering Disks Using Bootable Media
This article explains how to recover an entire disk using the bootable media, this is useful for recovering disks of a non-booting computer or recovering an entire disk after a malware incident. If you only need to recover files or folders to a ...
eSilo Cyber Protect Software Installation
Click here to download the eSilo Cyber Protect software Click the above download link to download the eSilo software before proceeding with the following instructions. Getting Started Thank you for downloading eSilo's Cyber Protect software, this ...
Creating Bootable Media
You can recover either Windows or Linux by using the same media. To recover macOS, create media on a device running macOS. For instructions on using bootable media to perform a recovery, use this article: ...
Configure Encryption as a Machine Property
There are certain scenarios, such as for compliance reasons, where it may be required to configure backup encryption via the Cyber Protect application on a device rather than via the Cyber Protect Console. In this case, backup encryption is not ...