How can we secure your journey?
Access our comprehensive knowledge base, technical documentation, and expert community to resolve any security challenge.
search
rocket_launch
Getting Started
Master the essentials of your first deployment and initial environment configuration.
EXPLORE GUIDE arrow_forward
shield_locked
Security Engines
Deep dive into real-time scanning algorithms, firewall rules, and threat detection engines.
SYSTEM ARCHITECTURE arrow_forward
verified_user
Privacy & Data
Learn about our zero-knowledge encryption models and GDPR-compliant data handling.
PRIVACY POLICIES arrow_forward
manage_accounts
Account
Manage multi-factor authentication, team permissions, and billing subscriptions.
USER PORTAL arrow_forward
Frequently Asked Questions
Getting Started
What is SentinelX and how does it work?
SentinelX is an advanced cybersecurity application that uses AI to detect phishing attacks, deepfake content, and steganographic threats. It analyzes files, images, and text in real-time to protect you from various cyber threats.
How do I start scanning files?
You can start scanning by navigating to the scan section and either uploading files, pasting text, or using drag-and-drop functionality. The AI will automatically analyze the content for threats.
Is my data safe when using SentinelX?
Yes, your privacy is our priority. All scans are processed locally on your device when possible, and any data sent to our servers is encrypted and immediately deleted after analysis.
What file types are supported?
SentinelX supports images (JPG, PNG, GIF), documents (PDF, DOC, TXT), audio files (MP3, WAV), video files (MP4, AVI), and various other formats for comprehensive threat detection.
Threat Detection
How accurate is the phishing detection?
Our AI-powered phishing detection has an accuracy rate of over 98%. It analyzes URL patterns, content structure, and behavioral indicators to identify potential threats.
What are deepfakes and how does detection work?
Deepfakes are AI-generated fake videos or images. Our system uses advanced neural networks to detect inconsistencies in facial features, lighting, and compression artifacts that indicate manipulation.
What is steganography detection?
Steganography is the practice of hiding data within other files. Our detection analyzes file structures, metadata, and statistical anomalies to find hidden content in images, audio, or documents.
Can I adjust detection sensitivity?
Yes, you can adjust sensitivity levels in the scan settings. Higher sensitivity may catch more threats but could result in more false positives, while lower sensitivity reduces false alarms.
Features & Settings
How do I set up scheduled scans?
Go to Settings > Scheduled Scans to configure automatic daily or weekly scans. You can set specific times and choose between quick scans or comprehensive deep scans.
What are the different notification types?
SentinelX offers threat alerts, scan completion notifications, security updates, and system status notifications. You can customize each type in the notification settings.
How does two-factor authentication work?
Enable 2FA in Security Settings to add an extra layer of protection. You can use authenticator apps, SMS, or email verification for enhanced account security.
Can I export scan results?
Yes, scan results can be exported as PDF reports or CSV files for documentation purposes. This feature is available in the scan history section.
Troubleshooting
Why is scanning taking so long?
Scan duration depends on file size, complexity, and detection depth. Large files or comprehensive scans take longer. Enable battery optimization to balance speed and thoroughness.
The app is not detecting threats I know exist
Try updating the threat database, increasing detection sensitivity, or running a deep scan. Some sophisticated threats may require manual analysis or expert consultation.
I'm getting too many false positive alerts
Lower the detection sensitivity in scan settings, or add trusted sources to the whitelist. You can also train the AI by marking false positives in your scan history.
How do I update the threat database?
The database updates automatically when connected to the internet. You can also manually trigger updates in Settings > Database Updates for the latest threat signatures.
Still need help from an expert?
Our dedicated security operations team is available 24/7 to assist with critical incidents and technical troubleshooting.