Setup guides • best practices • user rollout
Everything you need to deploy Vesper Secure in your environment
This documentation is your step-by-step playbook for getting Vesper configured, connected to your firewall, and rolled out to your users—fast. Follow the 3 steps below and you’ll be live in minutes.
Deployment model
3 steps. Clean rollout.
Configure Vesper → connect firewall → distribute user instructions.
Configure Vesper Secure
Integrate with your firewall
Distribute user instructions
Set up Vesper in 3 easy steps
Each step is a focused guide. Click a step to dive in.
Step 1
Configure Vesper Secure
Set your organization policies, decide how users authenticate (Entra or Manual), and generate your list URL and credentials.
Step 2
Integrate with your firewall
Add Vesper as an External Dynamic List (EDL), validate connectivity, and confirm policies are being enforced the way you expect.
Step 3
Distribute user instructions
Send your users clear “how to log in” instructions, what to expect, and how to troubleshoot. This step makes rollout smooth and support tickets rare.
Looking for something specific?
If you’re an admin, jump straight into the tenant management console. If you’re evaluating the product, use the homepage.