Quick Start
This guide will help you, starting from your first login, quickly master how to customize your homepage layout, receive important platform messages, and manage your underlying account preferences.
Prerequisites
- You have obtained an official basic access account and initial password for the BK-Lite platform.
- The system administrator has completed your basic identity registration and assigned specific application usage roles (such as Monitoring, OpsPilot, etc.) with viewing permissions.
Step-by-Step Guide
1. First Login and Card Subscription
Preparation steps for when you first enter the portal with valid credentials.
- After accessing the platform through your system credentials on the login page, as a brand-new account, you may see an initialization first-load prompt window. Follow the system default guidance and click to complete the basic setup.
- Upon entering the homepage, you may see several default "application cards" presented according to system distribution rules (e.g., "Basic Monitoring" or "CMDB").
- Click the "Customize Settings" button or similar function on the page.
- In the application sorting panel, you can drag and hide infrequently used applications, or drag the primary systems you need most frequent access to for your role (such as "Operations Workbench") to the top position. Finally, click "Save."
2. Account and Personal Preference Management
Ensure notifications are delivered to the correct email and maintain international timezone alignment.
- Find and click your profile avatar in the upper right corner, then select "Personal Information" management page from the dropdown menu.
- If you collaborate across international regions, you can modify the page display "Language" and system default "Timezone" here to ensure data and log timestamps display without offset discrepancies.
- If necessary, you can modify the email address bound to your personal account. During this process, you will need to complete security verification through the old email verification code or identity credential review.
3. Handling Historical Password Compliance
Strengthening weak passwords based on company audit requirements or routine maintenance.
- In the security management section of the personal information page, click "Change Password."
- Make changes according to the dynamic "security policy requirements" presented by the frontend (which may require: minimum 12 characters, including special characters and mixed-case letters, etc.).
- Save and it is recommended to try logging in again.
Result Verification and Closure
After completing the setup and system familiarization, you can verify and close the loop during daily work:
- Refresh the current system console homepage to observe: whether your configured core dashboard applications are arranged in your visual first position, and whether irrelevant cards have been completely filtered out of the visible range.
- Try clicking any application and entering it. From the icon in the upper left corner, you can quickly switch back to this "main control portal."
- When you leave the main site or re-enter after some time, if you notice a red badge or number indicator appearing at the top of the console, click the "notification bell" next to the avatar. In the "Notification Center" popup, review the specific system notifications you need to follow up on. If you confirm that the batch of events poses no potential risk, you can directly click "Mark All as Read" to complete the business audit follow-up loop.