- How to monitor IDECSI’s App in your M365 environment
- How does IDECSI send messages to a SIEM ?
- How does IDECSI manage PowerBI Dashboards ?
- What are the Json formats used by IDECSI to send Syslog messages to a SIEM ?
- What are the Idecsi Alerting Use Cases by type / subtype ?
- What are the awareness items displayed in My Data Security ?
- How does IDECSI manage Authentication?
- Collected data list for Zimbra
- Collected data list for File Servers
- Collected data list for Azure Active Directory
- Collected data list for SharePoint, Teams, Yammer
- Collected data list for OneDrive
- Collected data list for Exchange 2010/2013/2016 & Office 365
- Global CyberSecurity FAQ (Certifications, Datacenter, Security, Data Security, SLAs, …)
- GDPR Inventory Sheet FAQ
- What is the difference between Microsoft Basic and Modern Authentication?
- How to correct collection problems related to the service account
- How I2A processes Mailbox Permissions and Mailbox Folder Permissions
- What is the mailbox audit level?
- Which protocols can be found in the logs?
- What are the Administration Roles?
- What are Alert types & subtypes?
- How to check your service account rights
- Power BI Dataset measure description
- How to create “Access from Prohibited IP’s” alert ?
- How to create a “Repeated Download” alert ?
- How to create a “Massive File Modified” alert ?
- How to create a “Move too fast” alert?
- How to create “Consecutive failed accesses” alert ?
- How to configure SSO using OKTA?
- How to receive notifications in case of user feedbacks on MyDataSecurity ?
- How to use a PowerBI Gateway
- How to set up automatic user import ?
- How to configure SSO using local ADFS?
- How to set up a conditional access policy without MFA?
- How to Edit the Display Language for a group of Users?
- How to create Recertification Campaigns?
- How to configure SSO using Azure Active Directory?
- How to create a permission rule
- How to create a new role group
- How to start an audit
- Which predicates can be defined for rules in I2A?
- How to add or change an IP range
- How to protect a new resource
- How to create a notification rule
- How to create a usage rule
- How to create and set up an Organization Unit
- How to use the advanced search in Permission Explorer
- How to handle Application Permissions?
- How to manage deleting a user from the Expert platform?
- How to handle an E-Discovery vs Content Search?
- How to use API with SIEM or SOAR
- How to reset in case of a LEM breakdown?
- How to shift users to a different OU?
- How to handle File Malware?
- How to handle Site Collection Admin?
- How to handle a Transport Rule ?
- How to handle Invalid State Report (ISR)?
- How to handle a Forbidden Activity?
- How to handle New Device Synchronisation?
- How to handle an Access from an Unusual Country?
- How to handle a New/ Unauthorized logon?
- How to handle Inbox rules set on a mailbox?
- How to handle an External or an Anonymous Sharing Set?
- How to handle a Mailbox Folder Permission?
- How to restart data collection via APIs
- How to export information related to your platform (users, OUs, rules, etc.)
- What is the GDPR button for?
- How to browse the collected data
- How to browse configuration objects
- How to export collected data
- How to import a user
- How to identify the type of users present in I2A
- How to unlock a locked account
- How to identify a mobile phone