Articles
- How to monitor IDECSI’s App in your M365 environment
- How does IDECSI send messages to a SIEM ?
- How does IDECSI manage PowerBI Dashboards ?
- What are the Json formats used by IDECSI to send Syslog messages to a SIEM ?
- What are the Idecsi Alerting Use Cases by type / subtype ?
- What are the awareness items displayed in My Data Security ?
- How does IDECSI manage Authentication?
- Collected data list for Zimbra
- Collected data list for File Servers
- Collected data list for Azure Active Directory
- Collected data list for SharePoint, Teams, Yammer
- Collected data list for OneDrive
- Collected data list for Exchange 2010/2013/2016 & Office 365
- Global CyberSecurity FAQ (Certifications, Datacenter, Security, Data Security, SLAs, …)
- GDPR Inventory Sheet FAQ
- What is the difference between Microsoft Basic and Modern Authentication?
- How to correct collection problems related to the service account
- How I2A processes Mailbox Permissions and Mailbox Folder Permissions
- What is the mailbox audit level?
- Which protocols can be found in the logs?
- What are the Administration Roles?
- What are Alert types & subtypes?
- How to check your service account rights