Articles
- How to use the advanced search in Permission Explorer
- How to handle Application Permissions?
- How to manage deleting a user from the Expert platform?
- How to handle an E-Discovery vs Content Search?
- How to use API with SIEM or SOAR
- How to reset in case of a LEM breakdown?
- How to shift users to a different OU?
- How to handle File Malware?
- How to handle Site Collection Admin?
- How to handle a Transport Rule ?
- How to handle Invalid State Report (ISR)?
- How to handle a Forbidden Activity?
- How to handle New Device Synchronisation?
- How to handle an Access from an Unusual Country?
- How to handle a New/ Unauthorized logon?
- How to handle Inbox rules set on a mailbox?
- How to handle an External or an Anonymous Sharing Set?
- How to handle a Mailbox Folder Permission?
- How to restart data collection via APIs
- How to export information related to your platform (users, OUs, rules, etc.)
- What is the GDPR button for?
- How to browse the collected data
- How to browse configuration objects
- How to export collected data
- How to import a user
- How to identify the type of users present in I2A
- How to unlock a locked account
- How to identify a mobile phone