This home page contains your MyDataSecurity Dashboard, where you’ll find the following items:
☑ Navigation tools for easy access to the security elements of your Microsoft 365 environment
☑ A summary of identified points of attention that need to be reviewed
☑ Your synchronized devices
☑ Your usual countries of connection
☑ Additional corporate resources to help you master your MyDataSecurity profile.
You can choose the language among 15 possibilities if you click on the country logo. If you click on your profile picture, you can access information about your profile, such as the operations history, or your account information (name, phone number, etc.)
Access tabs to your protected Microsoft 365 applications. The presence of a red dot indicates the presence of important points of attention;
Points of attention (POAs) highlight the most significant security threats in your profile, for example:
☑ Sharing of sensitive files based on the labels provided by your classification system (AIP/MIP)
☑ External, anonymous, extended file sharing
☑ External e-mail transfers
☑ Etc.
when you open your profile, you might see a blue rectangle with information about your POAs. If you don’t see this menu, please go directly to the next tab “Points of Attention (POAs)”
Click on “Start Security Checkup” to begin the process :
You will then be guided through different pages, depending on the nature of your POAs. Here are some information you will find in each page :
When you reach the end of the Security Checkup, you will get to this screen :
Points of attention (POAs) highlight the most significant security threats in your profile, for example:
☑ Sharing of sensitive files based on the labels provided by your classification system (AIP/MIP)
☑ External, anonymous, extended file sharing
☑ External e-mail transfers
☑ Etc.
when you open your profile, you might see a white rectangle with the list of your POAs. If you don’t see this menu, please go directly to the previous tab “Security Checkup”
Click on synchronizations to access the list of devices or applications (computer, mobile, tablet, etc.) where your mailbox has been synchronized.
It is also possible to check the “Report an anomaly to security team” box if a connection seems suspicious.
As for countries :
You can select a device and click on “delete” if you no longer plan to connect from it.
You can also check the box “Report an anomaly to the security team” if a connection seems suspicious (*).
*This deletion and reporting option is available for all points of attention / permissions / security risks displayed on MyDataSecurity, and will no longer be specified in this document
(Optional) Additional resources to help you get the most out of MyDataSecurity
*These options are only available for IDECSI Advanced® (and not for IDECSI Detox®)