# Changelog

{% updates format="full" %}
{% update date="2026-04-15" %}

## Email Exchanges on Alerts and Vulnerabilities

Vulnerability and alert side panels now display related email exchanges between Stoïk SOC and your organization.

When Stoïk SOC sends a notification, requests information, or shares resolution details about an alert or vulnerability, the email thread is now visible directly in the side panel — alongside the alert details.

The email exchanges section only appears when related emails exist.

<figure><img src="/files/RgMFcuSOW2BNL75fhWgB" alt=""><figcaption></figcaption></figure>

**Available on:**

* External Scan vulnerabilities
* MDR alerts
* Email Security alerts

**Learn more:**

* [How to read MDR results?](https://docs.stoik.io/stoik-mdr/how-to-read-mdr-results)
* [How to read Email Security results?](https://docs.stoik.io/email-security/how-to-read-email-security-results)
* [How to read results on the External Scan?](https://docs.stoik.io/prevention-tools/what-is-the-external-scan/how-to-read-results-on-the-external-scan)
  {% endupdate %}

{% update date="2026-04-10" %}

## MDR Alerts Enrichment

Stoïk Protect now displays richer information on MDR and Email Security alerts, giving you a complete view of what was detected and how it was handled — directly from your dashboard.

#### What's new

**Alert details**

* Description: each alert now includes a description of what was detected, retrieved directly from the security provider.
* History: alerts show their full lifecycle with timestamps (creation, confirmation, processing, closure), so you can follow exactly how and when the alert was handled. \
  \&#xNAN;*Available on MDR and Email Security alerts.*
* Analyst notes: Stoïk SOC analysts can now add notes to alerts with additional context on their investigation and resolution. \
  \&#xNAN;*Available on MDR and Email Security alerts.*
* Email exchanges: alert-related email communications are now displayed alongside the alert. \
  \&#xNAN;*Available on MDR alerts, Email Security alerts, and External Scan vulnerabilities.*

**Monitored Hosts & Users**

* Users: displays all monitored users with their status (Active/Inactive), risk level (High/Medium/Low), risk score (0–10), and attributes (Marked User, Watched User, Honeytoken). \
  \&#xNAN;*Currently available for Identity Security on CrowdStrike clients.*
* Hosts enrichment: host pages now show additional information including the last logged-in user name and email for mobile devices.

**Learn more**

* [How to read MDR results?](https://docs.stoik.io/stoik-mdr/how-to-read-mdr-results)
* [How to read Email Security results?](https://docs.stoik.io/email-security/how-to-read-email-security-results)
* [How to read the Hosts table?](https://docs.stoik.io/stoik-mdr/how-to-read-the-hosts-table)
* [How to read the Users table?](https://docs.stoik.io/stoik-mdr/how-to-read-the-users-table)
  {% endupdate %}

{% update date="2026-04-07" %}

## Cloud Scan: Major Update

The Cloud Scan experience has been revamped from onboarding to results.

<div><figure><img src="/files/tCxsgfBuqAgU1wzOHnkn" alt=""><figcaption></figcaption></figure> <figure><img src="/files/XNsjleo0X5k1JIsdFWom" alt=""><figcaption></figcaption></figure></div>

#### **What’s new**

**Onboarding & Settings**

* New dedicated onboarding flow for Entra ID with step-by-step instructions
* Revised onboarding instructions for all providers (AWS, Azure, Entra ID, GCP)
* Smoother and more reliable connection flow for Azure and Entra ID
* New Settings page showing all connected providers with their status and last sync date
* Ability to reset a stuck tenant setup directly from the interface

**Results**

* Only detected misconfigurations are now displayed for a cleaner, more focused view
* Each misconfiguration now shows a criticality level (Critical, High, Medium, Low) to help you prioritize
* Descriptions available in all supported languages
* Security score now displayed on a 100-point scale
* Export your results in CSV or XLS format

**Bug fixes**

* Improved accuracy of Entra ID vulnerability detection (handling of disabled accounts and MFA-related findings)
  {% endupdate %}

{% update date="2026-01-16" %}

## Introducing Phishing 2.0

Phishing 2.0 is the new generation of phishing simulations in Stoïk Protect.\
It brings more reliable email delivery, more flexible campaigns, and deeper visibility, while ensuring a smooth transition from the previous version.

#### **What’s new**

**Built to scale with your organization**

* Multi-tenant support to connect multiple Google Workspace and/or Microsoft 365 environments
* Target specific employee groups created in advance

**More control over your phishing simulations**

* Launch multiple phishing campaigns at the same time
* Choose between one-shot or recurring campaigns

**More realistic and precise simulations**

* Select specific phishing scenarios instead of generic templates
* Phishing emails have been reworked to closely match real-world emails, increasing realism and effectiveness

**Clearer insights, better reporting**

* Access detailed data and visual graphs to track performance over time
* Measure employee behavior and campaign impact at a glance

**A smoother, redesigned experience**

* Fully revamped UX/UI
* Faster setup, easier navigation, and clearer actions across the entire phishing module

#### **Important prerequisites**

To use Phishing 2.0, you need:

* Google Workspace or Microsoft 365
* Employee synchronization via your email provider
* Authorization for Stoïk to send phishing emails via API

**Transition timeline**

* Existing phishing setups are automatically transposed to Phishing 2.0
* If your setup does not meet the prerequisites, phishing emails will continue during a transition period.
* At the end of the transition period, phishing simulations will stop until the setup is completed.

#### **Learn more**

* [Phishing module setup](https://docs.stoik.io/prevention-tools/what-is-the-phishing-module/phishing-module-setup)
* [How to launch a phishing campaign?](https://docs.stoik.io/prevention-tools/what-is-the-phishing-module/how-to-launch-a-phishing-campaign)
* [Understanding phishing results and performance](https://docs.stoik.io/prevention-tools/what-is-the-phishing-module/understanding-phishing-results-and-performance)
* [Managing employees and groups](https://docs.stoik.io/prevention-tools/what-is-the-phishing-module/managing-employees)

Your Stoïk CSM is available to help you get started.
{% endupdate %}

{% update date="2026-01-09" %}

## Email Security: Contract Request

<figure><img src="/files/qdwBASYQ1wIvbEM2E8xH" alt=""><figcaption></figcaption></figure>
{% endupdate %}

{% update date="2026-01-06" %}

## Email Security: Free Trial

<figure><img src="/files/qdwBASYQ1wIvbEM2E8xH" alt=""><figcaption></figcaption></figure>

#### **Overview**

You can now activate Stoïk Email Security with a 1-month free trial directly from Stoïk Protect.\
The free trial gives you access to the full Email Security experience, allowing you to evaluate the solution in real conditions — with real alerts and expert monitoring — before committing to a paid subscription.

#### **Why It Matters**

* Try before you commit: Experience the value of Email Security with live detection and real-world usage.
* Full feature access: The free trial includes the same detection, alerting, and SOC handling as the paid version.
* Make an informed decision: Assess the impact of Email Security on your email risk posture with concrete data and insights.

#### **How It Works**

**1. Activate the Free Trial**

In Stoïk Protect, go to the `Email` tab and activate the Email Security Free Trial directly from the interface.

**2. Connect your mailbox**

Connect your email environment (Microsoft 365, or Google Workspace) in just a few steps. For detailed setup instructions, see: [How to set-up Email Security?](https://help.stoik.io/en/how-to-set-up-email-security?hsLang=en)

**3. Receive alerts and SOC handling**

Once connected:

* Suspicious emails and account compromise signals are detected in real time.
* Alerts appear in Stoïk Protect exactly as they do for paying customers.
* All alerts are reviewed and handled by the Stoïk SOC, ensuring expert investigation and response.

**4. Stay informed during the trial**

You will receive automated emails at key moments:

* When the free trial starts
* One week before the trial ends
* When the trial period is over

These reminders help you track progress and decide on next steps.

<mark style="color:$info;">To continue protecting your inbox and receive a tailored quote, book a quick call with a Stoïk Cyber Sales by clicking on</mark> <mark style="color:$info;"></mark><mark style="color:$info;">`Get a quote`</mark>

&#x20;
{% endupdate %}

{% update date="2025-12-03" %}

## Email Security: Coverage to All Microsoft O365 Licences

#### **Overview**

Email Security now supports all Microsoft O365 license types. All eligible mailboxes can access the same Email Security features, with no need to worry about license compatibility.

Depending on the Microsoft license type (detected automatically during setup), you may be asked to complete one or two additional configuration steps to finalize the connection.

#### **Why It Matters**

* **Simplified eligibility:** All Microsoft O365 licenses are now supported for Email Security.
* **Consistent protection:** Every eligible mailbox gets access to the same monitoring and detection capabilities.
* **Guided setup:** Stoïk Protect automatically identifies the right setup path and guides you step by step.

#### **How It Works**

**1. Connect your Microsoft 365 mailbox**\
In Stoïk Protect, start the Email Security setup and connect your Microsoft 365 mailbox.

**2. Accept permissions in Microsoft 365**\
In the Microsoft authentication pop-up, review and accept the requested permissions.

**3. Follow the in-app guided setup path**\
Stoïk Protect automatically detects your license type and redirects you to the correct setup flow:

* **Case 1 — No action needed**\
  You are directly redirected to the results page.
* **Case 2 — Minimal action required**\
  You need to click “Start recording user and admin activity” in Microsoft Purview.
* **Case 3 — Full setup required**\
  You need to configure Purview access, then click “Start recording user and admin activity”.

For the full onboarding guide, refer to [How to set-up Email Security?](https://help.stoik.io/en/how-to-set-up-email-security?hsLang=en)<br>
{% endupdate %}

{% update date="2025-11-25" %}

## Table Component Revamp

#### **Overview**

The table component across Stoïk Protect has been fully redesigned to provide a smoother, faster, and more intuitive experience when navigating large datasets.\
This update significantly improves readability and interaction, offering users a more fluid and efficient way to explore information.

#### **Why It Matters**

* **Improved readability:** A cleaner, more modern design makes large datasets easier to scan and interpret.
* **Faster navigation:** Infinite scrolling replaces pagination for seamless, uninterrupted browsing.
* **Enhanced usability:** Updated embedded elements (badges, user chips, etc.) and expandable columns make data exploration more flexible.
* **Better control:** Users can now export the content of a table at any time using the export button located next to the search bar.

#### **How It Works**

**1. Modernized Interface**

Tables now feature a refreshed UI with improved spacing, contrast, and typography to ensure optimal readability across the platform.

**2. Updated Embedded Components**

Badges, chips, and other in-table components have been restyled for consistency and enhanced clarity.

**3. Expandable Columns**

Columns can now be expanded on demand to display additional information without cluttering the main view.

**4. Infinite Scroll**

Pagination has been replaced with infinite scrolling, allowing smooth access to large volumes of data.

**5. Export Tables Easily**

Users can export a table’s content at any time by clicking on the `...` button located next to the table’s search bar.

<img src="https://help.stoik.io/hs-fs/hubfs/CleanShot%202025-11-25%20at%2019-26-16@2x-png.png?width=2880&#x26;height=1796&#x26;name=CleanShot%202025-11-25%20at%2019-26-16@2x-png.png" alt="" width="563">

<br>
{% endupdate %}

{% update date="2025-11-13" %}

## Email Security: Display of Monitored Mailboxes

#### **Overview**

Users of Stoïk Email Security can now access a complete list of all monitored mailboxes directly in Stoïk Protect.\
This new view gives you full visibility into the mailboxes being analyzed for Business Email Compromise (BEC) indicators and whose inbound and outbound traffic is monitored for signs of potential fraud.

Each monitored mailbox now includes key details to help you track and understand its status at a glance:

* User
* Email address
* Associated tenant
* Status (*Active / Inactive*)

If a mailbox becomes Inactive, simply hover over the status to see the reason — making it quick and easy to identify and troubleshoot the issue.

#### **Why It Matters**

* **Visibility:** Know exactly which mailboxes are being actively protected by Stoïk Email Security.
* **Clarity:** Understand instantly why a mailbox might be inactive, with contextual explanations.
* **Efficiency:** Reduce support requests and investigation time with self-service transparency.

#### **How It Works**

**1. Access the Mailboxes List**

In Stoïk Protect, navigate to Email > Mailboxes.\
You’ll see a list of all mailboxes currently monitored by Stoïk Email Security.

**2. Review Mailbox Details**

For each mailbox, the following information is displayed:

* **User:** The associated account owner.
* **Email address:** The exact monitored address.
* **Tenant:** The Microsoft 365 tenant linked to the mailbox.
* **Status:** Indicates whether the mailbox is *Active* or *Inactive*.

**3. Check Inactive Mailboxes**

If a mailbox is marked **Inactive**, hover over the status to view the reason — for example:

* Connection expired
* Access revoked
* Temporary sync issue

This makes it easy to identify configuration or permission problems without contacting Stoïk support.

#### **What’s New**

| Improvement                    | Description                                                                                  |
| ------------------------------ | -------------------------------------------------------------------------------------------- |
| **Mailbox visibility**         | View the full list of mailboxes monitored by Stoïk Email Security directly in Stoïk Protect. |
| **Status details**             | Hover over inactive mailboxes to see the cause and take action.                              |
| **Centralized monitoring**     | Easily track users and tenants under active email protection.                                |
| **Reduced support dependency** | Diagnose inactive mailboxes quickly and independently.                                       |

<br>
{% endupdate %}

{% update date="2025-11-12" %}

## In-app product announcements

Stoïk Protect now includes in-app product announcements to keep you informed of new features, improvements, and key updates — directly where you work.

### Why It Matters New change&#x20;

* Visibility: Users are now informed of changes as they happen, directly inside Stoïk Protect.
* Clarity: Updates are explained with context, so you understand what changed and why.
* Engagement: Discover and adopt new features faster, without relying on external communications.
* Autonomy: Stay up to date without needing to contact Stoïk’s CSM team.

<a href="/spaces/aDGGQ49Oui29Ft0kJjSm/pages/444d52cbc7887ceafa2494a0a7ad2fc0c307c527" class="button primary">Read more</a>
{% endupdate %}

{% update date="2025-10-30" %}

## MDR: Deployment on Mobile Devices from Stoïk Protect

#### **Overview**

You can now deploy your **Managed Detection & Response (MDR)** licenses directly on **mobile devices** from the Stoïk Protect interface.

No more support requests — your team can activate protection across phones and tablets in just a few clicks.

#### **Why It Matters**

* **Empower your team:** Gain full autonomy to deploy MDR on mobile.
* **Save time:** No more waiting for manual setup by Stoïk.
* **Stay protected everywhere:** Extend your detection and response coverage to mobile devices seamlessly.

#### **How It Works**

1. **Open Stoïk Protect**

   Go to **Endpoint > Settings**.
2. **Deploy to Mobile**

   Under the **Mobiles** section, click **Deploy**.
3. **Add Employees**
   * Enter their email addresses manually, or
   * Upload a CSV file.
4. **Automatic Email Invitation**

   Each employee receives a personalized email containing a **QR code**.
5. **Activate on Mobile**

   On their mobile device, the employee should:

   * Download the **CrowdStrike Falcon** app.
   * Open it and **scan the QR code** received by email.
6. **Done!**

   The EDR automatically installs, and the device appears in your **monitored hosts** list in Stoïk Protect.

<br>
{% endupdate %}

{% update date="2025-10-28" %}

## Vulnerability & Asset Management Revamp

#### **Overview**

The vulnerability and asset management experience in **Stoïk Protect** has been completely redesigned to make it more intuitive and aligned with modern vulnerability management practices.

You can now discard vulnerabilities or assets, verify remediations, and track their lifecycle — all directly from Stoïk Protect.

#### **Why It Matters**

* **Simplified workflow:** Manage vulnerabilities and assets directly from your scan results.
* **Better visibility:** Understand the full lifecycle and review status of every vulnerability.
* **Faster handling:** Reduced manual review for Stoïk CERT — more automation for you.

#### **How It Works**

#### **1. Discard Vulnerabilities or Assets**

From your scan results in Stoïk Protect, you can now exclude items directly:

* Select a **vulnerability** or an **asset**.
* Click **Exclude** in the new sticky footer.
* Choose a discard reason:
  * **Risk accepted**
  * **Third-party risk**
  * **False positive**

Depending on the severity:

* If the vulnerability is **CRITICAL/HIGH**, or linked to an asset that is, it will first be **reviewed by a CERT analyst**.
* Otherwise, it will be **automatically discarded**.

The status updates in real time as your request progresses.

#### **Verify Vulnerability Remediation**

When a patch has been applied, you can confirm it directly in Stoïk Protect:

* Select the vulnerability.
* Click **Verify**.
* Stoïk Protect automatically **re-launches a scan** for that asset.

If the issue is fixed, it disappears from the list and no longer impacts your risk score.

If not, it remains **Active** until resolved.

#### **Status Definitions**

| Status              | Meaning                                                                                        |
| ------------------- | ---------------------------------------------------------------------------------------------- |
| **ACTIVE**          | The vulnerability or asset is currently detected.                                              |
| **CERT REVIEW**     | Waiting for Stoïk CERT validation before discard is applied.                                   |
| **TO BE DISMISSED** | Temporary state (2–3 minutes) before discard is finalized.                                     |
| **DISMISSED**       | The vulnerability/asset has been successfully discarded and remains visible in the main table. |

#### **What’s New**

| Improvement                  | Description                                                                                        |
| ---------------------------- | -------------------------------------------------------------------------------------------------- |
| **Simplified UX**            | A new sticky footer with **Exclude** and **Verify** buttons replaces the old discard request flow. |
| **Clear discard categories** | Standardized reasons: Risk accepted, Third-party risk, False positive.                             |
| **More automatic discards**  | Vulnerabilities below HIGH severity are now automatically discarded.                               |
| **Verify remediation flow**  | Click **Verify** to re-scan and validate that a vulnerability is patched.                          |
| **Unified view**             | Discarded vulnerabilities and assets now remain visible in the same table — no more separate tab.  |

<br>
{% endupdate %}

{% update date="2025-10-14" %}

## MDR: Host Uninstallation from Stoïk Protect

#### **Overview**

You can now **uninstall MDR agents directly from Stoïk Protect** — whether your endpoints are protected by **CrowdStrike** or **SentinelOne**.

This enhancement gives you **full control** over your MDR lifecycle, from deployment to removal, without needing Stoïk assistance.

#### **Why It Matters**

* **Autonomy:** Manage agent removal directly from Stoïk Protect.
* **Security:** Maintain proper authorization via MFA and token validation where required.
* **Visibility:** Keep your endpoint inventory clean and up-to-date with clear host statuses.

#### **How It Works**

#### **1. Access the Host List**

* In **Stoïk Protect**, navigate to **Endpoints > Hosts**.
* Locate the host you want to uninstall.

#### **2. Initiate the Uninstallation**

* **MFA must have been enabled for at least 2 weeks** on your account to create a valid token.
* Click **Uninstall Agent** from the host’s action menu.

#### **3. Uninstall**

The uninstallation process varies according to your provider:

* **Uninstallation of CrowdStrike MDR agents** requires a manual action with a token
* **Uninstallation of SentinelOne MDR agents** is fully automated from Stoïk Protect

#### **3. a. Uninstall CrowdStrike Agents**

* The CrowdStrike uninstallation token is displayed in the pop-in
* You can follow those instructions to manually uninstall the agent, using this token

#### **3. b. Uninstall SentinelOne Agents**

* No token or manual steps are required.
* Stoïk Protect handles the entire removal flow automatically once you confirm the action.

#### **4. Monitor the Progress**

* The host’s status updates in real time:
  * **Uninstalling** while the process runs.
  * **Inactive** once the agent is fully removed and stops reporting.

#### **Host Statuses**

| Status           | Description                                                           |
| ---------------- | --------------------------------------------------------------------- |
| **Active**       | The agent is online and reporting normally.                           |
| **Uninstalling** | The uninstallation has been triggered from Stoïk Protect.             |
| **Inactive**     | The agent has been removed or hasn’t reported activity for 30 + days. |
| {% endupdate %}  |                                                                       |

{% update date="2025-10-08" %}

## Stoïk Protect Onboarding: To-do List

#### **Overview**

We’ve redesigned the onboarding experience in **Stoïk Protect** to make it clearer, more guided, and immediately actionable.

The former **Get Started** tab has been replaced with a **personalized To-do List** embedded directly into the **Home** tab, so every user knows exactly what to do next to get fully set up.

#### **Why It Matters**

* **Clarity:** The new onboarding checklist clearly shows where you stand in your Stoïk Protect setup.
* **Actionability:** Each task includes direct links to complete steps without leaving the dashboard.
* **Personalization:** The list adapts to your role and what’s already been configured for your organization.
* **Faster setup:** Teams reach full protection readiness in fewer steps and with less guesswork.

#### **How It Works**

#### 1. Access Your To-do List

Open **Stoïk Protect › Home** — your onboarding checklist appears at the top of the dashboard.

Each item represents an action required to complete your initial setup.

#### 2. Complete the Key Steps

| Step                                | Description                                                                                                                                             |
| ----------------------------------- | ------------------------------------------------------------------------------------------------------------------------------------------------------- |
| **Invite your teammates**           | Add all relevant colleagues and decision-makers to Stoïk Protect so everyone has access to dashboards and alerts.                                       |
| **Join an onboarding session**      | Choose between a **1:1 setup** session or a **bulk onboarding** flow depending on your company’s profile and number of endpoints.                       |
| **Activate your prevention tools**  | Review which protection tools are not yet active. You can activate them directly or mark them as *not relevant* if already covered by another solution. |
| **Discover Stoïk Managed Services** | Book a call with a Stoïk Cyber Sales to learn how **MDR** and **Email Security** can strengthen your cyber-defense posture.                             |

#### 3. Track Your Progress

* Completed items are automatically checked off.
* Once all actions are complete, your organization’s onboarding status is marked **100 % Ready** in the dashboard.

#### **What’s New**

| Improvement                           | Description                                                                                              |
| ------------------------------------- | -------------------------------------------------------------------------------------------------------- |
| **Integrated onboarding in Home tab** | The old *Get Started* page has been retired — onboarding steps now live directly in your Home dashboard. |
| **Actionable checklist UX**           | Quick-access buttons to *Invite*, *Join session*, *Activate*, and *Book a call*.                         |
| **Dynamic progress tracking**         | The list updates in real time as steps are completed.                                                    |
| **Adaptive guidance**                 | Steps adjust automatically based on the client’s configuration and protection level.                     |
| {% endupdate %}                       |                                                                                                          |
| {% endupdates %}                      |                                                                                                          |


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.stoik.io/news/readme.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
