User access management

Invite a user

A user can be invited to Stoik Protect from Settings > Users and by clicking the Invite a User button. You must:

  • Enter the invitee's first name, last name, email address, and phone number.

  • Grant them at least one access right ("Administrator," "Contract," or "Cyber," see below). The user will then receive the following invitation email:

Until the user accepts the invitation, its status will be Invitation Pending.

User rights and notifications

Admin

  • Manage user rights: This right allows the user to modify (add or remove) the rights of other Stoik Protect users, including their own. In other words, a user without this right cannot modify their own rights or those of other Stoik Protect users.

Contracts

  • View and edit contracts: This right allows the user to access Contracts and Claims.

  • Receive invoices: This right allows the user to receive invoices (payment reminders) by email as soon as they are generated.

Cybersecurity: Prevention

  • View and edit prevention tools: This right allows the user to access the tabs in the Prevention section, namely:

    • External Surface, with external scan.

    • Phishing, with phishing simulation.

    • Active Directory, with Active Directory scan.

    • Cloud Services, with Cloud scan.

In the event of a high or critical vulnerability identified by the external scan, users with this right will receive email notifications from Stoïk SOC.

  • View personal data: This right allows the user to view:

    • Phishing > Results: the results of employees during phishing simulation campaigns.

    • External Surface > Results > Data Leaks: the identifying data of employees whose data may have been leaked.

  • Receive the monthly summary: This right allows the user to receive the monthly summary of the results of the prevention tools by email.

Cyber: Managed services

This section is only available to clients with a Stoïk MDR contract.

  • View and edit Stoik MDR tools: This right allows the user to access the tabs in the Managed Services section, namely:

    • Endpoint

    • Identity

  • Be notified of alerts by email: the user will be copied on all alerts.

  • Be notified of critical alerts by phone

    • Users with priority level 1 will be contacted by phone first, etc.

    • The concept of contact during business hours and non-business hours can also be selected for each user.

If no user is available during non-business hours, but a critical vulnerability appears, Stoik will do its best to neutralize the threat until one of your employees intervenes or becomes available. Indeed, the EDRs used by Stoik allow the analysts at the Stoik CERT to temporarily contain most of the detected threats.

  • Receive the monthly summary: The user will receive a monthly summary of detected alerts.

Delete a user

Only administrator users can delete a user. To do so, simply select the user in question, click on Actions, then Delete user.

Certain permissions are essential for a Stoik Protect space: if the user you wish to delete is the only one with these permissions, you must first assign these permissions to another user.

Last updated

Was this helpful?