Who can monitor the different tools?

Here is a summary table for each cybersecurity prevention tool available on Stoïk Protect:

  • The prerequisites for their configuration

  • As well as the technical expertise required to monitor them throughout your contract

You need to know:

  • Domain names

  • Public IP addresses

A technical lead is required to fix vulnerabilities throughout the year.

You need an administrator account to synchronize your mailbox.

The creation of phishing campaigns and groups, analysis of results, and training can be carried out without technical expertise.

You need:

  • The ability to run a script in PowerShell

  • To be logged into an account

  • Domain administrator

  • Enrolled in Active Directory

  • Connected to the domain controller

A technical lead is required to fix vulnerabilities throughout the year.

You will need:

  • Servers or virtual machines hosted in the cloud (GCP, Azure, AWS) or a Microsoft EntraID subscription

  • An administrator account to deploy AWS, Azure, EntraID, or GCP

A technical lead is required to remediate vulnerabilities throughout the year.

Last updated

Was this helpful?