Who can monitor the different tools?
Here is a summary table for each cybersecurity prevention tool available on Stoïk Protect:
The prerequisites for their configuration
As well as the technical expertise required to monitor them throughout your contract
You need to know:
Domain names
Public IP addresses
A technical lead is required to fix vulnerabilities throughout the year.
You need an administrator account to synchronize your mailbox.
The creation of phishing campaigns and groups, analysis of results, and training can be carried out without technical expertise.
You need:
The ability to run a script in PowerShell
To be logged into an account
Domain administrator
Enrolled in Active Directory
Connected to the domain controller
A technical lead is required to fix vulnerabilities throughout the year.
A technical lead is required to remediate vulnerabilities throughout the year.
Last updated
Was this helpful?

