Who can monitor the different tools?

Here is a summary table for each cybersecurity prevention tool available on Stoïk Protect:

  • The prerequisites for their configuration

  • As well as the technical expertise required to monitor them throughout your contract

External Surface

You need to know:

  • Domain names

  • Public IP addresses

A technical lead is required to fix vulnerabilities throughout the year.

Phishing

You need an administrator account to:

  • Synchronize your mailbox

  • Enable the anti-spam feature

Monitoring results, configuring templates, or providing awareness training can be done without a technical lead.

Active Directory Scan

You need:

  • The ability to run a script in PowerShell

  • To be logged into an account

  • Domain administrator

  • Enrolled in Active Directory

  • Connected to the domain controller

A technical lead is required to fix vulnerabilities throughout the year.

Cloud Scan

You will need:

  • Servers or virtual machines hosted in the cloud (GCP, Azure, AWS) or a Microsoft EntraID subscription

  • An administrator account to deploy AWS, Azure, EntraID, or GCP

A technical lead is required to remediate vulnerabilities throughout the year.

Last updated

Was this helpful?