To simplify deployment and ongoing management, Guardz is introducing a unified application. This application consolidates all required permissions and settings needed to use the full range of Guardz features.
While some Security Controls may require additional configuration, all permissions required by Guardz are granted during the application installation:
1. Guardz Detection (ITDR)
Retrieval of the complete user list associated with the domain.
Monitoring the users' configuration such as missing MFA, inactive accounts, and more - and will raise an alert whenever an issue is detected.
Enabling 'Dark Web Monitoring' and 'External Footprint Scan.
2. Guardz Response (ITDR Response Capabilities)
These permissions enable the execution of remediation actions for detected ITDR incidents.
It allows to actively respond to risky activity and user-related threats by suspending a user or remediating an issue with an automated response.
3. Guardz Data Protection
These s enables the ‘Data Protection’ feature.
Once the integration is in place, Guardz scans the customer’s files and folders and raise an alert when an external share or suspicious activity is detected.
4. Phishing Simulation
Email 'Read & Write' permissions are required to allow the injection of phishing simulation emails into end-user inboxes.
Use the links blow to review the more explanations about the permissions, and installation instructions for each activation flow.