Detexian
Detect critical user misconfigurations, audit SaaS permissions and more.Detexian
Detexian is a single pane of glass across Office 365, G Suite, Atlassian, Salesforce, and other platforms. It detects critical user misconfigurations, audits SaaS permissions and more. This means Detexian eliminates SaaS risk blindspots and gives you peace of mind you need to run a safe IT operation. With Detexian, regulatory compliance is made easy. You can generate audit reports to demonstrate evidence of control effectiveness over time that your auditors and regulators want.
Images
Blog Posts
9th October, 2023
Non-MS Use Cases: Identifying and removing users from non-Microsoft applications after they leave your company
In the realm of IT management, overseeing user accounts and access to company resources is a fundame...
3rd October, 2023
Tracking changes in user consented applications with Microsoft M365 E3
In today's interconnected digital landscape, user consented applications have become an integral par...
28th August, 2023
Identifying, evaluating and tracking user created email forward rules with Microsoft M365 E3
In the digital age, communication flows effortlessly through emails, connecting individuals and busi...
14th August, 2023
Discovering and Reporting on DLP Alerts Older than 7 Days with Microsoft M365 E3
As we discussed in the sharing blog, your organization relies on sharing and working with informatio...
31st July, 2023
Keeping Abreast of Changes in User Permissions, Configuration, and Access with Microsoft M365 E3
Today Detexian’s CTO Adrian Kitto dives into the risk of privilege creep in M365. He highlights the ...
24th July, 2023
Identifying, Evaluating, and Tracking Open Shares for External Users with Microsoft M365 E3
“To share or not to share” is not the question this week, because we all know that your organization...
10th July, 2023
Privileged Access Management in non-SCIM apps with Microsoft M365 E3
Here’s a hard one, how do you track privileged access inside of non-SCIM provisioned applications? D...
3rd July, 2023
Calculating inferred or effective MFA for non-Microsoft applications
Detexian’s CTO Adrian Kitto is delving into a topic that not many will think of; Working out the eff...
26th June, 2023
Identifying and removing inactive users with Microsoft M365 E3
Detexian’s CTO Adrian Kitto explores a little understood topic of Inactive Users in M365. These user...
20th June, 2023
Discovering user consented apps with Microsoft M365 E3
This time Detexian’s CTO Adrian Kitto gets into the nitty gritty of this blog series, tackling disco...