Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 11 Next »

The following section will be on managing your organisation's digital infrastructure, covering topics like vulnerability scanning, Active Directory management, user account actions, and security enhancements. It's a practical resource to help you maintain and secure your IT environment effectively.

We will also go through each dashboard and how they can be used to form a strong report of your cyber estate. To digest this information further we also have videos showcasing each area of RoboShadow. You can watch these on our YouTube Channel at https://www.youtube.com/@RoboShadow.


Under this sub section we will cover the following topics:

🔖 Active Directory……………………………………………………………………………………………………………………………………….2.3

📁 Admin………………………………………………………………………………………………………………………………………………………2.4

📬 Change user email address ……………………………………………………………………………………………………

🗑️ Remove a device from the Portal ……………………………………………………………………………………………

✍️ Rename a device………………………………………………………………………………………………………………………

🔄 Creating an MST for GPO deployments……………………………………………………………………………………

💻 Vulnerability Scanners……………………………………………………………………………………………………………………………..2.5

🌎 External Scanner……………………………………………………………………………………………………………………..

🏠 LAN scanner……………………………………………………………………………………………………………………………

🛠️ Cyber Heal (Remediation tool)…………………………………………………………………………………………………………………2.6


  • No labels