Knowledge Base
Visit the website
Contact support
Control Monitor
Control Monitor
Introduction to Control Monitor
Configuration
EDR Integrations
Email Integrations
Identity Management Integrations
Endpoint Management Integrations
Vulnerability Management Integrations
Reporting
Troubleshooting
Detect
Basics
Integrations
Probe deployment
Security tests
Alert suppression
Assurance
Account
SSO
CLI
Release Notes
Back to home
Knowledge Base
Control Monitor
Control Monitor
Introduction to Control Monitor
Configuration
EDR Integrations
Email Integrations
Identity Management Integrations
Endpoint Management Integrations
Vulnerability Management Integrations
Reporting
Troubleshooting
Detect
Basics
Integrations
Probe deployment
Security tests
Alert suppression
Assurance
Account
SSO
CLI
Release Notes
Control Monitor
Continuously evaluate the deployment, health, and configuration of your security controls.
Microsoft automated integration setup
Introduction to Control Monitor
About control monitor
Configuration
Configure Single Sign-on (optional)
Configure Notifications
Configure Integrations
Configure Exceptions
How to reset authentication token
Connecting the Microsoft integration suite
See more
EDR Integrations
Connecting Microsoft Defender
Connecting SentinelOne
Connecting CrowdStrike
Email Integrations
Connecting Microsoft M365
Connecting Google Mail (Gmail)
Identity Management Integrations
Connecting Okta
Connecting Google Identity
Connecting Microsoft Entra ID
Endpoint Management Integrations
Connecting ServiceNow
Connecting Jamf
Connecting Microsoft InTune
Vulnerability Management Integrations
Connecting Tenable
Connecting Qualys (coming soon)
Reporting
Review SCM Alerts
Review Control Failures
Review Misconfigurations
Review Executive reporting
Troubleshooting
Get-Mailbox errors in logs for Entra ID and M365 integration
Understanding Discovered Devices control category