SecOps
ITOps
Flow Automation Highlights
User Data Retrieval: The workflow automatically fetches user data from Acronis for all tenant users. This replaces manual data extraction processes, significantly reducing the time and effort required to gather user information and eliminating the risk of overlooking accounts.
2FA Activation Status Check: The system automatically verifies each user's 2FA activation status. This eliminates the need for manual checks across potentially hundreds or thousands of user accounts, ensuring consistent and thorough compliance monitoring.
Automated Email Notifications: When a user is identified as not having 2FA activated, an email prompting them to enable it is automatically sent. This replaces manual follow-ups, ensuring timely and consistent communication with non-compliant users and reducing the workload on IT and security teams.
MFA Status Management: For users with activated accounts without 2FA, the system automatically manages their Multi-Factor Authentication status. This streamlines the enforcement of security policies, reduces the manual intervention required, and ensures the consistent application of 2FA requirements.
Compliance Reporting: The workflow generates comprehensive reports on 2FA compliance status across the organization. This replaces manual data compilation and analysis, providing real-time insights into the security posture and enabling quick identification of compliance gaps.
Acronis: In this workflow, Acronis serves as the primary data source for user information. It provides comprehensive details about tenant users, including their account status and authentication settings. Integrating with Acronis, the workflow can efficiently retrieve and process user data, enabling automated checks and actions based on up-to-date information.
Email (Gmail, Outlook, etc.): The email system plays a crucial role in the communication aspect of this workflow. It automatically sends activation emails to users who haven't enabled 2FA. This integration ensures timely and consistent outreach to non-compliant users, prompting them to activate 2FA and improve the organization's security posture. The email system transforms what would typically be a manual follow-up process into an automated, scalable solution.