Getting Started with SlashID Identity Protection
The first thing to do is to set up SlashID to see the data you wish to monitor and secure. Follow the guides in this section to configure SlashID's integrations with minimal set up required.
Understanding data integrations
For most data sources, SlashID can monitor two different types of data:
- identity data, which create a map of users, NHIs, permissions, roles etc.
- logs, which show how and when these identities and credentials are used
These two data types are complementary and both are needed in order to provide complete, real-time security and posture insights. If you only configure one of them, SlashID may only provide incomplete monitoring and detections.