Which feature or task within the application do you think would benefit most from assistance by an AI chatbot?
|
|
6
|
82
|
October 6, 2025
|
What specific PingCastle metrics do you share with management or executives, and how do you present this technical information to non-technical stakeholders?
|
|
2
|
40
|
September 12, 2025
|
What was your biggest takeaway the first time you ran a PingCastle report on your AD environment?
|
|
1
|
52
|
September 8, 2025
|
What improvements would you like to see to reporting features?
|
|
5
|
42
|
August 26, 2025
|
What’s one device or app you were surprised to discover was putting your data at risk?
|
|
1
|
25
|
October 13, 2025
|
Do you regularly review classification accuracy? How do you fine-tune it?
|
|
1
|
12
|
October 13, 2025
|
If you use the Privilege Secure browser extension to access your Entra environment, do you use it to access portal.azure.com or admin.microsoft.com?
|
|
1
|
16
|
October 12, 2025
|
How are you using the Access Information Center to enable data owners?
|
|
1
|
20
|
October 12, 2025
|
What is the rough split between Windows and Linux for your monitored devices?
|
|
1
|
7
|
October 12, 2025
|
Which built-in report in Netwrix Auditor do you rely on the most, and how has it helped streamline your audit or investigation process?
|
|
1
|
24
|
October 10, 2025
|
How many CIS compliance reports are you using?
|
|
4
|
36
|
October 7, 2025
|
For how long are you required to keep an audit trail of changes in your IT environment?
|
|
2
|
25
|
October 5, 2025
|
What types of user or service account behavior do you track using Netwrix Threat Prevention?
|
|
1
|
11
|
October 3, 2025
|
What’s your biggest challenge when reviewing alert context or running queries in an investigation?
|
|
1
|
2
|
October 3, 2025
|
What’s the biggest benefit you’ve seen from using Netwrix Recovery compared to manual recovery methods?
|
|
1
|
17
|
October 3, 2025
|
What creative ways have you implemented "just-enough privilege" to balance security and operational efficiency?
|
|
1
|
11
|
October 3, 2025
|
Which Reporting feature do you depend on the most, and what makes it essential for you?
|
|
1
|
29
|
October 3, 2025
|
What’s one policy or control you’d love to enforce—but pushback from users or teams makes it difficult?
|
|
1
|
14
|
October 3, 2025
|
What's been your most successful approach to presenting PingCastle's technical findings in a way that drives action from leadership?
|
|
1
|
23
|
October 3, 2025
|
Are you using Change Tracker to meet PCI-DSS compliance?
|
|
1
|
22
|
October 3, 2025
|
Are there any additional searches/reports you would find beneficial for Audit reporting?
|
|
1
|
11
|
October 3, 2025
|
What’s the most useful insight you’ve gained from an Active Directory permissions scan?
|
|
1
|
23
|
October 3, 2025
|
What’s your preferred method of navigating the data—search, dashboards, subscriptions, or scheduled exports—and how does it support your day-to-day work?
|
|
1
|
12
|
October 3, 2025
|
Are there any additional searches/reports you would find beneficial for Audit reporting?
|
|
1
|
10
|
October 3, 2025
|
How often do you use the search feature? What is your typical search use case? How important is it for you to view an unlimited number of search results?
|
|
4
|
59
|
September 28, 2025
|
How do you handle user exceptions for policies, and what would make that process smoother in your environment?
|
|
3
|
33
|
September 27, 2025
|
When Endpoint Protector alerts you of a potential data breach (e.g. unauthorized data transfers), what steps do you typically follow?
|
|
3
|
46
|
September 27, 2025
|
Are AI tools considered potential data egress channels in your organization, and do you plan to implement controls to manage these risks?
|
|
5
|
80
|
September 27, 2025
|
When was the last time you performed a full file system permissions audit? What insights surprised you?
|
|
2
|
29
|
September 27, 2025
|
How do you visualize and communicate sensitive data exposure to business stakeholders?
|
|
1
|
19
|
September 26, 2025
|