Skip to content
English - United States
  • There are no suggestions because the search field is empty.

Install Checklist & Prerequisites

When installing the Flurp in an enterprise organization: 

  • What is your legal business name? 
  • What is your primary mailing address? 
  • Who is your primary technical contact and phone number to coordinate communications with? 
  • What is your Microsoft Site Token for the approval link: 
 
https://login.microsoftonline.com/CUSTOMERSITETOKEN/adminconsent?client_id=9144a678-b0b3-48d0-b510-289c8d257717&redirect_uri=https://app.netarx.com/api/auth/organization/microsoft/callback&scope=https://graph.microsoft.com/.default Calendars.Read Mail.ReadWrite MailboxSettings.ReadWrite User.Read.All 

 

  • Who is the sys admin that has Sys Admin permissions and can approve the link we generate? _______________ 

  • What endpoint computers are in your ecosystem and approx. count?  

☐ Windows 10/11  Count:__________ 
☐ MacOS   Count: ____________ 
☐ Other  _______________________Count:_________ 

  • What endpoint protection software (EDR/Virus/Etc.) is loaded on the employee’s computers?  
    _______________________________________ 
    _______________________________________ 
    _______________________________________ 
     
  • Are employees allowed to use their own PC computers to access work-related content such as email, drives, cloud providers, etc.? 
    ☐ Yes, but only through VPN _________________________ 
    ☐ Yes, without VPN 
    ☐ No 
     
  • What email provider is used? 
    ☐  Microsoft 365 
    ☐  Gmail 
    ☐  Other  _________________________ 
     
  • What is the primary email domain and is there any alternative domains that are used?  
     
    ________________________________________________________ 
    If multiple domains, are they all within one tenant? ____________
     
  • Does your company have a cloud spam/threat email filtering provider? 
    ☐ Proofpoint 
    ☐ Mimecast 
    ☐ Barracuda 
    ☐ Darktrace 
    ☐ Symantec 
    ☐ Fortinet 
    ☐ SpamTitan 
    ☐  Other: __________________________________ 
     
  • Do you manage the browsers by policy and/or deploy any browser plug-ins to endpoints which may protect from things such as malware, extensions, etc?  ____________________________________________________ 
     
  • Are endpoints free to install any software on OS or is it blocked by a policy?  
     
    If so, what is the mechanism to block installs?  __________________________ 
     
  • What browsers are acceptable to use? 
    ☐ Chrome   Version: __________________ 
    ☐ Edge  Version: _____________________ 
    ☐ Island Version: _____________________ 
    ☐ Other: _______________________________________ 
     
  • Are there any restrictions on installing plugins in the browser(s)? _________ 
     
  •  Are there any restrictions on the backend to accepting the email token in the onboarding process (example: User may be restricted in Azure from adding the Microsoft email in the Admin screen)? _______________