Knowledge Base
Knowledge Base
Explore articles and resources to boost your knowledge.
Setup Account
- How to Suspend or Delete a User from a Rotate Account
- How to Add a New Integration Request in Rotate
- How to Add a New Lead to Rotate for MSP
- How to Configure User Monitoring in Rotate
- How to Invite a New User to Rotate
- How to Onboard a Customer to Rotate as an MSP
Identity Hub
- Key Components of Effective Security Policies
- Key Steps for Securing Identities
- Enhancing Identity Security with Rotate's Identity Hub
- Enabling MFA Enforcement in Google Workspace
Email Hub
- How Rotate Identifies and Stops Phishing Links in Emails
- Rotate’s AI-Powered Protection Against Malware-Infested Emails
- How Rotate Detects and Blocks Fraudulent Emails Before They Reach You
- Dynamic vs. Static Scanning - Which Email Detection Method Best Protects Your Inbox?
- Mail Rules - Create, Edit and Delete Mail Rules for Google
- How to boost your email security with Rotate?
Training Hub
- The Importance of Drip Training in Cybersecurity Awareness
- Maximizing Employee Engagement in Cybersecurity Training
- Maximizing Your Security Awareness Hub - Navigating the Phishing Page
- Creating an Effective Phishing Simulation - A Step-by-Step Guide
- Understanding Phishing Simulation - Enhancing Your Cybersecurity Awareness
EASM Hub
- From Detection to Resolution - Streamlining Security Fixes with AI Assistance
- Introducing 'Dig Deeper' - AI-Powered Insights for Security Issues
- Best Practices for Reducing Your External Attack Surface
- How We Discover Subdomains and Why It Matters
- How Our EASM Scanning Works - From Domains to Vulnerabilities
- What is External Attack Surface Management (EASM)?