Get tenant key
Generated from the MSP portal.
Windows Event ID collection · MSP-friendly
Lightweight agent that streams Windows Event IDs, user identifiers and system activity from endpoints to the MSP portal. Light, silent, GDPR-compliant.
Lightweight agent that streams Windows Event IDs, user identifiers and system activity from endpoints to the MSP portal. Light, silent, GDPR-compliant.
SYLink Activity — Windows Event ID collection · MSP-friendly.
SYLink Activity s'appuie sur ETW (Event Tracing for Windows) et WMI pour collecter les événements sans toucher au journal Windows lui-même. Les données sont enrichies (résolution SID → nom, géolocalisation IP) puis agrégées au niveau du tenant client.
Côté MSP, le portail offre une vue par client (ou consolidée) avec des règles d'alerting personnalisables : 5 échecs d'auth en 1 min, création de processus PowerShell suspect, accès à un partage protégé, etc.
Agent léger sur les serveurs Windows pour collecter et corréler les Event ID critiques (logon, escalade de privilèges, modifications AD). Console MSP centralisée — idéal supervision multi-clients.
Install via GPO or RMM. Auto-pairs to the customer tenant via a key from the MSP portal.
Generated from the MSP portal.
The signed MSI installer accepts the key as a parameter.
Silent push to all targeted Windows endpoints.
Configure rules from the MSP portal.
Generated from the MSP portal.
The signed MSI installer accepts the key as a parameter.
Silent push to all targeted Windows endpoints.
Configure rules from the MSP portal.
↓ Integration pipeline — step by step, from scoping to production ↓
Authentications, privilege escalations, process creations, file accesses — everything the Windows log knows, you see.
Multi-tenant, white-label, customer-level aggregation, one-click escalation to an analyst.
Minimal footprint (< 1% CPU). No user interaction, no intrusive endpoint alerts.
No user-content capture, hashed IDs, configurable retention. Full audit trail.
| Supported OS | Windows 10/11 + Windows Server 2016+ |
| Method | ETW + WMI + lecture journaux |
| Deployment mode | GPO / MDM / RMM / installeur silencieux |
| Footprint | < 50 Mo RAM, < 1 % CPU |
| Authentications | Réussies / échouées, source / destination |
| Privileges | Élévations, changements d'appartenance |
| Processes | Création, ligne de commande, hash |
| File accesses | Sur dossiers sensibles désignés |
| Protocol | HTTPS TLS 1.3 |
| Frequency | Temps réel + batch toutes les 5 min |
| Storage | Portail MSP (FR) ou on-premise |
| Retention | Configurable, défaut 1 an |
Unified view of authentications and critical events across all customers from one console.
Alerting on typical ransomware patterns before encryption (suspicious process creation, etc.).
Court-admissible event log, exportable for audit.
30-minute guided demo, PoC on a pilot perimeter, support by our French teams based in Clermont-Ferrand, Marseille and Rennes.