This topic introduces a set of end-to-end procedures for managing users in Security Analytics. These steps explain how to add a user in Security Analytics and then how to control what the user can do.
Previous Topic:Step 7. (Optional) Create a Customized Login Banner
You are hereTable of Contents > Manage Users with Roles and Permissions