Control access to features in the Security Operations console
Stay organized with collections
Save and categorize content based on your preferences.
To control access to threat investigation capabilities, you use the
Security Operations console to grant IAM roles and their permissions to users and
groups, and then you configure SOAR. To complete these tasks, do the following:
[[["Easy to understand","easyToUnderstand","thumb-up"],["Solved my problem","solvedMyProblem","thumb-up"],["Other","otherUp","thumb-up"]],[["Hard to understand","hardToUnderstand","thumb-down"],["Incorrect information or sample code","incorrectInformationOrSampleCode","thumb-down"],["Missing the information/samples I need","missingTheInformationSamplesINeed","thumb-down"],["Other","otherDown","thumb-down"]],["Last updated 2024-10-10 UTC."],[],[]]