1. Trust Center
WatchDog Security Help Center
Admin Guide
  • Docs Home
  • Admin Guide
  • User Guide
  • MSP Guide
  • Getting Started
  • Create Your Free Organization
  • Domain Reservation
  • Company Management
    • Manage Branding
    • Delete Organization
  • Notification Center
    • Organization Events
    • User Events
    • Configure Notification Settings
    • User Notification Override
  • Posture Management
    • View Integrations
    • Configure Automated Integrations
    • Manage Automated Monitors
    • Configure Manual Integrations
    • Manage Manual Monitors
  • WatchDog University
    • Assigning Courses using WatchDog University
    • Auditing Course Completion
    • Downloading a Certificate of Completion
  • Policy Management
    • Create Policy
    • Publish Policy
    • Track Policy Acceptance
    • Send Policy Reminder
    • Update Policy
    • Download Policy Version
    • Delete Policy
    • Retire Policy
  • Risk Management
    • Perform A Risk Assessment
    • View and Manage Risks in Risk Register
    • Create Manual Risk
    • Edit and Manage Risk
    • Manage Risk Tasks
    • Manage Risk Lifecycle
  • Vendor Management
    • Add Vendor
    • Track Security Events
    • Manage Vendor Documents
    • Perform Vendor Assessments
    • Classify Vendor Risk
  • Inventory
    • Add Inventory Item
    • Update Inventory Item
    • Auto Populate Inventory
  • Compliance Center
    • Add Compliance Framework
    • Edit Compliance Framework
    • Assigning Control Owners
    • Pause Monitors and Documents
    • Manage Compliance Documents
    • Schedule Audit
    • Automated Monitoring
    • Cross-Framework Reuse
    • Progress Tracking
  • Trust Center
    • Customize Trust Center
    • Manage Trust Center Access
    • Monitor Access Activity (Events)
    • Custom Domain Setup
  • Vulnerabilities
    • Centralized Vulnerability Tracking
    • Import Vulnerabilities
    • Create Manual Vulnerabilities
    • Assign And Collaborate On Vulnerabilities
    • Configure Time To Remediate (TTR)
  • Control Panel
    • Manage Support Access
    • Phishing Campaigns
      • Creating an Allowlist for Phishing Simulations in Microsoft 365
      • Configure Google Workspace Allowlist for Phishing Simulations
  • User Management
    • Add Users
    • Configure Directory Sync
    • Manage User Access
    • Assign Licenses
    • Manage Invites And Users
    • Change Account Owner
    • Reset 2FA
  • Integrations
  1. Trust Center

Manage Trust Center Access

Control who can access restricted Trust Center content using requests, manual approvals, and domain-based rules.
This system is designed to give you full visibility and control over external access.
Who can use this feature?
All Account Owners and Security Admins
Available on all plans

How Access Management Works#

Access to restricted content is controlled through four key components:
ComponentPurpose
RequestsIncoming access requests from external users
ContactsUsers who currently have or had access
DomainsAutomatic approval and domain-level control

Access Lifecycle#

1.
User attempts to access restricted content
2.
A request is created in Requests
3.
You approve or deny the request
4.
Approved/Denied users added to Contacts
5.
Access can be revoked or managed later
6.
All actions are recorded in Events
INFO
Access requests are only generated for content marked as Approved Visitors.

Accessing the Access Controls#

1
Open Trust Center
Navigate to Trust Center from the left-hand menu.
2
Locate Detailed Information
Scroll to the Detailed Information section below the analytics dashboard.
3
Select a Management Tab
Choose between:
Requests → Review incoming requests
Contacts → Manage approved users
Domains → Configure automatic approvals
Events → View audit logs

Requests (Review & Approve Access)#

The Requests tab is where all incoming access requests are reviewed.
Requests marked Needs Attention require action.

Approve a Request#

1
Open Requests Tab
Navigate to the Requests tab.
2
Identify Pending Requests
Look for requests labeled Needs Attention.
3
Review Request Details
Confirm:
The requester’s email/domain
Their stated reason for access
Whether they are a legitimate stakeholder
4
Approve Request
Click the ✔ (Approve) icon in the Actions column.
5
Confirm Approval
Review the confirmation dialog and click Approve. This grants the user full access to Approved Visitor content.

Deny a Request#

1
Select Request
Locate the request in the Requests tab.
2
Deny Access
Click the ✖ (Deny) icon.
3
Optional Reason
Enter a denial reason to provide context to the requester.
4
Confirm Denial
Choose:
Deny → Reject this request only
Deny & Block Future Requests → Prevent future submissions from this user

Contacts (Manage Approved Users)#

The Contacts tab shows all users who have been granted or denied access.

Grant Access Manually#

1
Open Contacts Tab
Navigate to the Contacts tab.
2
Add New Contact
Click Add Contact in the top-right corner.
3
Enter Contact Details
Provide:
First Name
Last Name
Email Address
Ensure the email domain is valid.
4
Save Contact
Click Add Contact to grant access. The user will immediately have access to restricted content.

Allow Access for Existing Contact#

1
Locate Contact
Find a user with Access Rejected, Access Revoked, or Access Blocked
2
Grant Access
Click Allow Access in the Actions column.
3
Confirm Action
The user’s status updates to Access Granted and access is restored.

Revoke Access#

1
Locate Approved User
Find a user with Access Granted.
2
Revoke Access
Click Revoke Access in the Actions column.
3
Confirm Revocation
Choose:
Revoke → Remove access
Revoke & Block Future Access → Prevent future requests
4
Access Removed
The user immediately loses access to restricted content.

Domains (Automate Access Control)#

The Domains tab allows you to manage access at the domain level. This is useful for automatically approving trusted organizations.

Enable Auto-Approval#

1
Open Domains Tab
Navigate to the Domains tab.
2
Locate Domain
Find the domain you want to configure.
3
Enable Auto-Approve
Toggle Auto-Approve Requests. All users from this domain will be automatically granted access.
4
Verify Status
Ensure the domain is marked Active.

Revoke Domain Access#

1
Select Domain
Locate the domain in the list.
2
Revoke Access
Click Revoke Access.
3
Confirm Action
Choose:
Revoke → Remove access for all users in the domain
Revoke & Block Future Access → Prevent future requests from this domain
4
Access Removed
All associated users immediately lose access.

Best Practices#

Use Domains for trusted partners to reduce manual approvals
Use Requests for one-off or unknown users
Regularly review Contacts to remove inactive users
Monitor Events for auditing and compliance

Troubleshooting#

User Cannot Access Content
Check:
Request has been approved
User appears in Contacts
Content visibility is set to Approved Visitors
User Still Has Access After Revocation
Too Many Requests to Manage
Modified at 2026-03-18 19:43:29
Previous
Customize Trust Center
Next
Monitor Access Activity (Events)
Built with