Trust Center
WatchDog Security Help Center
Admin Guide
Docs Home
Admin Guide
User Guide
MSP Guide
Getting Started
Create Your Free Organization
Domain Reservation
Company Management
Manage Branding
Delete Organization
Notification Center
Organization Events
User Events
Configure Notification Settings
User Notification Override
Posture Management
View Integrations
Configure Automated Integrations
Manage Automated Monitors
Configure Manual Integrations
Manage Manual Monitors
WatchDog University
Assigning Courses using WatchDog University
Auditing Course Completion
Downloading a Certificate of Completion
Policy Management
Create Policy
Publish Policy
Track Policy Acceptance
Send Policy Reminder
Update Policy
Download Policy Version
Delete Policy
Retire Policy
Risk Management
Perform A Risk Assessment
View and Manage Risks in Risk Register
Create Manual Risk
Edit and Manage Risk
Manage Risk Tasks
Manage Risk Lifecycle
Vendor Management
Add Vendor
Track Security Events
Manage Vendor Documents
Perform Vendor Assessments
Classify Vendor Risk
Inventory
Add Inventory Item
Update Inventory Item
Auto Populate Inventory
Compliance Center
Add Compliance Framework
Edit Compliance Framework
Assigning Control Owners
Pause Monitors and Documents
Manage Compliance Documents
Schedule Audit
Automated Monitoring
Cross-Framework Reuse
Progress Tracking
Trust Center
Customize Trust Center
Manage Trust Center Access
Monitor Access Activity (Events)
Custom Domain Setup
Vulnerabilities
Centralized Vulnerability Tracking
Import Vulnerabilities
Create Manual Vulnerabilities
Assign And Collaborate On Vulnerabilities
Configure Time To Remediate (TTR)
Control Panel
Manage Support Access
Phishing Campaigns
Creating an Allowlist for Phishing Simulations in Microsoft 365
Configure Google Workspace Allowlist for Phishing Simulations
User Management
Add Users
Configure Directory Sync
Manage User Access
Assign Licenses
Manage Invites And Users
Change Account Owner
Reset 2FA
Integrations
Trust Center
Manage Trust Center Access
Control who can access restricted Trust Center content using requests, manual approvals, and domain-based rules.
This system is designed to give you
full visibility and control
over external access.
Who can use this feature?
All
Account Owners
and
Security Admins
Available on all plans
How Access Management Works
#
Access to restricted content is controlled through four key components:
Component
Purpose
Requests
Incoming access requests from external users
Contacts
Users who currently have or had access
Domains
Automatic approval and domain-level control
Access Lifecycle
#
1.
User attempts to access restricted content
2.
A request is created in
Requests
3.
You approve or deny the request
4.
Approved/Denied users added to
Contacts
5.
Access can be revoked or managed later
6.
All actions are recorded in
Events
INFO
Access requests are only generated for content marked as
Approved Visitors
.
Accessing the Access Controls
#
1
Open Trust Center
Navigate to
Trust Center
from the left-hand menu.
2
Locate Detailed Information
Scroll to the
Detailed Information
section below the analytics dashboard.
3
Select a Management Tab
Choose between:
Requests
→ Review incoming requests
Contacts
→ Manage approved users
Domains
→ Configure automatic approvals
Events
→ View audit logs
Requests (Review & Approve Access)
#
The
Requests
tab is where all incoming access requests are reviewed.
Requests marked
Needs Attention
require action.
Approve a Request
#
1
Open Requests Tab
Navigate to the
Requests
tab.
2
Identify Pending Requests
Look for requests labeled
Needs Attention
.
3
Review Request Details
Confirm:
The requester’s email/domain
Their stated reason for access
Whether they are a legitimate stakeholder
4
Approve Request
Click the
✔ (Approve)
icon in the Actions column.
5
Confirm Approval
Review the confirmation dialog and click
Approve
. This grants the user full access to Approved Visitor content.
Deny a Request
#
1
Select Request
Locate the request in the
Requests
tab.
2
Deny Access
Click the
✖ (Deny)
icon.
3
Optional Reason
Enter a denial reason to provide context to the requester.
4
Confirm Denial
Choose:
Deny
→ Reject this request only
Deny & Block Future Requests
→ Prevent future submissions from this user
Contacts (Manage Approved Users)
#
The
Contacts
tab shows all users who have been granted or denied access.
Grant Access Manually
#
1
Open Contacts Tab
Navigate to the
Contacts
tab.
2
Add New Contact
Click
Add Contact
in the top-right corner.
3
Enter Contact Details
Provide:
First Name
Last Name
Email Address
Ensure the email domain is valid.
4
Save Contact
Click
Add Contact
to grant access. The user will immediately have access to restricted content.
Allow Access for Existing Contact
#
1
Locate Contact
Find a user with
Access Rejected
,
Access Revoked
, or
Access Blocked
2
Grant Access
Click
Allow Access
in the Actions column.
3
Confirm Action
The user’s status updates to
Access Granted
and access is restored.
Revoke Access
#
1
Locate Approved User
Find a user with
Access Granted
.
2
Revoke Access
Click
Revoke Access
in the Actions column.
3
Confirm Revocation
Choose:
Revoke
→ Remove access
Revoke & Block Future Access
→ Prevent future requests
4
Access Removed
The user immediately loses access to restricted content.
Domains (Automate Access Control)
#
The
Domains
tab allows you to manage access at the domain level. This is useful for automatically approving trusted organizations.
Enable Auto-Approval
#
1
Open Domains Tab
Navigate to the
Domains
tab.
2
Locate Domain
Find the domain you want to configure.
3
Enable Auto-Approve
Toggle
Auto-Approve Requests
. All users from this domain will be automatically granted access.
4
Verify Status
Ensure the domain is marked
Active
.
Revoke Domain Access
#
1
Select Domain
Locate the domain in the list.
2
Revoke Access
Click
Revoke Access
.
3
Confirm Action
Choose:
Revoke
→ Remove access for all users in the domain
Revoke & Block Future Access
→ Prevent future requests from this domain
4
Access Removed
All associated users immediately lose access.
Best Practices
#
Use
Domains
for trusted partners to reduce manual approvals
Use
Requests
for one-off or unknown users
Regularly review
Contacts
to remove inactive users
Monitor
Events
for auditing and compliance
Troubleshooting
#
User Cannot Access Content
Check:
Request has been approved
User appears in Contacts
Content visibility is set to Approved Visitors
User Still Has Access After Revocation
Too Many Requests to Manage
Modified at
2026-03-18 19:43:29
Previous
Customize Trust Center
Next
Monitor Access Activity (Events)