-
Security Announcements
-
Product News
-
Next-Gen Vulnerability Management
-
Getting Started
-
General
-
Operating Status
-
System & Network Scanning
-
Web Application Scanning
-
Cloud Scanning (CSPM)
-
API Scanning
-
Phishing & Awareness Training
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset Management
-
Vulnerability Manager
-
Reports
-
Digest Reports
-
Organizer
-
Continuous Monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & Conditions
-
Dashboard
How do I get started with Security Center users?
To manage your Secuity Center users, please follow these steps. To manage users when doing phishing simulation and awareness training, please go here.
1. Create your users
To get started, you must first add your users.
https://support.holmsecurity.com/knowledge/how-do-i-add-a-user
2. Define custom user role
If you prefer to control the level of access between different users, create custom roles.
https://support.holmsecurity.com/knowledge/how-do-i-create-custom-roles
3. Set up your authentication & security
Manage how users can securely log into the Security Center using Multi-Factor Authentication (MFA).
https://support.holmsecurity.com/knowledge/how-do-i-enable-two-factor-authentication
4. Configure SSO (optional)
Manage how users can securely log into the Security Center using Single Sign-On (SSO).
https://support.holmsecurity.com/knowledge/how-do-i-set-up-single-sign-on