Add a contact
Complete these steps for each member of your organization who must interact with one or more Arctic Wolf® services.
- Your Concierge Security® Team (CST) must add the first contact with the email domain that your organization uses. After your CST adds the first contact, you can add other contacts with the same email domain.
- If you are a Managed Service Provider (MSP) acting on behalf of an end-customer, you cannot add users or distribution lists.
- Administrator permissions for the Arctic Wolf Unified Portal.
You must be a primary or secondary contact. If you require this level of access, submit your request to a primary or secondary contact in your organization, or click Request an Update.
Contact type privileges
Contact types have these privileges:
| Work area | Primary contact | Secondary contact | User |
|---|---|---|---|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Service access options
Service access options are additional permissions that can be assigned to any contact type except a Distribution-only mailing list.
| Option | Description |
|---|---|
|
Portal |
Allows a contact to sign in to the Unified Portal. |
|
Activate Virtual Appliance |
Allows a contact to activate a new virtual sensor, scanner, or log collector deployment. |
|
Managed Security Awareness |
Grants administrative access to the Managed Security Awareness® (MA) Portal. This option allows the contact to administer the MA training program, which includes configuring program settings and managing user participation. |
|
Data Exploration |
If your organization has a valid license, grants access to Data Explorer. Depending on the license, this option also grants access to Raw Log Search and the ability to create custom dashboards. For more information, see Data Explorer license options. |
|
Cyber JumpStart |
Grants access to the Cyber JumpStart Portal. |
|
Managed Risk |
Grants access to the Risk Dashboard and Arctic Wolf Analytics for Managed Risk. |