Define internal domains, add trusted users and domains,
configure acceptable levels of asset exposure, and set the time zone
and language for SaaS Security.
Before you start scanning, define any collaborators
and the asset exposure level to trigger incident reports, and configure
global settings for SaaS Security API to use when scanning your
sanctioned SaaS applications.