Centralized internal oversight for suspicious activity, operational risk, and incident response.
Sentinel configuration, access controls, alert routing, and operational preferences will appear here.