How does it work?
Users can contact the support team for immediate help, whether to troubleshoot errors or mitigate a detected threat.
Real Example:
An administrator notices security policy failures and contacts support, who identify a misconfiguration and promptly fix it.