Welcome to Pocket Underwriter

Your Enterprise Setup Guide for Client System Administrators

6 Pillars of Enterprise Setup

Pillar 1: Account & Billing
Understand pricing tiers and payment management
Step 1

Pricing Models

Free Tier
  • 2 documents per deal
  • Basic AI analysis
  • Perfect for testing
Premium Tier$1,499/deal
  • Unlimited documents per deal
  • Advanced AI with claims intelligence
  • Full compliance audit logs
Pro Tip

Payment is per-deal, not per-user. Upgrade individual deals to Premium as needed via the deal workspace. All payments are processed securely through Stripe.

Pillar 2: Enterprise Security
Configure advanced security controls and access restrictions
Step 2

Security Features

IP Whitelisting

Restrict platform access to specific IP ranges or CIDR blocks. Perfect for office networks or VPN-only access.

Configure IP Ranges →
Citrix Gateway Integration

Require all users to authenticate via your Citrix Gateway. Platform checks for x-citrix-user header presence.

Enable Citrix Requirement →
Multi-Factor Authentication (MFA)

Force MFA across your entire organization. Users must verify identity via authenticator app or SMS.

Enforce MFA →
Pro Tip

When configuring IP whitelisting, the system shows your current IP address to prevent lockout. Set session timeout between 15 minutes to 12 hours based on your security policy.

Pillar 3: Team Onboarding
Add users and assign roles across your organization
Step 3

User Roles

Underwriter

Full access to AI analysis, document management, and deal finalization across all stages.

Underwriting Assistant

Can upload documents, view analyses, and assist with deal preparation under supervision.

Broker

Limited to early-stage document uploads and initial deal setup. Cannot run AI or finalize.

Broker Assistant

Read-only access to deal information and document viewing for administrative support.

User Management

From the User Management table, you can invite new users via email, assign roles, and revoke access instantly. All users within your organization are automatically isolated from other firms' data.

Manage Team Members
Pro Tip

Use strong, unique passwords and enable browser password managers. Chrome and Edge can generate secure passwords automatically during signup.

Pillar 4: Functional RBAC
Granular permissions control across workflow stages
Step 4

Permissions Matrix

Control exactly what actions each role can perform at each of the 14 workflow stages. The permissions matrix allows you to gate:

Upload Documents
Run AI Analysis
Update AI Results
Save Final Version
Send to Next Stage

Workflow Stages

The 14-stage underwriting workflow spans from Deal Setup through Claims Intelligence, Underwriting Questions, Coverage Position, and final approval stages. Each stage can have different permission requirements.

Configure Permissions Matrix
Pro Tip

Default permissions follow industry best practices: Underwriters have full access, Brokers can only upload in early stages. Customize based on your firm's workflow.

Pillar 5: Claims Intelligence (Step 3a)
Seed the Breach Predictor with sector-specific expertise
Step 5

What is Claims Intelligence?

The Claims Intelligence system stores known breach patterns, sector-specific risks, and proven underwriting questions. When analyzing a deal, the AI automatically references this database to:

Display market warnings for high-risk claim profiles
Auto-generate relevant underwriting questions (Step 4)
Justify coverage exclusions with real claims data (Step 5)

Adding Intelligence

System Admins can manually add claim trends by sector and region, or use AI-powered web search to discover the latest W&I insurance claims reports and M&A litigation trends.

Manage Claims Intelligence
Pro Tip

Regularly update your claims intelligence database with insights from closed deals. The AI learns from your firm's unique expertise over time.

Pillar 6: Compliance & Audit
Track all user actions and export compliance reports
Step 6

Security Audit Logs

Every action in Pocket Underwriter is logged with full context: who performed the action, what they did, when, and from which IP address. Audit logs include:

Authentication events
Document uploads
AI analysis runs
Security config changes
User role modifications
Deal status updates

Export Compliance Reports

Client Admins can filter audit logs by date range, user, or action type, then export as CSV for annual IT audits or compliance reviews. Each log entry includes metadata showing exact AI prompts and responses.

View Audit Logs
Pro Tip

Logs from Citrix Gateway users display a special badge showing the x-citrix-user header data, providing full session traceability for enterprise IT teams.

Quick Reference: Admin Resources

Best Practices

  • • Review audit logs monthly for compliance
  • • Update claims intelligence after major deals
  • • Test security settings before enforcing firm-wide
  • • Keep role permissions aligned with job functions
  • • Enable MFA before adding IP restrictions