Table of authorized actions for users with global access

A user with global access can execute the following actions depending on its role:

 AuditorSecurity AdministratorSystem AdministratorCyberwatch Administrator
Generate an export
Consult the Vulnerabilities Encyclopedia
Update the Vulnerabilities Encyclopedia  
Consult the Rules Encyclopedia
Consult compliance Benchmarks
Consult the Security Issues
Consult Ignoring policies
Consult asset rules
Consult criticalities
Consult corrective actions
Consult users’ activities
See the details of an asset
Consult the compliance rules status of an asset
Access Kibana(1)(1)(1)
Ignore vulnerabilities on an asset 
Update/Delete an asset  
Create a deployment/reboot/scanning policy  
Deploy security fixes on an asset  
Assign assets a deployment/reboot/scanning policy  
Create/Update/Delete a custom compliance repository  
Assign/Remove rules to/from custom compliance repository  
Recheck compliance rules on an asset  
Assign/Remove compliance repositories to/from assets  
Update/Delete a deployment/reboot/scanning policy  
Create/Update/Delete a Criticality  
Consult Discoveries
Create/Update Discoveries   
Add agents  
Add agentless connections  
Add Docker images  
Add/Update/Delete network targets or websites 
Add air-gapped assets  
Consult stored credentials  
Create/Update/Delete stored credentials   
Create/Update/Delete an Ignoring Policy   
Create/Update/Delete a Security Issue   
Create/Update/Delete a custom compliance rule   
Create/Update/Delete an asset rule   
Add a compliance Benchmark   
Assign groups to assets   
Add a comment to users’ activities   
Manage users and rights   

(1) Requires explicit permission.


Back to top