Table of authorized actions for users with global access
A user with global access can execute the following actions depending on its role:
Auditor | Security Administrator | System Administrator | Cyberwatch Administrator | |
---|---|---|---|---|
Generate an export | ✓ | ✓ | ✓ | ✓ |
Consult the Vulnerabilities Encyclopedia | ✓ | ✓ | ✓ | ✓ |
Update the Vulnerabilities Encyclopedia | ✓ | ✓ | ||
Consult the Rules Encyclopedia | ✓ | ✓ | ✓ | ✓ |
Consult the Security Issues | ✓ | ✓ | ✓ | ✓ |
See the vulnerabilities of an asset | ✓ | ✓ | ✓ | ✓ |
Consult the rules status of an asset | ✓ | ✓ | ✓ | ✓ |
Access Kibana | ✓(1) | ✓(1) | ✓(1) | ✓ |
Ignore vulnerabilities on an asset | ✓ | ✓ | ✓ | |
Create a deploying/rebooting/scanning policy | ✓ | ✓ | ||
Deploy security fixes on an asset | ✓ | ✓ | ||
Update/Delete an asset | ✓ | ✓ | ||
Assign assets a deploying/rebooting/scanning policy | ✓ | ✓ | ||
Create/Update/Delete a custom compliance repository | ✓ | ✓ | ||
Assign/Remove rules to/from custom compliance repository | ✓ | ✓ | ||
Recheck compliance rules on an asset | ✓ | ✓ | ||
Assign/Remove compliance repositories to/from assets | ✓ | ✓ | ||
Update/Delete a deploying/rebooting/scanning policy | ✓ | ✓ | ||
Create/Update/Delete a Criticality | ✓ | ✓ | ||
Consult Discoveries | ✓ | ✓ | ✓ | ✓ |
Use Discoveries | ✓ | |||
Add agents | ✓ | ✓ | ||
Add agentless connections | ✓ | ✓ | ||
Add Docker images | ✓ | ✓ | ||
Add network targets or websites | ✓ | ✓ | ✓ | |
Add air-gapped assets | ✓ | ✓ | ||
Create/Update/Delete stored credentials | ✓ | |||
Create/Update/Delete an Ignoring Policy | ✓ | |||
Create/Update/Delete a Security Issue | ✓ | |||
Create/Update/Delete a custom compliance rule | ✓ | |||
Assign groups to assets | ✓ | |||
Manage users and rights | ✓ |
(1) Requires explicit permission.