Skip to main content Link Menu Expand (external link) Document Search Copy Copied

Table of authorized actions for users with global access

A user with global access can execute the following actions depending on its role:

  Auditor Security Administrator System Administrator Cyberwatch Administrator
Generate an export
Consult the Vulnerabilities Encyclopedia
Update the Vulnerabilities Encyclopedia    
Consult the Rules Encyclopedia
Consult the Security Issues
See the vulnerabilities of an asset
Consult the rules status of an asset
Access Kibana (1) (1) (1)
Ignore vulnerabilities on an asset  
Create a deploying/rebooting/scanning policy    
Deploy security fixes on an asset    
Update/Delete an asset    
Assign assets a deploying/rebooting/scanning policy    
Create/Update/Delete a custom compliance repository    
Assign/Remove rules to/from custom compliance repository    
Recheck compliance rules on an asset    
Assign/Remove compliance repositories to/from assets    
Update/Delete a deploying/rebooting/scanning policy    
Create/Update/Delete a Criticality    
Consult Discoveries
Use Discoveries      
Add agents    
Add agentless connections    
Add Docker images    
Add network targets or websites  
Add air-gapped assets    
Create/Update/Delete stored credentials      
Create/Update/Delete an Ignoring Policy      
Create/Update/Delete a Security Issue      
Create/Update/Delete a custom compliance rule      
Assign groups to assets      
Manage users and rights      

(1) Requires explicit permission.