Table of authorized actions for users with limited access to assets

A user with limited access to assets can execute the following actions depending on its role:

 AuditorSecurity AdministratorSystem Administrator
Generate an export
Consult the Vulnerabilities Encyclopedia
Update the Vulnerabilities Encyclopedia  
Consult the Rules Encyclopedia
Consult compliance Benchmarks
Consult the Security Issues
Consult Ignoring policies
Consult asset rules
Consult criticalities
Consult corrective actions
Consult users’ activities
See the details of an asset
Consult the compliance rules status of an asset
Access Kibana(1)(1)(1)
Ignore vulnerabilities on an asset 
Update/Delete an asset  
Create a deployment/reboot/scanning policy  
Deploy security fixes on an asset  
Assign assets a deployment/reboot/scanning policy  
Create/Update/Delete a custom compliance repository  
Assign/Remove rules to/from custom compliance repository  
Recheck compliance rules on an asset  
Assign/Remove compliance repositories to/from assets   
Update/Delete a deployment/reboot/scanning policy   
Create/Update/Delete a Criticality   
Consult Discoveries   
Create/Update Discoveries   
Add agents  (2)
Add agentless connections   
Add Docker images   
Add/Update/Delete network targets or websites (2)(2)
Add air-gapped assets  (2)
Consult stored credentials   
Create/Update/Delete stored credentials   
Create/Update/Delete an Ignoring Policy   
Create/Update/Delete a Security Issue   
Create/Update/Delete a custom compliance rule   
Create/Update/Delete an asset rule   
Add a compliance Benchmark   
Assign groups to assets   
Add a comment to users’ activities   
Manage users and rights   

(1) Requires explicit permission.

(2) Requires a group.