Role Availability | Read-Only | Analyst | Manager |
USM Central implements role-based access control (RBAC) Describes authentication and authorization scheme in which access to functionality is based on the privileges or permissions associated with the group or role a user is a member of., which provides users with the following:
- The ability to restrict certain users from accessing administrative capabilities like adding new users
- Predefined roles Tasks and responsibilities based on job description and position within an organization. A user's role is often used to define access to functionality and privileges to perform specific tasks and operations. that range from read-only access to full administrative capabilities so managers can easily select the appropriate role for a new user
There are three roles in USM Central:
- Read-Only: You can access views and search the system but cannot make system changes that impact other users.
- Analyst: You can view and search the system and perform all the same tasks as the Read-Only role, and also view alarms.
- Manager: This role enables Analyst permissions, and also enables you to update deployments, add or configure credentials for users, and view alarms.
You can see the predefined roles in USM Central in the following table.
Section | Action | Read-Only User | Analyst User | Manager User |
---|---|---|---|---|
Bottom Navigation | Bookmarks, help, feedback links | |||
Profile Settings | ||||
Alarms | View: alarms Alarms provide notification of an event or sequence of events that require attention or investigation. page and alarm details | |||
Configure filters | ||||
Asset drop-down menu items: add to current filter, look up in OTX The world’s first truly open threat intelligence community. Enables collaborative defense with open access, collaborative research, and seamless integration with USM Anywhere and USM Appliance, and AlienApps for other security products. | ||||
Asset drop-down menu items: full details | ||||
Manage columns | ||||
Generate report | ||||
Save views | ||||
Alarm details: create rule | ||||
Alarm labels: apply, create, manage | ||||
Alarm Status: update | ||||
Vulnerabilities | View: vulnerabilities page and vulnerabilities details | |||
Generate report | ||||
Save views | ||||
Asset drop-down menu items: add to current filter, look up in OTX, full details | ||||
Configuration Issues | View: configuration issues page and configuration issues details | |||
Configure filters | ||||
Generate report | ||||
Save view | ||||
Asset drop-down menu items: add to current filter, look up in OTX, full details | ||||
Settings > Deployments | View the deployments page | |||
Connect to an existing deployment | ||||
Create a new deployment | ||||
Disconnect a deployment | ||||
Configure a deployment | ||||
Access a connected deployment | ||||
Settings > Users | View the user page | |||
Edit a user | ||||
Delete a user | ||||
Create a user | ||||
Settings > System Events | View the system events page | |||
Settings > System Settings | Modify the session timeout | |||
Settings > Rules | View the rules page | |||
Create an orchestration rule | ||||
Reports > Saved Reports | Edit a report | |||
Copy a report | ||||
Delete a report |