KUMA users may have the following roles:
User roles rights
Web interface section and actions |
General administrator |
Tenant administrator |
Tier 2 analyst |
Tier 1 analyst |
Junior analyst |
Manage shared resources |
Read shared resources |
Access to NCIRCC |
Access to CII |
Comment |
Reports |
|
|
|
|
|
|
|
|
|
|
Create report template |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
View and edit templates and reports |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
Tier 2 analysts and Tier 1 analysts can:
Tier 2 analysts can edit predefined templates. Specifying the user's email address in the template is no longer grounds for providing access to a report generated from that template. Such a report is available to the user for viewing if all tenants specified in the template are available for the user's role. |
Generate reports |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
Tier 2 analysts and Tier 1 analysts can generate any reports, their own and those of other users, provided that all tenants specified in the template are available for the role. Tier 2 analysts and Tier 1 analysts cannot generate reports that were sent to the analyst by email. |
View generated reports |
yes |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
Junior analysts, Tier 1 analysts, and Tier 2 analysts have read access to their own and others' reports, including predefined reports, as long as they have full access to the tenants of the report. |
Modify generated reports |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
A Tier 2 analyst can change generation settings of predefined templates. |
Export generated reports |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
Tier 2 analysts and Tier 1 analysts can download any reports, provided that all tenants specified in the template are available for the role. |
Delete templates and generated reports |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
Tier 2 analysts can delete their own templates and reports, as well as predefined templates. Tier 2 analysts cannot delete reports that were sent to them by email. General administrator, Tenant administrator, Tier 2 analyst can delete predefined templates and reports. |
Edit the settings for generating reports |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
Tier 2 analysts can edit the settings for generating predefined templates and reports, as well as their own templates and reports. Tier 1 analysts can edit the settings for generating the reports they created. |
Duplicate report template |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
Tier 2 analysts and Tier 1 analysts can duplicate their own reports and predefined reports. |
Open the generated report by email |
yes |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
If a report is sent as a link, it is available to KUMA users only. If a report is sent as an attachment, the report is available to the recipient if all tenants specified in the report template are available to the role of the recipient. |
Dashboard |
|
|
|
|
|
|
|
|
|
|
View data on the dashboard and change layouts |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
Available if the user has full access. Full access means that the list of tenants defined at the dashboard level is identical to the list of tenants available to the user. Tenants in the toggle switch are also taken into account. |
View the Universal layout |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Add layouts |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
This includes adding widgets to a layout. Only the general administrator can add a universal layout. |
Edit and rename layouts |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
This includes adding, editing, and deleting widgets. Tier 2 analysts can change/rename predefined layouts and layouts that were created by their own account. Tier 1 analysts can edit/rename layouts created by their own account. |
Delete layouts |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
Tenant administrators may delete layouts in the tenants available to them. Tier 2 analysts and Tier 1 analysts can delete layouts created by their own account. General administrators, Tenant administrators, and Tier 2 analysts can delete predefined layouts. When the kuma-core.service service is restarted, predefined layouts are restored to their original condition if they were previously deleted. |
Enable and disable the TV mode |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Resources → Services and Resources → Services → Active services |
|
|
|
|
|
|
|
|
|
|
View the list of active services |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
Only the General Administrator can view and delete storage spaces. Access rights do not depend on the tenants selected in the menu. Tier 1 analysts and Tier 2 analysts can:
Access to viewing active services was added to the Junior analyst, Access to CII, Access to NCIRCC roles. These roles have the following abilities:
|
View and delete partitions in storage |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Download service logs |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Copy the service ID |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Refresh the table of active services |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Go to Events |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
View the contents of the active list |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
View the content of a context table |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Import/export/clear/add/edit/delete active list content |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
Tier 1 analysts can import data into any list of a correlator of an available tenant. |
Import/export/clear/add/edit/delete context table content |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
Tier 1 analysts can import data into any table of a correlator of an available tenant. |
Create a resource set for services |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
Tier 2 analysts cannot create storages. |
Create a service under Resources → Services → Active services |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
Only the general administrator can create a service. |
Delete services |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
View services that have the gray status |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Restart services |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Update the settings of services |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
|
Reset certificates |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
Users with the Tenant administrator role can reset the certificates of services only in the tenants that are accessible to the user. |
Collect and analyze data |
|
|
|
|
|
|
|
|
|
|
View the scheduler configuration |
yes |
yes |
yes |
no |
no |
no |
yes |
no |
no |
|
Create a scheduler |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
|
Link storages and correlators |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
|
Run |
yes |
yes |
yes |
no |
no |
yes |
no |
no |
no |
|
Resources → Resource configuration and Service configuration |
|
|
|
|
|
|
|
|
|
|
View the list of resource and service configurations |
yes |
yes |
yes |
yes |
no |
yes |
yes |
no |
no |
The configuration of a secret resource can be viewed by the following roles: Tier 1 analyst, Tier 2 analyst, Manage shared resources, and Read shared resources. The list of secrets is available when creating services (collector, correlator, agent), resources, settings. The Manage shared resources role grants access to viewing and editing resources only in the Shared tenant. The Read shared resources role grants access to viewing resources only in the Shared tenant. Access rights do not depend on the tenants selected in the menu. That is, the Storage section may be visible because the user has the administrator role in a tenant in which no storage was created. In that case, the Storage section is displayed, but contains no information. Only the General administrator can view configurations of the event router service. |
Create a service configuration |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
The configuration of the Storage service cannot be viewed by the following roles: Tier 1 analyst and Tier 2 analyst. |
Create a resource configuration |
yes |
yes |
yes |
yes |
no |
yes |
no |
no |
no |
Creating a configuration for a secret resource is not available to the following roles: Tier 2 analyst, Tier 1 analyst, and Manage shared resources. |
Duplicate the configuration of a resource/service |
yes |
yes |
yes |
yes |
no |
yes |
no |
no |
no |
Tier 1 analysts can duplicate a resource created by other users, including the resource set of a service. However, Tier 1 analysts cannot change the dependent resources in the copy of the set of service resources. |
Edit the configuration of a resource/service |
yes |
yes |
yes |
yes |
no |
yes |
no |
no |
no |
Tier 2 analysts cannot edit resources of secrets. |
Delete the configuration of a resource/service |
yes |
yes |
yes |
yes |
no |
yes |
no |
no |
no |
Tier 2 analysts cannot delete resources of secrets. |
Import the configuration of a resource/service from a file |
yes |
yes |
yes |
yes |
no |
yes |
no |
no |
no |
The following roles can import resources to the Shared tenant: General administrator and Manage shared resources. User rights are not checked at the time of upload, instead they are checked at the time of import, when a tenant is already selected. Therefore, if the user account is not trusted, you must clear the POST /resources/toc, POST /resources/upload check boxes in the properties of API methods. |
View the repository, import the resources from the repository |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
The Shared tenant's dependent resources are imported into the Shared tenant. A special right to the Shared tenant is not required; only the right to import in the target tenant is checked. |
Export the configuration of a resource/service |
yes |
yes |
yes |
yes |
no |
yes |
yes |
no |
no |
This includes resources from the Shared tenant. |
Export correlation rules to MITRE ATT&CK Navigator |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Create and edit a resource configuration in the Shared tenant |
yes |
no |
no |
no |
no |
yes |
yes |
no |
no |
|
View a resource in the Shared tenant (including linking, export, duplication) |
yes |
no |
no |
no |
no |
yes |
yes |
no |
no |
|
Source status → List of event sources |
|
|
|
|
|
|
|
|
|
|
View sources of events |
yes |
yes |
yes |
yes |
yes |
yes |
no |
yes |
yes |
|
Change sources of events |
yes |
yes |
yes |
no |
no |
yes |
no |
no |
no |
|
Delete sources of events |
yes |
yes |
yes |
no |
no |
yes |
no |
no |
no |
|
Source status → Monitoring policies |
|
|
|
|
|
|
|
|
|
|
View monitoring policies |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
|
Create monitoring policies |
yes |
yes |
yes |
no |
no |
yes |
no |
no |
no |
|
Edit monitoring policies |
yes |
yes |
yes |
no |
no |
yes |
no |
no |
no |
Only the general administrator can edit the predefined monitoring policies. |
Delete monitoring policies |
yes |
yes |
yes |
no |
no |
yes |
no |
no |
no |
Predefined policies cannot be removed. |
Assets |
|
|
|
|
|
|
|
|
|
|
View the list of assets |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
View the list of categories |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
This includes categories of the Shared tenant. |
Add/edit/delete asset categories |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
Within the tenant available to the user. |
Add asset categories in the Shared tenant |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
This includes editing and deleting categories of the Shared tenant. |
Link assets to an asset category of the Shared tenant |
yes |
yes |
yes |
yes |
no |
yes |
yes |
no |
no |
|
Add assets |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Edit assets |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Delete assets |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Import assets from Kaspersky Security Center |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Start tasks on assets in Kaspersky Security Center |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Run tasks to move an asset to a Kaspersky Security Center administration group |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Run tasks on assets in Kaspersky Endpoint Detection and Response |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Initiating the change of asset status in KICS for Networks |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Confirm updates to fix the asset vulnerabilities and accept the licensing agreements |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Editing CII categorization in the asset card |
yes |
no |
no |
no |
no |
no |
no |
no |
yes |
|
Editing custom fields of the assets (Settings → Assets) |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Alerts |
|
|
|
|
|
|
|
|
|
|
View the list of alerts |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Change the severity of alerts |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Open the details of alerts |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Assign responsible users |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Close alerts |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Add comments to alerts |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Attach an event to alerts |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Detach an event from alerts |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Edit and delete someone else's filters |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
Tier 2 analysts and Junior analysts can edit or delete only their own filter resources. |
Incidents |
|
|
|
|
|
|
|
|
|
|
View the list of incidents |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Create blank incidents |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Manually create incidents from alerts |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Change the severity of incidents |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Open the incident details |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
Incident details display data from only those tenants to which the user has access. |
Assign executors |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Close incidents |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Add comments to incidents |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Attach alerts to incidents |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Detach alerts from incidents |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Edit and delete someone else's filters |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
Tier 2 analysts, Tier 1 analysts, and Junior analysts can edit or delete only their own filter resources. |
Export incidents to NCIRCC |
yes |
no |
no |
no |
no |
no |
no |
yes |
no |
The functions are always available to the General administrator. Other users can use the functions if the Can interact with NCIRCC check box is selected in their profile.
|
Send files to NCIRCC |
yes |
no |
no |
no |
no |
no |
no |
yes |
no |
|
Download files sent to NCIRCC |
yes |
no |
no |
no |
no |
no |
no |
yes |
no |
|
Export additional incident data to NCIRCC upon request |
yes |
no |
no |
no |
no |
no |
no |
yes |
no |
|
Send messages to NCIRCC |
yes |
no |
no |
no |
no |
no |
no |
yes |
no |
|
View messages from NCIRCC |
yes |
no |
no |
no |
no |
no |
no |
yes |
no |
|
View incident data exported to NCIRCC |
yes |
no |
no |
no |
no |
no |
no |
yes |
no |
|
Events |
|
|
|
|
|
|
|
|
|
|
View the list of events |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Search events |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Open the details of events |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Open statistics |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Perform a retroscan |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
|
Export events to a TSV file |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
View filters (search query) |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
|
Add (save) filter |
yes |
yes |
yes |
yes |
yes |
yes |
no |
yes |
yes |
|
Edit or delete someone else's filter folders |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
Tier 2 analysts, Tier 1 analysts, and Junior analysts can edit or delete only their own filter resources. |
Delete own filters |
yes |
yes |
yes |
yes |
yes |
yes |
no |
yes |
yes |
|
Delete other users' filters |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Start ktl enrichment |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Run tasks on Kaspersky Endpoint Detection and Response assets in event details |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Create presets |
yes |
yes |
yes |
yes |
yes |
yes |
no |
yes |
yes |
|
Delete presets |
yes |
yes |
yes |
yes |
yes |
yes |
no |
yes |
yes |
Tier 2 analysts, Tier 1 analysts, and Junior analysts can delete only their own presets. |
View and use presets |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
|
Settings → Users |
|
|
|
|
|
|
|
|
|
|
View the list of users |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Add a user |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Edit a user |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Generate token |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
All users can generate their own tokens. The general administrator can generate a token for any user. |
Change access rights for a token |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
The General administrator can modify access rights for any user. Users can assign to themselves only those rights that are available to them as part of the user's role. |
View the data of their own profile |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
|
Edit the data of their own profile |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
The user role is not available for change. |
Settings → LDAP server |
|
|
|
|
|
|
|
|
|
|
View the LDAP connection settings |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Edit the LDAP connection settings |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Delete the configuration of an entire tenant from the settings |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Import assets |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Tenants |
|
|
|
|
|
|
|
|
|
This section is available only to the general administrator. |
View the list of tenants |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Add tenants |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Change tenants |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Export tenants |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Domain authorization |
|
|
|
|
|
|
|
|
|
This section is available only to the general administrator. |
View the Active Directory connection settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Edit the Active Directory connection settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Add filters based on roles for tenants |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Common |
|
|
|
|
|
|
|
|
|
This section is available only to the general administrator. |
View the SMTP connection settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Edit the SMTP connection settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → License |
|
|
|
|
|
|
|
|
|
This section is available only to the general administrator. |
View the list of added license keys |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Add license keys |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Delete license keys |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Kaspersky Security Center |
|
|
|
|
|
|
|
|
|
|
View the list of successfully integrated Kaspersky Security Center servers |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Add Kaspersky Security Center connections |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Delete Kaspersky Security Center connections |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Delete the configuration of an entire tenant from the settings |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Start the tasks for importing Kaspersky Security Center assets |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Settings → KICS/KATA |
|
|
|
|
|
|
|
|
|
|
View a list of KICS/KATA servers with which integration has been configured |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Add and modify the settings of KICS/KATA integration |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Delete the settings of KICS/KATA integration |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Run the tasks to import assets from the KICS/KATA settings |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Kaspersky Automated Security Awareness Platform |
|
|
|
|
|
|
|
|
|
|
View the ASAP integration settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Edit the ASAP integration settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Kaspersky Endpoint Detection and Response |
|
|
|
|
|
|
|
|
|
|
View the connection settings |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Add, edit and disconnect the connections when the distributed solution mode is enabled |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Enable the distributed solution mode |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Add connections when the distributed solution mode is disabled |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Delete the connections when the distributed solution mode is disabled |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Delete the configuration of an entire tenant from the settings |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Kaspersky CyberTrace |
|
|
|
|
|
|
|
|
|
This section is available only to the general administrator. |
View the CyberTrace integration settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Edit the CyberTrace integration settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → IRP / SOAR |
|
|
|
|
|
|
|
|
|
This section is available only to the general administrator. |
View the settings for integration with IRP / SOAR |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Edit the IRP/SOAR integration settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Kaspersky Threat Lookup |
|
|
|
|
|
|
|
|
|
This section is available only to the general administrator. |
View the Threat Lookup integration settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Edit the Threat Lookup integration settings |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Alerts |
|
|
|
|
|
|
|
|
|
|
View the parameters |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Edit the parameters |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
|
Delete the configuration of an entire tenant from the settings |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
|
Settings → Incidents → Automatic linking of alerts to incidents |
|
|
|
|
|
|
|
|
|
This section is available for an account with the Tenant administrator, Tier 2 analyst, and Tier 1 analyst roles if the role is assigned in the Main tenant. |
View the parameters |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Edit the parameters |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Incidents → Incident types |
|
|
|
|
|
|
|
|
|
|
View the categories reference |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
View the categories charts |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Add categories |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Edit categories |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Delete categories |
yes |
yes |
no |
no |
no |
no |
no |
no |
no |
|
Settings → NCIRCC |
|
|
|
|
|
|
|
|
|
|
View the parameters |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Edit the parameters |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Asset audit |
|
|
|
|
|
|
|
|
|
|
Create, clone and edit the settings |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
|
View the parameters |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Delete settings |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
|
Settings → Repository update |
|
|
|
|
|
|
|
|
|
|
View the parameters |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
|
Edit the parameters |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Start the repository update task manually |
yes |
yes |
yes |
no |
no |
no |
no |
no |
no |
|
Settings → Assets |
|
|
|
|
|
|
|
|
|
|
Add, edit, and delete the asset fields |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Settings → Space sets |
|
|
|
|
|
|
|
|
|
|
Viewing the list of sets |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
To view your sets, you must log in to your profile. The profile displays a list of assigned sets; you can hover over a set to display the list of available spaces. |
Adding, editing, deleting a space set |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
The default set (All spaces) cannot be edited. |
Setting the default space set |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Assigning a space set to a user |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
Can only be done with rights in the Main tenant. |
Settings → Tags |
|
|
|
|
|
|
|
|
|
|
View the list of tags |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
no |
|
Settings → Extended event schema fields |
|
|
|
|
|
|
|
|
|
|
Viewing the table of extended event schema fields |
yes |
yes |
yes |
yes |
yes |
no |
yes |
no |
no |
|
Exporting extended event schema fields |
yes |
yes |
yes |
yes |
yes |
no |
yes |
no |
no |
Service fields of the extended event schema with the |
Adding and modifying extended event schema fields |
yes |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
Service fields of the extended event schema with the |
Importing extended event schema fields |
yes |
yes |
yes |
yes |
yes |
no |
no |
no |
no |
|
Removing and disabling extended event schema fields |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
Service fields of the extended event schema with the |
Metrics |
|
|
|
|
|
|
|
|
|
|
Open metrics |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Task manager |
|
|
|
|
|
|
|
|
|
|
View a list of your own tasks |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
A user with the General administrator role has access to tasks of all tenants. Tenant administrators can view and manage tasks of other users in tenants available to the Tenant administrator. Users have access to tasks in available tenants. A user can restart a task of another user if the restarting user has rights to start tasks of that type. |
Finish your own tasks |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
Restart your own tasks |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
|
View a list of all tasks |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Finish any task |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Restart any task |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
CyberTrace |
|
|
|
|
|
|
|
|
|
This section is not displayed in the web interface unless CyberTrace integration is configured under Settings → CyberTrace. |
Open the section |
yes |
no |
no |
no |
no |
no |
no |
no |
no |
|
Access to the data of tenants |
|
|
|
|
|
|
|
|
|
|
Access to tenants |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
A user has access to the tenant if its name is indicated in the settings blocks of the roles assigned to the user account. The access level depends on which role is indicated for the tenant. |
Shared tenant |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
yes |
A shared tenant is used to store shared resources that must be available to all tenants. Although services cannot be owned by the Shared tenant, these services may utilize resources that are owned by the Shared tenant. These services are still owned by their respective tenants. Events, alerts and incidents cannot be shared. Permissions to access the Shared tenant:
|
Main tenant |
yes |
yes |
yes |
yes |
yes |
no |
no |
yes |
yes |
A user has access to the main tenant if its name is indicated in the settings blocks of the roles assigned to the user account. The access level depends on which role is indicated for the tenant. Permissions to access the main tenant do not grant access to other tenants. |