User roles and permissions

You can create any number of roles and customize its permissions based on your requirement. To learn how to create/modify roles, refer to this document. While creating a new role or modifying existing roles, you'll have the option to specify permission levels for each module of Vulnerability Manager Plus. The permission levels are broadly classified into:

  • Full Control
  • Write
  • Read
  • No Access

This document details the actions/operations that are associated with each module and which actions/operations are permitted based on the permission specified to each module while creating/modifying a role. Note that the administrator level permission will be restricted to the administrator role alone and can't be granted to any other roles. The reason that administrator permission is listed below is to show the limitations of other permission levels when compared with the administrator permission.

Note: Provision to configure permissions for Vulnerability Management module exclusively is available only in Vulnerability Manager Plus 10.1.2119.3 and above. For versions below 10.1.2119.3, Patch Management module permissions will cover all the actions listed in the table under the Vulnerability Management module.

ActionAdminFull ControlWriteRead
Vulnerability Management
View software vulnerabilities, system misconfigurations, high-risk software, and active port details
Allowed
Allowed
Allowed
Allowed
Resolve misconfigurations in systems
Allowed
Allowed
Allowed
Not Allowed
Uninstall Software
Allowed
Allowed
Allowed
Not Allowed
Update vulnerability database
Allowed
Allowed
Allowed
Not Allowed
Add/remove threat exceptions
Allowed
Allowed
Not Allowed
Not Allowed
View all compliance policies and their details
Allowed
Allowed
Allowed
Allowed
Group Compliance policies
Allowed
Allowed
Not Allowed
Not Allowed
View policy groups and their details
Allowed
Allowed
Allowed
Allowed
Modify policy group
Allowed
Allowed
Not Allowed
Not Allowed
Delete policy group
Allowed
Allowed
Not Allowed
Not Allowed
Create Audits
Allowed
Allowed
Allowed
Not Allowed
Delete audits
Allowed
Allowed
Allowed
Not Allowed
Modify audits
Allowed
Allowed
Allowed
Not Allowed
View compliance audit results
Allowed
Allowed
Allowed
Allowed
Patch Management
Install patches (or) Manual patch deployment
Allowed
Allowed
Allowed
Not Allowed
Automate Patch Deployment (APD)
Allowed
Allowed
Allowed
Not Allowed
APD Task List View
Allowed
Allowed
Allowed
Not Allowed
Edit or Delete APD
Allowed
Allowed
Allowed
Not Allowed
View Configurations
Allowed
Allowed
Allowed
Not Allowed
View Deployment Templates
Allowed
Allowed
Allowed
Not Allowed
Add, Edit or Delete Deployment Templates
Allowed
Allowed
Allowed
Not Allowed
Approve/Decline/Un Approve - Applicable Patches
Allowed
Allowed
Not Allowed
Not Allowed
Download / Re-download /Delete Patches
Allowed
Allowed
Allowed
Not Allowed
Deploy Missing Patches to All Managed Systems
Allowed
Allowed
Allowed
Not Allowed
Scan/Scan All
Allowed
Allowed
Allowed
Allowed
Patch Report
Allowed
Allowed
Allowed
Allowed
Patch Settings
Allowed
Allowed
Not Allowed
Not Allowed
Update Vulnerability Database
Allowed
Allowed
Allowed
Not Allowed
Wake On LAN - Wake up & schedule wake up
Allowed
Allowed
Allowed
Not Allowed
Remote Shutdown - Shutdown now & schedule shutdown
Allowed
Allowed
Allowed
Not Allowed
Network Devices
Adding Network Devices
Allowed
Allowed
Not Allowed
Not Allowed
Managed Devices Table View
Allowed
Allowed
Allowed
Allowed
Managing (Adding/Editing) Credentials
Allowed
Allowed
Not Allowed
Not Allowed
Removing Network Devices
Allowed
Allowed
Not Allowed
Not Allowed
Scanning Devices
Allowed
Allowed
Allowed
Allowed
Devices Summary/Hardware Details/Vulnerabilities
Allowed
Allowed
Allowed
Allowed
Upload and Install Patch
Allowed
Allowed
Allowed
Not Allowed
Detect Vulnerabilities
Allowed
Allowed
Allowed
Allowed
Dashboard
Allowed
Allowed
Allowed
Allowed
Credential Manager
Allowed
Allowed
Not Allowed
Not Allowed
Deployment View
Allowed
Allowed
Allowed
Allowed
Deployment configuration summary
Allowed
Allowed
Allowed
Allowed
Create, Delete, Modify custom group
Allowed
Allowed
Not Allowed
Not Allowed
Save as custom group
Allowed
Allowed
Allowed
Not Allowed
SoM
Remove computers
Allowed
Not Allowed
Not Allowed
Not Allowed
Remote Offices
Allowed
Not Allowed
Not Allowed
Not Allowed
IP Scope
Allowed
Not Allowed
Not Allowed
Not Allowed
Agent settings
Allowed
Allowed
Not Allowed
Not Allowed
Reports
View reports
Download Reports
Schedule reports
Delete reports
Query reports
Was this document useful?

Thank you for your feedback!

Sorry about that!

By clicking "Submit", you agree to processing of personal data according to the Privacy Policy.
SunMonTueWedThuFriSat
303112345678910111213141516171819202122232425262728293012345678910
:
PM
Back to Top