For each custom administrative role that you create, you can select the privileges and levels of access for each privilege. The levels of access for each privilege are:
- Enable—Allow read/write access to a page in the ESM Console.
- Disable—Hide access to a page.
- Read Only—Allow a user to view but not modify a page.
The following table describes the privileges that you can customize for each role.
Users whom are assigned this role can log in to the ESM Console.
|Enable License Notifications|
The ESM Console displays license notifications to users who have this privilege enabled when a license is due to expire or has expired.
Access to the main ESM Console Dashboard.
Access to the Security Events page.
Access to all policy pages.
Access to all exploit protection rule pages where you can view user-defined and default exploit protection rules. If your access permits, you can also configure new or modify existing rules and processes. For more granular control, configure access by Exploit page:
Access to all malware protection rule pages where you can view user-defined and default restriction rules and settings, malware protection rules, WildFire rules, and verdicts associated with files opened on your endpoints. If your access permits, you can also configure new or modify existing rules and configure administrative hash overrides. For more granular control, configure access by Malware page:
Access to the forensics management page and the agent query. For more granular control, configure access by the individual Forensics pages:
|Disable All Protection|
Access to halt all Traps protection rules.
Setting this privilege to read-only access functions the same as setting the access to disable. In both cases, the ESM Console hides the option from view.
Access to all monitoring pages.
Access to all agent monitoring pages. For more granular control, configure access by the individual Agent pages:
Access to all ESM monitoring pages. For more granular control, configure access by the individual ESM pages:
Access to the data retrieval monitoring page where you can monitor the status of data uploaded to the ESM Server, and export or delete data.
Access to configure or view any of the ESM, Agent, Conditions, or Licensing settings pages.
Access to configure any of the ESM settings. For more granular control, configure access by any of the ESM settings pages:
Access to configure any of the agent settings or action rules or to create installation packages for Mac endpoints. For more granular control, configure access by any of the settings pages:
Access to view and create conditions that you can use in policy rules.
Access to view and manage Traps licenses.
Administrative Roles Role-based access control (RBAC) enables you to use preconfigured or define custom roles to assign access rights to administrative users. Each role extends ...
Policy Rule Types
Policy Rule Types A complete endpoint security policy comprises policies that target specific methods of protection. The rules that make up each of these policies ...
Configure Administrative Roles
Configure Administrative Roles From the Administration Roles page, you can see all the built-in and custom roles for your organization. Creating custom roles enables you ...
Issues Addressed in Traps Endpoint Security Manager 4.1.3
Issues Addressed in Traps Endpoint Security Manager 4.1.3 The following table lists the issues that are addressed in the Traps™ 4.1.3 release. For new features ...
Traps Endpoint Security Manager Known Issues
Known issues with the Traps Endpoint Security Manager and Traps agent 4.1. ...
Changes to Default Behavior
Changes to Default Behavior The following sections describe changes to default behavior in Traps Endpoint Security Manager and Traps agent 4.1: Changes to Default Behavior ...
Traps Agent Settings Rules
Traps Agent Settings Rules Agent settings rules enable you to change preferences related to Traps from a central location. From the Settings Agent Settings page, ...
Create an Exploit Protection Rule
Create an Exploit Protection Rule An exploit protection rule uses exploit protection modules (EPMs) to protect processes in your organization from specific exploitation techniques. Each ...
Exploit Protection Rules
Exploit Protection Rules An exploit protection rule uses exploit protection modules (EPMs) to protect processes in your organization from specific exploitation techniques. An EPM is ...