Administrative Privileges
Table of Contents
4.2 (EoS)
Expand all | Collapse all
-
- Set Up the Endpoint Infrastructure
- Activate Traps Licenses
-
- Endpoint Infrastructure Installation Considerations
- TLS/SSL Encryption for Traps Components
- Configure the MS-SQL Server Database
- Install the Endpoint Security Manager Server Software
- Install the Endpoint Security Manager Console Software
- Manage Proxy Communication with the Endpoint Security Manager
- Load Balance Traffic to ESM Servers
-
- Malware Protection Policy Best Practices
- Malware Protection Flow
- Manage Trusted Signers
-
- Remove an Endpoint from the Health Page
- Install an End-of-Life Traps Agent Version
-
-
- Traps Troubleshooting Resources
- Traps and Endpoint Security Manager Processes
- ESM Tech Support File
-
- Access Cytool
- View the Status of the Agent Using Cytool
- View Processes Currently Protected by Traps Using Cytool
- Manage Logging of Traps Components Using Cytool
- Restore a Quarantined File Using Cytool
- View Statistics for a Protected Process Using Cytool
- View Details About the Traps Local Analysis Module Using Cy...
- View Hash Details About a File Using Cytool
Administrative Privileges
For each custom administrative role that you create,
you can select the privileges and levels of access for each privilege.
The levels of access for each privilege are:
- Enable—Allow read/write access to a page in the ESM Console.
- Disable—Hide access to a page.
- Read Only—Allow a user to view but not modify a page.
The following table describes the privileges that you can customize
for each role.
Privilege | Description |
---|---|
Is Active | Users whom are assigned this role can log
in to the ESM Console. |
Enable License Notifications | The ESM Console displays license notifications
to users who have this privilege enabled when a license is due to
expire or has expired. |
Dashboard | Access to the main ESM Console Dashboard. |
Security Events | Access to the Security Events page. |
Policies | Access to all policy pages. |
Exploit | Access to all exploit protection rule pages
where you can view user-defined and default exploit protection rules.
If your access permits, you can also configure new or modify existing
rules and processes. For more granular control, configure access
by Exploit page:
|
Malware | Access to all malware protection rule pages
where you can view user-defined and default restriction rules and
settings, malware protection rules, WildFire rules, and verdicts
associated with files opened on your endpoints. If your access permits,
you can also configure new or modify existing rules and configure
administrative hash overrides. For more granular control, configure
access by Malware page:
|
Forensics | Access to the forensics management page
and the agent query. For more granular control, configure access
by the individual Forensics pages:
|
Disable All Protection | Access to halt all Traps protection rules. Setting
this privilege to read-only access functions the same as setting
the access to disable. In both cases, the ESM Console hides the
option from view. |
Monitor | Access to all monitoring pages. |
Agent | Access to all agent monitoring pages. For
more granular control, configure access by the individual Agent
pages:
|
ESM | Access to all ESM monitoring pages. For
more granular control, configure access by the individual ESM pages:
|
Data Retrieval | Access to the data retrieval monitoring
page where you can monitor the status of data uploaded to the ESM
Server, and export or delete data. |
Security Error Log | Access to view security error logs. |
Settings | Access to configure or view any of the ESM,
Agent, Conditions, or Licensing settings pages. |
ESM | Access to configure any of the ESM settings.
For more granular control, configure access by any of the ESM settings
pages:
|
Agent | Access to configure any of
the agent settings or action rules or to create installation packages.
For more granular control, configure access by any of the settings
pages:
|
Virtual Groups | Access to view and create virtual
groups for use in policy rules. |
Conditions | Access to view and create conditions
that you can use in policy rules. |
Licensing | Access to view and manage Traps licenses. |