For each custom administrative role that you create, you can select the privileges and levels of access for each privilege. The levels of access for each privilege are:
- Enable—Allow read/write access to a page in the ESM Console.
- Disable—Hide access to a page.
- Read Only—Allow a user to view but not modify a page.
The following table describes the privileges that you can customize for each role.
Users whom are assigned this role can log in to the ESM Console.
|Enable License Notifications|
The ESM Console displays license notifications to users who have this privilege enabled when a license is due to expire or has expired.
Access to the main ESM Console Dashboard.
Access to the Security Events page.
Access to all policy pages.
Access to all exploit protection rule pages where you can view user-defined and default exploit protection rules. If your access permits, you can also configure new or modify existing rules and processes. For more granular control, configure access by Exploit page:
Access to all malware protection rule pages where you can view user-defined and default restriction rules and settings, malware protection rules, WildFire rules, and verdicts associated with files opened on your endpoints. If your access permits, you can also configure new or modify existing rules and configure administrative hash overrides. For more granular control, configure access by Malware page:
Access to the forensics management page and the agent query. For more granular control, configure access by the individual Forensics pages:
|Disable All Protection|
Access to halt all Traps protection rules.
Setting this privilege to read-only access functions the same as setting the access to disable. In both cases, the ESM Console hides the option from view.
Access to all monitoring pages.
Access to all agent monitoring pages. For more granular control, configure access by the individual Agent pages:
Access to all ESM monitoring pages. For more granular control, configure access by the individual ESM pages:
Access to the data retrieval monitoring page where you can monitor the status of data uploaded to the ESM Server, and export or delete data.
|Security Error Log|
Access to view security error logs.
Access to configure or view any of the ESM, Agent, Conditions, or Licensing settings pages.
Access to configure any of the ESM settings. For more granular control, configure access by any of the ESM settings pages:
Access to configure any of the agent settings or action rules or to create installation packages. For more granular control, configure access by any of the settings pages:
Access to view and create virtual groups for use in policy rules.
Access to view and create conditions that you can use in policy rules.
Access to view and manage Traps licenses.
Administrative Roles Role-based access control (RBAC) enables you to use preconfigured or define custom roles to assign access rights to administrative users. Each role extends ...
Issues Addressed in Traps Endpoint Security Manager 4.2
List of addressed issues in the Traps Endpoint Security Manager 4.2. ...
Traps Endpoint Security Manager Known Issues
Known issues with the Traps Endpoint Security Manager and Traps agent 4.2. ...
Policy Rule Types
Policy Rule Types A complete endpoint security policy comprises policies that target specific methods of protection. The rules that make up each of these policies ...
Changes to Default Behavior
Review the changes to default behavior in ESM and Traps 4.2 releases. ...
Features Introduced in Traps Endpoint Security Manager
Features Introduced in Traps Endpoint Security Manager The following topics describe the new features introduced in Traps Endpoint Security Manager (ESM) and Traps 4.2. For ...
Traps for Linux
Traps for Linux The Traps agent protects Linux servers by preventing attackers from leveraging software exploits or vulnerabilities to compromise an endpoint. The Traps agent ...
Exploit Protection Rules
Exploit Protection Rules An exploit protection rule uses exploit protection modules (EPMs) to protect processes in your organization from specific exploitation techniques. An EPM is ...
Configure Administrative Roles
Configure Administrative Roles From the Administration Roles page, you can see all the built-in and custom roles for your organization. Creating custom roles enables you ...