Abilities and Capabilities
Roles are made up of capabilities which include a scope and an ability. These define the allowed actions and the set of data that they apply to. For example, the (HR, Read) capability should be read and interpreted as “Read ability on the HR scope”. This capability would allow access to the HR scope and all its children.
Ability |
Description |
---|---|
Installer |
Install, monitor, and upgrade software agents. |
Audit |
Global appliance data read support and access to change logs. |
Read |
Read all data including flows, application, and inventory filters. |
Write |
Make changes to applications and inventory filters. |
Execute |
Perform Automatically discover policies run and publish policies for analysis. |
Enforce |
Enforce policies that are defined in application workspaces that are associated with the given scope. |
SecOps Read |
Read all flows, alerts, vulnerabilities, and forensics events for the assigned scope. |
|
Abilities are inherited, for example, the Execute ability allows all the Read, Write, and Execute actions. |
|
Abilities apply to the scope and all the scope’s children. |
Component-specific Abilities and Capabilities
The following table describes the abilities and capabilities specific to a component.
Component Name |
Installer |
Read |
Audit |
Write |
Execute |
Enforce |
Owner |
---|---|---|---|---|---|---|---|
Security Dashboard |
Not Applicable |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Scopes and Inventory |
Not Applicable |
Read-only |
Read-only |
Read-only |
Read-only |
Read-only |
Yes |
Label Management |
Not Applicable |
Read-only |
Read-only |
Read-only |
Read-only |
Read-only |
Yes |
Inventory Filters |
Not Applicable |
Read-only |
Read-only |
Yes |
Yes |
Yes |
Yes |
Segmentation |
Not Applicable |
Read-only |
Read-only |
Add policies, but cannot publish/enforce them or manage alerts |
Add/publish policies, but cannot enforce or manage alerts |
Yes |
Yes |
Enforcement Status |
Not Applicable |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Policy Templates |
Not Applicable |
Read-only |
Read-only |
Read-only |
Read-only |
Read-only |
Yes |
Forensic Rules |
Not Applicable |
Read-only |
Read-only |
Read-only |
Read-only |
Read-only |
Yes |
Traffic |
Not Applicable |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Alerts |
Not Applicable |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Vulnerabilities |
Not Applicable |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Forensics |
Not Applicable |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Reporting Dashboard |
Not Applicable |
Yes |
Yes |
Yes |
Yes |
Yes |
Yes |
Agent Install |
Yes |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Agent Upgrade |
Yes |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Agent convert to enforcement |
Yes |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Agent Configure |
Read-only |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Agent Monitor |
Yes |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Agent Distribution |
Yes |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Agent list |
Only applicable to the deletion of agents and the generation of tokens for service protection |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Alert Conifg |
Not Applicable |
Read-only |
Read-only |
Read-only |
Read-only |
Read-only |
Yes |
Vitual Appliances |
Not Applicable |
Read-only |
Read-only |
Read-only |
Read-only |
Read-only |
Yes |
Connectors |
Not Applicable |
Read-only |
Read-only |
Read-only |
Read-only |
Read-only |
Yes |
Secure Connector |
Not Applicable |
Read-only |
Read-only |
Read-only |
Read-only |
Read-only |
Yes |
External Orchestrators |
Not Applicable |
Read-only |
Read-only |
Read-only |
Read-only |
Read-only |
Yes |
Kubernetes |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Roles |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Users |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Licenses |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Change Logs |
Not Applicable |
Not Applicable |
No |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Session Configuration |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Data Tap Admin |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
Collection Rules |
Not Applicable |
Read-only |
Read-only |
Read-only |
Read-only |
Read-only |
Yes |
IP Addresses |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Not Applicable |
Yes |
API Key Capabilities |
software_download |
|
|
|
|
|
|