System Users

Navigate to Settings > System Users to edit existing users and to set up new users for Threat Defender.

Do not confuse system users with users of the network assets (see Inventory > Users).

The table displays the existing system users with their username, role and a note. The buttons in the last column allow you to edit or delete the respective user.

You cannot delete the user you used to sign in, as at least one user has to be configured in the system.

To set up a new user, click the ADD button above the overview table.

1. User Settings

If you add or edit a system user, the settings screen is displayed with the following elements:

Field Description
Username Enter a unique username for the user that also serves as login name (case-sensitive). The username may consist of alphanumeric characters and special characters. It may not contain blank spaces.
Note Optional: Add a short description of the user.
E-mail Enter an email address for the user.
Password Enter a password for the user to log in to Threat Defender. Passwords may consist of up to 72 alpha-numeric and special characters. Click Show Password if you want to display the password in plaintext.
Role Assign a role to the user (see below for information on the individual roles and rights).

2. Role-based Access

Threat Defender provides several roles for system users that define what network information and settings they can access:

Role Access Rights
Full Admin Full admins have full access to all statistics and features of Threat Defender.
Read Only Read-only users can view all system information, but they cannot change the configuration.
Reporting Viewer Reporting viewers can view the statistics and reports on network traffic, threat intelligence and asssets.
Auditor Auditors can view statistics, reports and logs. They can see all menus and settings of Threat Defender, but are not permitted to edit them.
Security Admin Security admins can set up policies and dynamic network objects. They can also manage assets and view the details of IP addresses and assets. They also have access to the statistics and reports on network traffic and threat intelligence as well as the incident log and its details.
Network Admin Network admins can configure the basic settings of Threat Defender, manage assets, and view the statistics and reports on network traffic, threat intelligence and assets.

For more detailed information on the access rights of the individual roles, see Access Rights by User roles in the Appendix.

The buttons at the bottom of the screen allow you to store your changes (SAVE) or to discard them (CANCEL).

results matching ""

    No results matching ""