Documentation Center
AlienVault® USM Anywhere™

Role-Based Access Control (RBAC) in USM Anywhere

  Role Availability   Read-Only   Analyst   Manager

USM Anywhere implements the role-based access control (RBAC)Describes authentication and authorization scheme in which access to functionality is based on the privileges or permissions associated with the group or role a user is a member of., which provides users with

There are three roles in USM Anywhere

Predefined Roles in USM Anywhere

Section Action Read-Only User Analyst User Manager User
Dashboards Dashboard and Dashboard views
Top Navigation Access — Documentation, Support, and Forum links
Activity — Alarms View — Alarms page and Alarm Details
Edit — Alarm page filters and columns

Asset drop-down menu items

(Full Details, Configuration IssuesAn identified configuration of software deployed, or features of software in use, which is known to be insecure., Vulnerabilities, Alarms, Events)

Alarm Labels — Apply, Create, Manage
Select — alarm action, create rule, suppress alarm, apply label
Activity — Events View — Events page and Event Details
Edit — Event page filters and columns

Asset drop-down menu items

(Full Details, Configuration IssuesAn identified configuration of software deployed, or features of software in use, which is known to be insecure., Vulnerabilities, Alarms, Events)

Asset drop-down menu items

(Configure Asset, Delete Asset, Assign Credentials, Authenticated Scan)

Events — event action, create rule, suppress event
From Asset and Asset Group Details page — can select asset drop-down menu options (All) and Assign Credentials
Environment View — Assets, Asset Groups, Vulnerabilities, Vulnerability Details, and Configuration Issues
View VulnerabilityA known issue or weakness in a system, procedure, internal control, software package, or hardware that could be used to compromise security. Details
Edit page filters and columns
From Vulnerability Page, can select Asset Drop menu Items (Full Details, Configuration Issues, Vulnerabilities, Alarms, Events)
Vulnerability Labels — Apply, Create, Manage
Create new Vulnerability Scan
From Vulnerability Page, can select Asset menu items (Configure Asset, Delete Asset, Assign Credentials, Authenticated Scan)
Asset Details View — Agent status
View — assigned Agent profile
From Configuration Issues page, can select Asset drop menu items (Full Details, Configuration Issues, Vulnerabilities, Alarms, Events)
Change assigned Agent profile
Actions Menu — Run Agent query
Reports View Reports — (All Functions)
Data Sources

View — My Settings

(Edit Email, Full Name, Password, Enable Alarm Notifications, Enable MFAA method of access control in which a user is granted access only after successfully presenting several separate pieces of evidence to an authentication mechanism – typically at least two of the following categories: knowledge, possession, and inherence.)

  Agents — View Configuration Profiles tab
  Agents — View deployment scripts
 

Sensors — DeploymentEntire process involved in installation, configuration, startup, and testing of hardware and software in a specific environment.

(Add New Sensor, Configure Sensor)

 

Sensors — AlienApps

(App Credentials, App Settings)

  Agents — Set default values on Configuration Profiles tab
Settings System Events
Create Rules
Credentials — Add New Credentials
System — Add New Asset Field
Scheduler — Create, Enable/Disable Jobs
Access and configure the Sensor Setup Wizard
My Subscription — Connect to USM Central
Notifications — Configure Credentials
Notifications — Sensor disconnection/reconnection
System — Configure the web session timeout setting
Threat Intelligence — Configure Credentials
Users — Add New User