This document will explain the User Roles and permissions which can be mapped for users. Creating various users with only certain roles and permissions allow you to have a more robust control over who does what with the product. For a detailed understanding about the various user roles and the associated scope offered by the product, refer to the doc on role difference.
To create a new user, navigate to Admin -> General Settings -> User Administration ->Add User
To create a new role, navigate to Admin -> General Settings -> User Administration -> Add Role
| User Role | Configurations | Patch Management | Software Deployment | Inventory | Tools | Remote Desktop Sharing | Report | MDM Control Modules | OS Imaging | OS Deployment |
|---|---|---|---|---|---|---|---|---|---|---|
| Administrator |
Full Control |
Full Control |
Full Control |
Full Control |
Full Control |
Full Control |
Full Control |
Full Control |
Full Control |
Full Control |
| Auditor | No Access | No Access | No Access | No Access | No Access | No Access | Read Access | Read Access to Reports | No Access | No Access |
| Guest | Read Access | Read Access | Read Access | Read Access | Read Access | Read Access | Read Access | Read Access | Read Access | Read Access |
| IT Asset Manager | No Access | No Access | No Access |
Full Control |
No Access | No Access | No Access |
Full Control over Inventory |
No Access | No Access |
| OS Deployer | No Access | No Access | No Access | No Access | No Access | No Access | No Access | No Access |
Full Control |
Full Control |
| Patch Manager | No Access |
Full Control |
No Access | No Access | No Access | No Access | No Access | No Access | No Access | No Access |
| Remote Desktop Viewer | No Access | No Access | No Access | No Access |
Full Control |
No Access | No Access | No Access | No Access | |
| Technician |
Full Control |
No Access |
Full Control |
No Access |
Full Control |
No Access | No Access |
Full Control except Device Enrollment |
No Access | No Access |
| MDM Control | Create Profile Management | Create App Management | Create Inventory | Create Report | Enrollment | Content Management | OS Update Management | Remote Control |
|---|---|---|---|---|---|---|---|---|
| Mobile Device Manager |
Full Control |
Full Control |
Full Control |
Full Control |
Full Control |
Full Control |
Full Control |
Full Control |
The following are the roles within the Endpoint Security.
| Role | Description |
|---|---|
| Application Control Manager | This role provides the user with full control over application control and application control reports. |
| Bitlocker Manager | This role provides the user with full control of BitLocker management and reports. |
| Browser Security Manager | This role provides the user with full control of Browser Security functions. |
| Device Control Manager | This role provides the user with full control of Device Control functions and reports. |
| Security Manager | This role provides the user with full control of Security Manager functions such as BitLocker Management, Patch Management, Application Control and Vulnerability Management amongst others. |
Apart from these, you can also create roles based on your requirement.