Security Administrator permission

 

The actions that Administrator users can perform (manage users, computers and groups, as well as configuring and uninstalling the protection), are restricted to those computers or groups they have created or have permissions on.

 

User management

Administrator users can:

  1. Change their own credentials.

  2. Create users.

 

Search of unprotected computers

Administrator users can:

  1. Create search tasks launched from computers on which they have permissions.

  2. View and/or delete any of the search tasks they have previously created.

 

Group and computer management

Administrator users can:

  1. Create groups/subgroups (manual or automatic by IP address), and configure the protection profiles of those groups on which they have permissions. Administrator users cannot access a child group if they do not have access to the relevant parent group.

  2. Delete the groups on which they have permissions. You can only delete groups that don't have any computers inside, that is, prior to deleting a group/subgroup, you must assign or move its computers to another group/subgroup. Once you have emptied a group/subgroup, you can delete it.

  3. Edit the Comments field of those computers on which they have permissions (the Comments field can be found in the Computer details window).

  4. Remotely access those computers that belong to groups on which they have permissions.

 

Protection uninstall

Administrator users can:

  1. Configure uninstall tasks for those computers and groups on which they have permissions.

  2. View and/or delete uninstall taks, but only for those computers belonging to groups on which they have permissions.

 

Profile and report management

Administrator users can:

  1. Create and view new profiles.

  2. Create copies of profiles on which they have permissions and view them.

  3. Configure scheduled scans of specific paths for profiles on which they have permissions or which they have created.

  4. View reports (immediate reports, not scheduled ones) about groups on which they have permissions, provided those permissions apply to all the groups covered in the report.

  5. Create tasks to send scheduled reports about groups they have permissions on.

  6. View tasks to send scheduled reports about groups they have permissions on, provided those permissions apply to all the groups covered in the report. Otherwise, they will not be able to view the report sending task.