![]() ![]() The Full Access role grants users all possible privileges for managing the Deep Security system, such as creating, editing, and deleting computers, computer groups, policies, rules, and so on. The Deep Security Manager comes preconfigured with two roles: Full Access and Auditor. You can also assign a role to a user from the Users list, by right-clicking a user and then clicking Assign roles. Role: Use the list to assign a predefined role to this user.Description: (Optional) A description of the account. ![]() Name: (Optional) The name of the account holder.You can password requirements in the user security settings (see Enforce user password rules). Password and Confirm Password: Note the password requirements listed in the dialog box.Username: The username that the user will enter on the Deep Security Manager login screen.Specify the general properties for the user, including:.Click New to add a new user or double-click an existing user account to edit its settings.If you delete a user from Deep Security Manager who was added as a result of synchronizing with an Active Directory and then resynchronize with the directory, the user will reappear in your user list if they are still in the Active Directory. You will have to modify their properties to allow them to sign in to the Deep Security Manager. The imported list of users are locked out of the Deep Security Manager by default. ![]() Once they have been imported, you are given the option to create a scheduled task to periodically synchronize with the directory to keep your list up to date. The manager will import the users in these Active Directory groups to the manager's Users list. Move the group to the Groups to synchronize pane using the > button.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |