Manage User Roles and Permissions

You can customize a specific user’s permissions by assigning one or more roles, or you can choose a predefined role. The roles define what tasks a user can perform in the Cybereason platform.

Managing user roles video

User roles

You use user roles to customize permissions for each user.

Create a user

You have the option to assign custom roles or predefined roles for each user.

The custom roles include the following:

Role

Description

Analyst (L1, L2, and L3)

Assign this role to your security analysts who will be responsible for investigation and remediation. You can assign roles specific to analyst level:

  • L1 analysts can access security-related data (MalOps and investigation) and can perform limited operations on data.

  • L2 analysts can view automatically detected information (evidence, suspicions, MalOps), investigate MalOps, and build queries to perform deep-dive investigations.

  • L3 analysts can view automatically detected information (evidence, suspicions, MalOps), investigate MalOps, and build queries to perform deep-dive investigations into operations that were not automatically detected. In addition, L3 analysts can perform remediation actions.

Analyst L1 Viewer

Assign this role to users to enable them to view MalOp information, but not edit the MalOps (such as changing the MalOp status, adding MalOp comments, or adding MalOp labels).

Note

In environments without the new Data Platform infrastructure, users with this role do not have access to the Malop Inbox and Malware Alerts screens.

Local analyst (L1, L2, and L3)

Assign this role to analysts who will be responsible for managing incidents on sensors in specific sensor groups. Use the Permissions section of the Create User screen, which appears after selecting a Local analyst role, to assign the user to one or more sensor groups.

Note

This role is available on Cloud deployments only (not on On-Prem).

Note

This role is only available if you have enabled sensor grouping in your environment.

  • L1 local analysts can view MalOps and investigate items that occur on sensors in their assigned sensor groups.

  • L2 local analysts can also remediate these MalOps.

  • L3 local analysts have the same permissions as L2 analysts.

All local analysts can view and search for reputations from the Security profile > Reputation screen.

You cannot have this role if you already have an Analyst L1/L2/L3 role or a Responder L1/L2 role assigned.

Note

This role is disabled by default. Open a Technical Support case to make this role available.

Local L1 Analyst Viewer

Assign this role to users to enable them to view MalOp information for their assigned groups, but not edit the MalOps (such as changing the MalOp status, adding MalOp comments, or adding MalOp labels). Use the Permissions section of the Create User screen, which appears after selecting a Local analyst role, to assign the user to one or more sensor groups.

Note

This role is available on Cloud deployments only (not on On-Prem).

Note

This role is only available if you have enabled sensor grouping in your environment.

You cannot have this role if you already have the L1 Analyst Viewer role assigned.

Note

In environments without the new Data Platform infrastructure, users with this role do not have access to the Malop Inbox and Malware Alerts screens.

Responder L1

Assign this role to users who will run interactive commands directly on the machine with the Remote Shell utility. You must enable two-factor authentication (TFA) or SSO for users with the Responder L1 role if you want them to use the Remote Shell utility in Unrestricted mode.

Responder L2

Assign this role to users who will manage incident response management tasks, including tool deployment and execution, and results collection. You must enable two-factor authentication (TFA) or SSO for users with the Responder L2 role.

Local Responder

Assign this role to users who will run interactive commands directly on the machine with the Remote Shell utility, in environments where sensor grouping is enabled. You need to also add the Local Analyst role for this user and assign the sensor groups to access.

Note

This role is available on Cloud deployments only (not on On-Prem).

Note

This role is only available if you have enabled sensor grouping in your environment.

You cannot have this role if you already have an Analyst L1/L2/L3 role or a Responder L1/L2 role assigned.

Note

This role is disabled by default. Open a Technical Support case to make this role available.

HDL Analyst

HDL Analysts have access to the Historical Data Lake user interface, and can run queries on historical data. See Historical Data Lake for more information.

Note

This role is available on Cloud deployments only (not on On-Prem).

Note

This role is disabled by default. Open a Technical Support case to make this role available.

System admin

Assign this role to users who will be responsible for the Cybereason platform system and sensor settings.

System viewer

Assign this role to users who should be able to view the Cybereason platform system and sensor settings. Users with this role cannot change any settings.

Note

Users with the System viewer role have read-only permissions for screens that the System admin users have access to.

User admin

Assign this role to users who will be responsible for creating and managing Cybereason users.

Executive

Assign this role to executive users who should be able to view high-level MalOp and investigation information.

Policy admin

Assign this role to users who should be able to upgrade sensors and create and assign sensor security policies.

Sensor admin L1

Assign this role to users who will be responsible for managing certain groups of sensors. Use the Permissions section of the Create User screen, which appears after selecting the Sensor admin L1 role, to assign the user to one or more sensor groups.

Note

This role is only available if you have enabled sensor grouping in your environment.

You cannot have this role if you already have the Responder L2 role assigned.

Note

This role is disabled by default. Open a Technical Support case to make this role available.

Sensor viewer

Assign this role to users who should have read access to sensors in certain groups. Use the Permissions section of the Create User screen, which appears after selecting the Sensor viewer role, to allow the user to read information about sensors in those groups.

Note

This role is disabled by default. Open a Technical Support case to request this feature.

Note

If you grant a user the Sensor viewer role along with a role that can access all groups, the user will have read access to sensors in all groups.

In addition, the Cybereason platform has predefined roles that represent common positions within an organization, such as SOC lead. These predefined roles combine certain custom roles. You can select only one predefined role for a user.

Role

Description

SOC lead

The SOC Lead predefined role combines the permissions of a L3 Analyst and a User Admin, enabling SOC Leads to have full visibility and response abilities, along with the permissions necessary to manage the user accounts for their teams.

Super user

The Super User predefined role gives full access to perform the actions of all roles.

This role is used for SOC leads who also need system management abilities, as well as for Cybereason’s own Incident Response and Customer Success teams, so that they can provide the highest level of support.

API user

The API user role has permission to execute a subset of API commands mainly for retrieving data as part of SOC automations.

This role cannot run many API requests, such performing response actions on a MalOp, due to the permissions required for these API endpoints. For additional details on API permissions per API request, see the Permissions per API request topic. If you need to use the Cybereason platform’s API to perform tasks, Cybereason recommends creating a dedicated user for API purposes and assigning the relevant roles.

In addition, API user cannot log in to the Cybereason platform UI, and therefore cannot change their password.

Note

If you select a predefined role for a user, the Cybereason platform automatically selects the corresponding custom roles for the pre-defined role. If you clear a selected custom role after you select the pre-defined role, the Cybereason platform clears the pre-defined role you previously selected.

Permissions by role

The following tables detail the permissions assigned to each Cybereason role.

Administrator permissions

Permission

System Admin

System viewer

User Admin

Policy Admin

Sensor L1

Sensor viewer

Add machine isolation exceptions

Add sensors to groups

Add servers

Add user

Assign policies

Change own password

Configure email notifications settings

Configure password policy

Configure sensor tags

Configure SMTP server

Create sensor groups

Create/Edit policies

Download sensors installation package

Download sensor logs

Download user action logs

Enable TFA for user

Enable TFA in Settings

Export sensor columns to CSV

Manage Security profile settings

Manage Sensor policy settings

Manage sensors through the API

Manage sensors through the UI

Manage sites

Modify user roles

Monitor Device Control events

Perform actions on sensors

Print report

Remove sensors from groups

Decommission sensors

Remove servers

Remove user

Reset user password

Search reputations

Send feedback

Stale & archived sensor settings

Subscribe to email notification

Unlock user

Upgrade sensors

View sensors

View servers

Note

For details on the permissions required to use API endpoints, see the Permissions per API request topic.

Analyst and Executive user permissions

Permission

L1

L2

L3

L1 Viewer

Local L1

Local L2

Local L3

Local L1 Viewer

Executive

Add comment

Behavioral allowlisting

Add or remove items from reputation lists

Change MalOp status

Change own password

Configure reputation source priority

Create custom detection rules

Define display columns

Download file

File search

Isolate machines

Limit query results by number

Limit query results by time

MalOp response/remediation actions

Manage reputations

Manage reputations through the API

Manage Security profile settings

Monitor Device Control events

Print report

Run investigation query

Save display columns

Save queries

Search reputations

Send feedback

Subscribe to email notification

Unsuspend process

View and create Malop labels

View Discovery board

View MalOp details

View Malops management screen

View Malop inbox

View XDR screens

Note

For details on the permissions required to use API endpoints, see the Permissions per API request topic.

Responder permissions

Users who need to perform additional or in-depth response tasks should be given the Responder L1, Responder L2, or Local Responder roles:

Role

Permission

Responder L1

  • Use the Remote Shell utility

  • Use the File Search screen to search for files and download files

Note

You cannot use the Responder L1 role with the Local Analyst L1/L2/L3 or Local Responder roles.

Responder L2

  • Use the Remote Shell utility

  • Use the Live File Search screen to search for files and download files

  • Perform incident response management tasks

  • View sensors in the Sensors screen

  • Enable Remote Shell for selected sensors

Note

You cannot use the Responder L2 role with the Local Analyst L1/L2/L3 or Local Responder roles.

Local Responder

  • Use the Remote Shell utility

  • View and manage MalOps, including viewing MalOp details, updating MalOp status, and adding MalOp comments

  • Run investigation queries

  • Use the Live File Search screen to search for files and download files

Note

Users with the Local Responder role must also have the Local Analyst L1/L2/L3 role assigned to view and manage MalOps and run investigation queries. In addition, you cannot use the Local Responder role with the Responder L1/L2 or Analyst L1/L2/L3 roles.