Skip to main content

Threat CenterThreat Center Guide

Threat Center Permissions

Review the permissions that determine what you're permitted to see and do in Threat Center.

There are six permissions specific to Threat Center:

If you have universal role-based access, the pre-configured roles are assigned specific Threat Center permissions. To see and do the things you need in Threat Center, ensure you're assigned the appropriate role and your role has the relevant permissions.

Threat Center Alerts: Read

The read permission for Threat Center alerts allows you to:

You must have this permission to use Threat Center. Without this permission, you can't access most alert and case functionalities.

Threat Center Alerts: Read, Write, and Delete

The read, write, and delete permission for Threat Center alerts allows you to do everything you can do with the read permission and also:

Threat Center Cases: Read

The read permission for Threat Center cases allows you to:

Without this permission, you can't access the Cases tab, and you receive a Permission Denied error.

Threat Center Cases: Read, Write, and Delete

The read, write, and delete permission for Threat Center cases allows you to do everything you can do with the read permission and also:

Threat Center Detection Grouping Rules: Read

The read permission for Threat Center detection grouping rules allows you to navigate to and view detection grouping rules.

Threat Center Detection Grouping Rules: Read, Write, and Delete

The read, write, and delete permission for Threat Center detection grouping rules allows you to do everything you can do with the read permission and also:

  • Create detection grouping rules

  • Clone detection grouping rules

  • Edit custom detection grouping rules

  • Reorder detection grouping rules

  • Enable detection grouping rules

  • Disable detection grouping rules

  • Delete custom detection grouping rules