Skip to main content

Threat Detection ManagementThreat Detection Management Guide

Threat Detection Management Permissions

Review the permissions that determine what you're permitted to see and do in Threat Detection Management.

There are four permissions specific to Threat Detection Management:

If you have universal role-based access, the pre-configured roles are assigned specific Threat Detection Management permissions. To see and do the things you need in Threat Detection Management, ensure you're assigned the appropriate role and your role has the relevant permissions.

Analytics Rules: Read

The read permission for analytics rules allows you to:

Analytics Rules: Read, Write, and Delete

The read, write, and delete permission for analytics rules allows you to do everything you can do with the read permission and also:

Correlation Rules: Read

The read permission for correlation rules allows you to:

  • View correlation rules

  • View correlation rule details

Correlation Rules: Read, Write, and Delete

The read, write, and delete permission for correlation rules allows you to do everything you can do with the read permission and also:

  • Create correlation rules

  • Edit correlation rules

  • Clone correlation rules

  • Delete correlation rules

  • Share correlation rules