- Knowledge base
- Users
- Users
-
Security updates
-
Product news
-
Next-Gen Vulnerability Management
-
Getting started
-
General
-
Operating status
-
Network & System Security
-
Web Application Security
-
Cloud Security
-
API Security
-
Phishing Simulation & Awareness Training
-
Attack Surface Management
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset management
-
Vulnerability manager
-
Reports
-
Digest reports
-
Organizer
-
Continuous monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & conditions
-
Dashboard
What permissions are supported for custom roles?
There are 4 different permissions:
- Read
- Read, edit, and create
- Read and delete
- Read, edit/create, delete
There are 8 different access areas available to assign these permissions for:
- Network assets
- Network scans
- Scanner appliance
- Reports
- Tags
- Vulnerabilities
- Web assets
- Web scan
Read more on how to create custom user roles here.
https://support.holmsecurity.com/knowledge/how-do-i-create-custom-roles