- Knowledge Base
- Users
- Users
-
Security Announcements
-
Product News
-
Next-Gen Vulnerability Management
-
Getting Started
-
General
-
Operating Status
-
System & Network Scanning
-
Web Application Scanning
-
Cloud Scanning
-
API Scanning
-
Phishing & Awareness Training
-
Scanner Appliance
-
Device Agent
-
On-premise platform deployment
-
Asset Management
-
Vulnerability Manager
-
Reports
-
Digest Reports
-
Organizer
-
Continuous Monitoring
-
Integrations
-
Platform API
-
Remediation
-
Users
-
PCI DSS
-
Terms & Conditions
What permissions are supported for custom roles?
There are 4 different permissions:
- Read
- Read, edit, and create
- Read and delete
- Read, edit/create, delete
There are 8 different access areas available to assign these permissions for:
- Network assets
- Network scans
- Scanner appliance
- Reports
- Tags
- Vulnerabilities
- Web assets
- Web scan
Read more on how to create custom user roles here.
https://support.holmsecurity.com/knowledge/how-do-i-create-custom-roles