You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/administration/enterprise.md
+7Lines changed: 7 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,6 +55,13 @@ according to the [OpenAEV architecture](../deployment/platform/overview.md#archi
55
55
The SentinelOne Agent can be leveraged to execute implants as detached processes that will then execute payloads
56
56
according to the [OpenAEV architecture](../deployment/platform/overview.md#architecture)
57
57
58
+
### Palo Alto Cortex Agent
59
+
60
+
The Palo Alto Cortex Agent can be leveraged to execute implants as detached processes that will then execute payloads
61
+
according to the [OpenAEV architecture](../deployment/platform/overview.md#architecture).
62
+
63
+
On Windows, because Palo Alto Cortex whitelists its own process tree, OpenAEV creates a scheduled task to detach the process that will execute the payloads.
64
+
58
65
## Remediations in CVES
59
66
60
67
More detail: [CVES](taxonomies.md) and [Findings view](../usage/findings.md)
Copy file name to clipboardExpand all lines: docs/administration/users-and-rbac.md
+58-6Lines changed: 58 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -55,13 +55,63 @@ To create a new role in OpenAEV:
55
55
56
56
1. Go to **Settings → Security → Roles**.
57
57
2. Click on **Create role**. Enter a **name** and an optional **description** for the role
58
-
3. Select the **capabilities** that should be included in this role, such as:
59
-
- Access assets
60
-
- Manage dashboards
61
-
- Delete documents
62
-
- ...
58
+
3. Select the **capabilities** that should be included in this role.
63
59
4. Save the role.
64
60
61
+
### Capabilities
62
+
63
+
Capabilities in OpenAEV are organized hierarchically. A parent capability (e.g. `Access assessment`) must be granted before its children (e.g. `Manage assessment`, `Delete assessment`) can be assigned. Indentation below reflects this hierarchy.
64
+
65
+
Below is a full list of capabilities in OpenAEV
66
+
67
+
| Capability | Description |
68
+
|:-----------|:------------|
69
+
|`Bypass (user has all rights)`| Grants unconditional access to all platform features, bypassing every individual capability check and any data segregation enforcement. |
70
+
|**Assessments: Scenarios, simulations and atomic testings**||
71
+
|`Access assessment`| Read-only access to assessments, including scenarios, simulations and atomic tests. |
|`Access Platform Settings`| Read-only access to platform-wide configuration and administration settings. |
110
+
| `Manage platform settings`| Modify platform-wide settings including security configuration, integrations, and system parameters. Requires *Access Platform Settings*. |
111
+
112
+
113
+
114
+
65
115
!!! info "Hierarchical permissions"
66
116
67
117
Permissions are organized hierarchically by indentation: selecting a permission further to the right (e.g., Delete) will automatically enable the less-indented ones that precede it (e.g., Manage and Access).
@@ -78,7 +128,9 @@ To create a new role in OpenAEV:
78
128
79
129
Once the role is created, it can be assigned to a **group**. All users in that group will automatically inherit the role’s permissions.
80
130
81
-
### Example : Crisis content creator
131
+
132
+
133
+
## Example : Creating a Crisis content creator role
0 commit comments