Skip to main content

Role-Based Access and Delegation

Security and awareness of who has access to what is crucial for every organization. Besides notifying you on who changed what, when and where, and who has access to what in your IT infrastructure, Netwrix pays attention to safety of its own configuration and collected data.

To keep the monitoring process secure, Netwrix suggests configuring role-based access. Delegating control ensures that only appropriate users can modify the product configuration or view audit data, based on your company policies and the user's job responsibilities.

rbac-01

Roles are described briefly in the table below and explained in detail in the next topic.

RoleAccess levelRecommended use
Global administratorFull control. Access to global settings, monitoring plan configuration, collected data, access delegation, etc.The role should be assigned to a very limited number of employees—typically, only the owner of the Auditor Server host in your environment. By default, the user who installed Auditor is assigned the Global administrator role. All members of the local Administrators group are Global administrators too.
ConfiguratorAccess to monitoring plan configuration within the delegated scope: a monitoring plan or a folder with monitoring plansThe role is appropriate for system administrators, infrastructure engineers, and members of operations team who manage network and services in your organization but should not have access to sensitive data.
Global reviewerAccess to all data collected by Auditor and intelligence and visibility features.The role is appropriate for key employees who need to review audit data collected across various data sources—typically, IT managers, chief information security officer, and so on.
ReviewerAccess to data collected by Auditor and intelligence and visibility features within the delegated scope.The role is appropriate for members of security team and helpdesk personnel who are responsible for mitigating risks in a certain sector of your environment (e.g., domain, file share). This role is granted to specialists who use the Integration API to retrieve data from the Audit Database.
ContributorWrite access to Auditor Server and Audit Database.This service role is granted to specialists who use the Integration API to write data to the Audit Database. This role is also granted to service accounts or any accounts used for interaction with Auditor Server (e.g., add-on scripts).

Compare Roles

FeatureGlobal administratorGlobal reviewerReviewerConfiguratorContributor
Launch Auditor client+++++
Delegate control, grant and revoke permissions+
View global settings+SomeSomeSomeSome
Modify global settings (including default Audit Database, licenses, retention settings, etc.)+
Monitoring plan configuration
List folders+++++
Add, remove, rename folders+Some Only under assigned folders provided that directly assigned roles do not conflict.
List monitoring plans, review status+++++
Add, remove, rename monitoring plans+Some Only under assigned folders provided that directly assigned roles do not conflict.
Modify monitoring plan settings+Some Add and remove Activity Summary recipientsSome Add and remove Activity Summary recipients within the delegated scopeSome Restricted to the delegated scope (folder or monitoring plan)
List data sources and items in monitoring plan+++++
Add, modify, remove data sources, enable or disable auditing+Some Restricted to the delegated scope (folder or monitoring plan)
Add, modify, remove items in monitoring plan+Some Restricted to the delegated scope (folder or monitoring plan)
Manage state-in-time data, upload snapshots to the Audit Database++
Intelligence
List reports+++++
Generate reports++Some Restricted to the delegated scope (folder or monitoring plan)
List report subscriptions+++++
Create, modify, remove subscriptions++
See search results++Some Restricted to the delegated scope (folder or monitoring plan)
List, create, modify, delete custom reports++++- (only can list)
List alerts+++++
Create, modify, delete alerts++
Import investigation data from the Long-Term Archive+
View investigation data++
View Behavior Anomalies list++
Review user profile++
Update anomaly status++
Risk Assessment Overview dashboard and drill-down reports
View Risk Assessment Overview results (dashboard, drill-down reports)++Some Restricted to delegated scope (folder or monitoring plan)--
Modify risk level thresholds++---
Customize risk indicators++---
Auditor Integration API
Write Activity Records++
Retrieve Activity Records+++ Restricted to the delegated scope (folder or monitoring plan)

Assign Roles

Netwrix Auditor allows assigning roles on the product as a whole, or within a specific scope. A scope can be limited to a single monitoring plan or to the contents of a folder. This helps to ensure that only authorized personnel has access to the relevant data. For example, database administrators (DBAs) should not access Active Directory management data, and domain administrators do not need permissions to view database schema changes or update data collection settings, and so on.

Understanding Scopes

Scopes for different Auditor roles are as follows:

ScopeRoles
Global (All monitoring plans)Global administrator Global reviewer Contributor NOTE: To assign Global role, you need to click Delegate button from All Monitoring Plans list.
Folder levelConfigurator Reviewer
Plan levelConfigurator Reviewer

Follow the steps to delegate control to some scope, review, or revoke assigned roles.

Step 1 – On the main Auditor page, navigate to the Monitoring Plans section.

Step 2 – Browse your monitoring plans tree and select the scope you want to delegate to a user (e.g., All monitoring plans root folder, a folder, or a monitoring plan).

Step 3 – Click Delegate.

Review roles that are already defined for this scope.

Do one of the following:

To...Do...
Assign a role1. Select Add User. 2. In the dialog that opens, specify a user (or a group) and a role.
Revoke a role assignment- Click delete next to the user.

Step 4 – Click Save or Save&Close.

Browser Role on Report Server

Along with adding a new Global administrator, Global reviewer or Reviewer role, Auditor will automatically assign this user the Browser role on the Report Server (SSRS).

The Browser role is required to generate reports. It is granted on all reports — or within a delegated scope.

If for some reason Auditor is unable to grant the Browser role, configure it manually. See the SQL Server Reporting Services topic for additional information.

Default Role Assignments

By default, several accounts and local groups are assigned the following roles:

Account or group nameRoleDetails
Local AdministratorsGlobal administrator
Local service accountsGlobal administratorGlobal administrator Auditor uses system accounts for data processing and interaction between product components.
Auditor AdministratorsGlobal administrator
Auditor Client UsersGlobal reviewer

Delegating Control via Windows Group Membership

During the Auditor Server installation, Netwrix Auditor Administrators and Netwrix Auditor Client Users groups are created automatically. To delegate control via group membership, you need to add users to these groups on the computer where Auditor Server resides.

Users will be granted roles with extended permissions. You may need to limit their scope to a specific monitoring plan.

Follow the steps to add an account to a group.

Step 1 – On the computer where Auditor Server is installed, start the Local Users and Computers snap-in.

Step 2 – Navigate to the Groups node and locate the Netwrix Auditor Administrators or Netwrix Auditor Client Users group.

Step 3 – In the group properties, click Add.

Specify users you want to be included in this group.

Roles_Groups

NOTE: For additional information about User Activity video access management, see the Configure Video Recordings Playback Settings topic.

Provide Access to a Limited Set of Data

By default, only users designated in Auditor are allowed to view its configuration and collected data. This policy ensures that only authorized and trustworthy users access sensitive data and make changes.

However, in some cases, organizations need to provide certain employees with access to a limited set of audit data. For example, an auditor might need to review particular access reports once or twice a year. You can provide these users (recipients) with means to review the data they need without actually running Auditor. This ensures that dedicated specialists have access to the data while preventing data breaches and ensuring that sensitive data is not being distributed across the whole company.

Netwrix recommends granting limited access permissions to employees who need to:

  • Review audit data periodically in accordance with company policy
  • Review audit data accumulated over time
  • Be notified only in case of a rare incident

To grant limited access to audit data, you can:

Do..Recommended use
Schedule email report subscriptionsThis is helpful when you want to share information with a group of employees, external consultants, auditors, and so on. Reports are sent according to a specified schedule and recipients can review them, but they do not have any other means to access audit data. Basically, this option is enough for employees who are interested in a high-level summary—for example, an auditor who performs monthly access rights attestation on critical folders or a senior manager.
Publish reports to file sharesThis scenario works great for a helpdesk with several departments. Assume, each department has its own field of responsibility and must not disclose information to other departments. You can configure Auditor to publish reports to folders that can be accessed by employees from a specific department only. You might set up the following folders and permissions: - The user support team has access to a folder with reports on account lockouts and password resets. - File server helpdesk personnel have access to a different folder with daily reports listing all file removals. - The helpdesk supervisor has access to both folders.
Configure alertsThis is helpful for rare occasions when you have to notify some senior specialists about critical system state that has to be addressed immediately, e.g., CISO must mitigate risks in the event of massive deletions in the sensitive data storage.