Cisco Cisco Email Security Appliance C160 Mode D'Emploi

Page de 324
 
8-14
Cisco IronPort AsyncOS 7.6 for Email Daily Management Guide
OL-25138-01
Chapter 8      Common Administrative Tasks
Working with User Accounts
All roles defined in 
 can access both the GUI and the CLI, except the Help Desk User role and 
custom user roles, which can only access the GUI.
If you use an LDAP directory to authenticate users, you assign directory groups to user roles instead of 
individual users. When you assign a directory group to a user role, each user in that group receives the 
permissions defined for the user role. For more information, see 
.
Managing Users
You can manage users on the System Administration > Users page.
Guest
Users accounts with the Guest role can only view status information. Users 
with the Guest role can also manage messages in the Cisco IronPort Spam 
Quarantine and system quarantines, if access is enabled. Users with the 
Guest role cannot access Message Tracking.
Read-Only Operator
User accounts with the Read-Only Operator role have access to view 
configuration information. Users with the Read-Only Operator role can 
make and submit changes to see how to configure a feature, but they cannot 
commit them. Users with this role can manage messages in the Cisco 
IronPort Spam Quarantine and system quarantines, if access is enabled. 
Users with this role cannot access the file system, FTP, or SCP. 
Help Desk User
User accounts with the Help Desk User role are restricted to:
  •
Message tracking.
  •
Managing the Cisco IronPort Spam Quarantine and system quarantines.
Users with this role cannot access to the rest of the system, including the 
CLI. You need to enable access to the Cisco IronPort Spam Quarantine and 
system quarantines before a user with this role can manage them. 
Custom user role
User accounts with a custom user role can only access email security 
features assigned to the role. These features can be any combination of DLP 
policies, email policies, reports, quarantines, local message tracking, 
encryption profiles, and the Trace debugging tool. The users cannot access 
system configuration features. Only administrators can define custom user 
roles. See 
 for more information.
Note
Users assigned to custom roles cannot access the CLI.
Table 8-2
User Roles Listing
User Role
Description