User Access Management
Authentication and authorization of Logpoint SIEM users is based on user roles and the permissions granted to those roles. SOAR Automation user access management works the same, but a separate license is required.
Add permissions to Permission Groups.
Assign one or more Permission Groups to a User Group.
Assign Users to User Groups.
Permission Groups
There are two default standard permission groups. You can't modify or delete them.
Admin Permission Group
Grants comprehensive access, including read, create, and delete access rights. It is for users or administrators who require full access rights to Logpoint for comprehensive configuration and maintenance.

Operator Permission Group
Operators can monitor and investigate by viewing dashboards and widgets, running searches, and using search templates, packages, and views to investigate events. Users in the operator permission group can create and modify their own dashboards and alerts, build and maintain searches and reports, and maintain the analytics content used by the SOC. Operators have read and create permissions for Incidents, allowing them to view incidents assigned to them or their group, investigate incidents, and create new incidents from alerts or investigations.

You can also assign the user groups Incident User Groups and Data Privacy Groups.
After a user is created, they must be authenticated based on their credentials to log in and access Logpoint. Logpoint supports multiple authentication methods, including local authentication, external Identity Providers (IdPs), and Multi-Factor Authentication (MFA).
New Permission Groups
Permission groups streamline user management, and tailor permissions to align with organizational roles and responsibilities. According to your organization’s structure and the user’s responsibility, setup different permission groups. You can edit, delete, or create new groups.
When a new permission group is added, it is reflected in Logpoint SIEM and SOAR automation of the users.
SIEM Permissions:
Knowledge Base
Configuration
Analytics

SOAR Playbooks Permissions
Playbook Actions
- List playbook. - Export or Enable or Monitor playbooks.
- Clone or Add or Edit playbook. - Run playbook.
Delete playbook.
Manage Playbook Triggers
List triggers.
Add or Edit triggers.
Delete triggers.
SOAR Settings Permissions
Integrations
- Export or View Vendors. - Export or View Products. - Search before Export or View.
- Add or Edit Vendors and Products. - Add or Edit or Clone Actions.
Delete Vendors, Products and Actions.
API Key
View API Key.
Generate API Key.
N/A.
Licensing
View License
Upload License.
N/A.
My Products
Export or View Products.
Add or Edit Products.
Delete Products.
Lists Management
View List.
Add or Edit List.
Delete List.
Import
N/A.
Upload imported Settings.
N/A.
System Health
View System Health.
N/A.
N/A.
SOAR Cases Permissions
Manage Cases
Export or View Cases.
- Add or Edit or Annotate Cases. - Tag or Comment or Edit item to Cases. - Change Case Status and Change Handling Status.
Delete Label and Comment.
User Groups
Group users and grant them the same permissions. Admin users can also grant permissions to repositories and device groups to a user group.
There are three default, standard user groups. You can't modify or delete them.
Logpoint Administrator: Users have full access to all features and settings.
User Account Administrator: All permissions except for System Settings. This User Group cannot view the Logpoint Administrator group.
Incident User Groups: Manage incidents, including alert ownership and access to incident details. All Logpoint users can view incidents, but they can't resolve or close them. Only users who are part of the Logpoint Administrator group and the User Account Administrator group can grant access or add users to Incident User Groups.

Data Privacy User Groups
Users who are linked to a Data Privacy User Group can administer access to encrypted user data. Data Privacy encrypts specific clear-text fields so they are hidden from non-admin Logpoint users. Encrypted data can only be viewed by non-admin users by request, and then a user who is part of a Data Privacy user group can grant access to the data.

New User Groups
When you create a new user group, you grant the group which permissions they have. In addition, if you are an admin user, you also grant repo and device access to a user group in addition to a universal query. User groups can access all repos and devices or specific repos and devices, depending on what they are granted access to. Device groups include all devices, log sources, and IP addresses within the group.
You use a universal query to differentiate searches between user groups. For example, if a universal query is set to col_type=syslog, then only logs corresponding to col_type=syslog are in the search results for the user group assigned to that universal query.
You must set up different user groups, other than the two default ones, according to your own organization's structure, and which users should have the same access as other users. You can edit the groups you add, delete them, or create new ones. Add User Groups, then assign an Incident User Group to manage incidents.
Incident User Groups
Incident management, including assigning alert ownership, is controlled by users whose user group is also linked to an Incident User Group. Only users who are part of an Incident User Group can own or manage an Alert Rule. Only users in the Logpoint Administrator and User Account Administrator user groups can grant access or add users to Incident User Groups.
Data Privacy
Data Privacy encrypts specific clear-text fields, hiding them from non-admin Logpoint users. Encrypted data can be viewed only by non-admin users upon request, and only a user in a Data Privacy user group can grant access.
Only admin users and user account administrators can set up Data Privacy User Groups. There are two group types:
Can Request Access — users who can send a request to view encrypted data.
Can Grant Access — users other than admin users who can grant viewing access to encrypted data.
Users in a Can Grant Access user group do not automatically have access to encrypted data. They also need to be part of a Can Request Access user group and send a request. A user cannot view decrypted data without another user's consent.

Users
Users refer to individual accounts that are authorized to access Logpoint and SOAR. Each user is assigned a user group and permission group that determine their level of access, actions they can perform, and data they can view within Logpoint and SOAR. This ensures secure, role-based access control (RBAC), allowing administrators to add, edit, or deactivate user accounts to maintain compliance and operational security.
Last updated
Was this helpful?



