Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Create a Support Ticket
  • Partner Portal
  • CYRISMA MSP Dashboard
  • Home
  • General Questions and Troubleshooting

Where to Find Information on User Roles?

Discover where to find in-depth information on various user roles within a given system or platform.

Written by Chris Zator

Updated at November 15th, 2024

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • User Manual
    Overall Risk Dashboard Agent Status Report Builder Data Scan Vulnerability Scan Secure Baseline Compliance Mitigation Dark Web MSP Interface Instance Admin
  • Self Onboarding Guide
  • Agents
  • The Cyber Risk Assessment Process
  • PSA Integrations
  • General Questions and Troubleshooting
    Agent Troubleshooting Scanning Troubleshooting
  • The Cyber Risk Assessment Process (Video Tutorials)
  • Sales and Prospecting Articles
  • CYRISMA Partner Portal Access
  • Glossary
  • API Documents
  • CYRISMA Change Log
  • Support Ticket SLA
  • Billing Questions
+ More

Table of Contents

Overview: Accessing User Roles Information 1. Organizational Dashboard 2. Instance Management 3. User Roles Defined 4. Instance Risk Overview 5. Accessing Further Information 6. Additional Features Conclusion

Overview:

Understanding user roles is crucial for managing access and functionality within the CYRISMA platform. This article outlines where to find detailed information about each user role and their permissions.

Accessing User Roles Information

1. Organizational Dashboard

The Organizational Dashboard, also known as the Service Provider Interface, serves as the command center for managing your cloud-based operations.

  • Key Features:
    • Provides a snapshot of organizations under your portfolio.
    • Allows you to create new organizations or update existing ones.
    • Highlights how organizations are managing their cyber risk.

2. Instance Management

To create or manage customer organizations (instances) under your portfolio, navigate to the INSTANCE and ADMIN options on the top navigation bar.

INSTANCE:

  • Create or remove a customer/organization instance.

ADMIN:

  • User Management: Control access for individuals within the organization to the MSP interface.
  • Organizations: Create new organizations for various brands, especially if selling to an MSP or end client.

3. User Roles Defined

In the admin section, you’ll find the following user roles:

  • Tech: Limited access to created instances.
  • Administrator: Full access to instances, including the ability to create or delete them.
  • Operator: Access limited to mitigation plans within an instance.

4. Instance Risk Overview

On the left side panel, you can see a list of customer organizations you’ve created. Click on any organization to view:

  • Overall Risk Grade: Generated from data scanning, vulnerability scanning, secure baseline, and mitigation efforts.
  • Organization Details: Includes information like organization name, address, endpoint count, instance type, and license info.

5. Accessing Further Information

For more insights into a specific organization, click on GO TO INSTANCE. This will take you to an Overall Risk Dashboard that provides a unique view of the selected organization’s risk profile.

6. Additional Features

  • Support Access: Enable CYRISMA to assist with any issues by raising a ticket through the CYRISMA Support Center.
  • Snapshot Metrics: Assess performance metrics such as data sensitivity, overall scores for vulnerabilities, and secure configuration.

Conclusion

By utilizing the Organizational Dashboard and Instance Management tools, you can easily find and manage user roles within the CYRISMA platform. This ensures that each user has the appropriate level of access, enhancing both security and operational efficiency. If you need further assistance, feel free to reach out to support for help.

sources user roles

Was this article helpful?

Yes
No
Give feedback about this article

Related Articles

  • How To Setup Microsoft Secure Score

Partners
pax8
CDW
Stellar Cyber
RedSky Alliance

Request A Demo
Platform
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
  • Platform Overview
  • Resellers
  • Managed Service Providers
  • Request A Demo
Resources
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
  • Case Studies
  • White Papers
  • Videos
  • Blog
  • Press Release
  • Events
Contact Us
Address: 510 Clinton Square, Rochester, New York, USA, 14604

Email: info@cyrisma.com

Phone: 1-585-620-2496

Easiest To Do Business With Summer 2023
Category Leader Channel Program
Capterra
Software Advice

Terms of Use          Privacy Policy

Copyright © 2024 – Data Spotlite, Inc All rights reserved.
Expand