Files |
Grants permissions for operations on the computer and user trees, such as creating groups, moving, renaming, deleting, as well as exporting data and printing. |
Control |
Grants permissions to control clients, including lock/unlock, sending notifications, logging off computer accounts, startup/shutdown, remote wake-up, and client uninstallation. |
Statistics |
Grants permissions to query statistical records, including application statistics, web browsing statistics, and network traffic statistics. |
Logs |
Grants permissions to query log records, including basic logs, application logs, web browsing logs, document operation logs, shared document logs, document printing logs, asset change logs, policy logs, system logs, backup document logs, and removable storage logs. |
Policies |
Primarily manages permissions for querying and modifying policies, including: viewing and configuring basic policies, application policies, web browsing controls, device controls, print controls, screen recording, log management, remote control, traffic management, network controls, email controls, instant messaging file controls, upload controls, document controls, system alerts, removable media authorization, custom configurations, software installation management, and cloud document backup policies. |
Monitoring |
Grants permission to query and export records such as screen activity, emails, and instant messages,including viewing live screens, checking email and instant messaging logs, reviewing screen history, and exporting screen history. |
Maintenance |
Primarily refers to permissions for maintaining remote computers,including viewing and managing remote information, performing remote control, and transferring files remotely. |
IT Asset Management |
Primarily refers to permissions for managing assets, including viewing asset information, configuring asset categories and attributes, and editing custom categories and attributes. |
Patch Management |
Primarily refers to permissions for managing system patches, including viewing patch information, configuring patch settings, and installing patches. |
Vulnerability Management |
Primarily refers to permissions for managing system vulnerabilities, including reviewing vulnerability scan results and configuring scan settings. |
Software Distribution |
There are two parts: permissions for managing distribution packages, including viewing and configuring packages; and permissions for managing distribution tasks, including checking task status and installation results, setting up tasks, and executing them. |
Software Uninstallation Management |
Primarily refers to permissions for managing software uninstallation, including viewing and configuring uninstallation tasks. |
Network Access Control |
Primarily refers to permissions for network access control, including viewing access status, configuring access settings, and managing related policies. |
All Category Management |
Primarily refers to permissions for managing various categories, including application categories, website categories, time categories, network address categories, network port categories, removable storage, software distribution package library, software uninstallation library, email categories, watermark template library, and sensitive information library.
- Specifically:
- Removable Media Library: includes viewing/configuring the library, registration control, managing encrypted drives, formatting as encrypted drives, initializing secure USB drives, secure USB interaction logs, and enabling/disabling registration control.
- Watermark Template Library: includes viewing and configuring the library.
- Sensitive Information Library: includes viewing and configuring the library.
|
Desktop Security Management |
Primarily refers to permissions for managing desktop security functions, including viewing standard and approval requests, deleting requests, rejecting approvals, delegating approval permissions, viewing and configuring standard module approval workflows, and viewing and setting request permissions. |
Deletion |
primarily refers to permissions specifying which records can be deleted, including statistics, logs, emails, and instant messages. |
Data Backup |
Primarily refers to permissions for backing up and viewing data, including backing up logs and accessing data. |
Parameter Settings |
Primarily for configuring the server and mail report server, including server settings and mail report server settings. |
Security Check |
Primarily controls access to security check functions, including security check conditions, settings, logs, and status. |
Relay Server Management |
Primarily manages permissions for relay server functions, including viewing and configuring relay servers. |
Roles |
Primarily manages permissions for policy roles, including viewing, configuring, and assigning roles. |
Document Cloud Backup Server |
Primarily manages permissions for document cloud backup functions, including managing document permissions, configuring settings, viewing scan tasks and logs, and scheduling scan tasks. |
Sensitive Information |
Permissions for querying and modifying policies and logs.Includes: Granting/revoking sensitive content identification permissions, viewing full-disk scan tasks and logs for sensitive information, configuring full-disk scan tasks for sensitive information, viewing/setting outbound control policies for sensitive information, viewing/setting sensitive information landing control policies for sensitive information, and viewing/deleting logs related to sensitive information. |
Watermark |
Permissions to configure and view screen, print, and document watermarking features.Includes: Viewing/setting screen watermark policies, viewing/setting print watermark policies, viewing/setting document watermark policies, viewing/setting traceability policies for document circulation, viewing/setting document watermark permissions, viewing/deleting document watermark logs, viewing/deleting document circulation logs, querying watermark codes, using the document watermark extraction tool, viewing document numbering scan tasks and logs, and configuring document numbering scan tasks. |
AI Visual Perception |
ermissions related to visual awareness features.Includes: Authorizing/revoking visual awareness access, viewing/configuring visual awareness settings, viewing capture logs, deleting capture logs, reviewing capture history, and exporting capture history. |
Application Permissions |
Permissions for the desktop request feature.Includes: Viewing/setting request approval permissions, viewing/setting self-filing permissions, and viewing/deleting self-filing logs. |
Server Management |
Permissions for configuring server-related functions.Includes: Managing domain organizational structures, administering distributed servers, performing remote server checks, and managing email reports. |
Client Management |
Permissions for managing client operations.
- Computer Management: Permissions for computer management. This permission requires the administrator's scope to cover all computers to take effect.
- Client Upgrade Management: Permissions for managing client upgrades. This permission requires the administrator's scope to cover all computers and all users to take effect.
|
Access Gateway |
Permissions related to connecting the AnySecura server to the access control server.Includes: Viewing access control devices and configuring access control devices. |
Reporting System |
Permissions to access the reporting system. |
Auxiliary Functions |
Permissions to use auxiliary tools.Includes: Generating client confirmation codes, creating client offline assistant tools, and generating client offline data collection tools. |
Product Upgrade |
Permissions for product maintenance and upgrade management, including updating maintenance codes, checking and downloading new versions, and receiving maintenance service expiration reminders. |
Software Center Server |
Permissions to access the Software Center Server. |