LogoLogo
Get Demo
  • 💫NEXT-GENERATION PRODUCT
    • Introduction
    • Getting Started
      • 1. Invite System Users
      • 2. Add Target Users
        • Add Users via CSV
        • Add users via SCIM
          • SCIM Setup in Azure AD
          • SCIM Setup in Okta
          • SCIM Setup in Onelogin
          • SCIM Setup in Jumpcloud
        • Add users via LDAP
        • Add Users via API
      • 3. Email Deliverability
        • Microsoft 365
          • M365: Direct Email Creation
          • M365: Whitelisting
        • Google Workspace
          • Google: Direct Email Creation
          • Google: Whitelisting
        • Exchange 2013 and 2016
      • 4. Track Opened Emails
      • 5. Allow Phishing URLs
        • Whitelist for Office 365
        • Whitelist for Google Workspace
        • Whitelist for Exchange 2013/2016
        • Whitelist in Security Solutions
      • 6. Setup Phishing Reporter
        • Step 1. Download Phishing Reporter
        • Step 2. Deploy Phishing Reporter
          • How to Deploy Add-In in Microsoft 365
          • How to Deploy Add-In in Exchange Admin Center
          • How to Deploy Add-In in Google Workspace
          • How to Deploy Add-In in Outlook
            • Troubleshooting Phishing Reporter Add-In on Outlook Desktop
      • 7. Incident Responder Setup
        • Step 1. Integrate Threat Intel Partners
        • Step 2. Mail Configurations
          • Microsoft 365
          • Google Workspace (Gsuite)
          • Exchange (EWS)
    • Platform
      • Dashboard
        • Dashboard Widgets
        • Incident Responder Widgets
        • Threat Sharing Widgets
        • Phishing Simulator Widgets
      • Threat Intelligence
      • Email Threat Simulator
        • Start Scan
        • View Scan Report
        • Create Trusted Account on Exchange
        • Start Scan on O365 Email Account
        • Start Scan on Google Workspace Email Account
      • Threat Sharing
        • Communities
        • Incidents
      • Phishing Simulator
        • Manage Phishing Scenarios
          • Phishing Scenarios
          • Email Templates
          • Landing Pages
        • Phishing Campaign Manager
        • Phishing Campaign Reports
        • Settings
          • DNS Services and Domains
          • Exclude IP Address
      • Callback Simulator
        • Manage Callback Scenarios
          • Callback Scenarios
          • Callback Email Templates
          • Callback Templates
        • Callback Campaign Manager
        • Callback Campaign Reports
        • Settings
          • Callback Phone Numbers
      • Vishing Simulator
        • Vishing Templates
        • Vishing Campaign Manager
        • Vishing Campaign Reports
      • Smishing Simulator
        • Manage Smishing Scenarios
          • Smishing Scenarios
          • Text Message Templates
          • Landing Page Templates
        • Smishing Campaign Manager
        • Smishing Campaign Reports
        • Settings
          • Manage DNS and Domains
          • Exclude IP Addresses
      • Quishing Simulator
        • Manage Quishing Scenarios
          • Quishing Scenarios
          • Quishing Templates
          • Quishing Landing Page Templates
        • Quishing Campaign Manager
        • Quishing Campaign Reports
        • Settings
          • DNS and Domains
          • Excluding IP Address
      • Awareness Educator
        • Training Library
        • Enrollments
        • Certificates
        • Training Reports
        • Training Completion Queries
      • Incident Responder
        • Incident Responder Dashboard
        • Investigations
        • Integrations
        • Playbook
        • Mail Configurations
          • Microsoft 365
          • Exchange
          • Google Workspace
        • Cross Company Integration
      • Phishing Reporter
        • Phishing Reporter Customization
        • Phishing Reporter Deployment
          • How to Deploy the Add-in in Microsoft 365
          • Phishing Reporter Page View Failure Due to Deprecated Exchange Online Tokens
          • Microsoft Ribbon Phishing Reporter
          • How to Deploy the Add-in in Exchange Admin Center
          • How to Deploy the Add-in in Google Workspace
          • Phishing Reporter Announcement Email Template
        • Diagnostic Tool
        • Integrating Microsoft Phishing Reporting Button with Keepnet
        • Troubleshooting Phishing Reporter on Outlook Desktop
      • Reports
        • Advanced Reports
        • Executive Reports
        • Scheduled Reports
        • Gamification Report
      • Company
        • Target Users
        • Companies
          • Company Groups
        • Company Settings
          • Privacy
            • Account Privacy
            • Data Privacy
          • AI Ally Settings
          • SMTP Settings
          • Direct Email Creation
            • Direct Email Creation for Google Workspace
            • Direct Email Creation for Microsoft 365
          • Notification Templates
          • Google User Provisioning
          • REST API
          • White Labeling
          • Proxy Settings
          • SAML Settings
            • How to Configure SAML on ADFS
            • How to Configure SAML on Google Workspace
            • How to Configure SAML on Azure AD
            • How to Configure SAML on CyberArk
            • How to Configure SAML on Okta
          • SCIM Settings
            • Getting Started with SCIM
            • Azure AD SCIM Integration
            • Okta SCIM Integration
            • Onelogin SCIM Integration
            • Jumpcloud SCIM Integration
          • SIEM Integrations
            • Splunk Integration
            • Syslog Integration
          • LDAP
          • Allowed Domains
        • System Users
          • People
          • Roles
        • Audit Log
        • Job Log
      • Free Phishing Email Analysis Service
    • Miscellaneous
      • Whitelisting
        • How to Whitelist an IP Address in Office 365
        • How to Whitelist an IP Address in Exchange 2013 and 2016
        • How to Whitelist an IP Address in Google Workspace
        • How to Whitelist in Mimecast
        • Whitelisting in Other Security Solutions
        • Whitelisting the Pictures on Microsoft Outlook Apps
        • Keepnet Tools Whitelisting Guidelines
        • Understanding Email Delivery Errors
        • Tracking Email Opens in Phishing Simulations
      • User Profile
      • Multi-Factor Authentication (MFA) Settings
      • On-Premise Requirement Checker
      • Platform Requirements
        • Portal UI Requirements
        • Phishing Reporter Requirements
        • Diagnostic Tool Requirements
      • Maintenance Tool
      • Understanding the Preferred Language Setting
  • 📚RESOURCES
    • Platform Security
    • Volume & Performance
    • Customer Help Desk
    • Product Update/Maintenance
    • Research Methodology
    • Release Notes
      • 2025
      • 2024
      • 2023
      • 2022
      • 2021
      • 2020
  • ⚖️Legal Hub
    • For Customers
      • Customer Terms of Service
      • Product Specific Terms
      • Jurisdiction Specific Terms
      • Data Processing Agreement
      • Regional Data Hosting Policy
      • Product and Services Catalog
      • Acceptable Use Policy
      • Keepnet Security Program
      • Microsoft CoPilot Usage Policy
    • For Everyone
      • Website
        • Terms of Use
        • Privacy Policy
        • Cookie Policy
      • Free Phishing Email Analysis
        • Terms of Service
        • Privacy Policy
      • Transparency Report
Powered by GitBook

Copyright © Keepnet Labs LTD. All rights reserved.

On this page
  • Roles Home Page
  • How to Create a New Role
  • Permissions Available
  • How to Add a User to a Role

Was this helpful?

Export as PDF
  1. NEXT-GENERATION PRODUCT
  2. Platform
  3. Company
  4. System Users

Roles

This section describes how to create custom roles to restrict platform access usage for system users. The platform provides default roles such as Company Admin and Reseller for system users to use on the platform. The admin has the option to restrict system users’ activities on the platform.

Roles Home Page

Go to Company > System Users > Roles menu. This menu will list all the default roles and custom roles. The admin can create, view, edit or delete the roles.

The fields of the roles page are explained below.

Role Name

Name of the role

Users

Number of users assigned to the role

Type

The type of the custom role, it can be Custom or System. The Custom is created by the company and the System is provided by the Platform or Reseller.

Date Created

The date that the role was first created

Actions > Edit

Edit the role to customize

Action > Delete

Delete the role. The users must be unassigned from this role for an admin to delete the role successfully.

How to Create a New Role

Go to Company Settings > System Users > Roles then click the New button. This will bring you to the page where you will define the role name, descriptions, and permissions with the following fields.

Role Title

The name of the custom role

Description

A brief description of the role

Make available For

Choose the companies and/or company groups that will have this role available. This option is only available to Reseller accounts.

Privileges

Search permissions to assign to the role.

Permissions

Select the permissions to make available. You can see the permissions available in the table below.

Permissions Available

For each permission, you can select the full field or specific sub-fields within the permission to the platform.

Permission Field

Sub Field(s)

Threat Sharing

  • Communities

  • Incidents

Phishing Simulation

  • Email Templates

  • DNS Services

  • Domain Records

  • Landing Page

  • Templates

  • Phishing Scenario

  • Phishing Campaign

  • Phishing Campaign Job

  • Phishing Campaign Report

  • Exclude IP Address

Smishing Simulator

  • Smishing Scenario

  • Text Template

  • Smishing Campaign

  • Smishing Campaign Job

  • Smishing Campaign Report

  • Smishing Domain Records

  • Smishing Exclude IP Address

  • Smishing Dns Services

  • Smishing Landing Page Template

Awareness Educator

  • Certificates

  • Enrollments

  • Training List

  • Training Reports

Incident Responder

  • Integrations

    • Cross Company Integration

  • Investigations

  • Incident Responder

    • Reported Emails

  • Playbook

  • Mail Configurations

Phishing Reporter Add in

  • Phishing Reporter

    • Settings

    • User

Email Threat Simulator

  • Attack Vector

  • Quick Scan

Company Settings

  • Audit Log

  • Companies

  • Widget

    • ROI Settings

  • Company Groups

  • System Users

    • User Roles

    • People

    • Account

  • Target Users

  • Company Settings

    • SMTP Settings

    • Notification Templates

    • Rest API

    • White Labeling

    • Proxy Settings

    • SAML Settings

    • Tag Management

    • Company Settings

    • SCIM

    • SIEM Integrations

    • LDAP Settings

    • Allow List

    • Direct Email Creation

    • Privacy

Vishing Simulator

  • Vishing Template

  • Vishing Campaign

Quishing Simulator

  • Quishing Scenario

  • Quishing Domain Records

  • Quishing Exclude IP Address

  • Quishing Dns Services

  • Quishing Landing Page Template

  • Quishing Campaign

  • Quishing Campaign Job

  • Quishing Campaign Report

  • Email Templates

  • Quishing Template

Threat Intelligence

  • Search Leak

  • Get Leak Report

Callback Simulator

  • Callback Template

  • Callback EmailTemplate

  • Callback Scenario

  • Callback Campaign

  • Callback Campaign Job

  • Callback Settings

  • Callback Campaign Job Report

Once you select the permissions for your new role, click Save button and the new role will populate on the Roles page.

How to Add a User to a Role

Go to the Company > System Users page to assign the custom role to the system users, simply by editing the system users and updating the role. The system user will have a custom role and depending on the custom role permissions, the system user can manage the platform.

PreviousPeopleNextAudit Log

Last updated 9 months ago

Was this helpful?

💫