Ransomware Resilience access roles for NetApp Console
Ransomware Resilience roles provide users access to NetApp Ransomware Resilience. The two roles are Ransomware protection admin and Ransomware protection viewer. The main difference between the two roles is the actions they can take in Ransomware Resilience.
The following table shows the actions each role can perform.
Feature and action | Ransomware Resilience admin | Ransomware Resilience viewer | Ransomware Resilience user behavior admin | Ransomware Resilience user behavior viewer |
---|---|---|---|---|
View dashboard and all tabs |
Yes |
Yes |
No |
No |
On dashboard, update recommendation status |
Yes |
No |
No |
No |
Start free trial |
Yes |
No |
No |
No |
Initiate discovery of workloads |
Yes |
No |
No |
No |
Initiate rediscovery of workloads |
Yes |
No |
No |
No |
On the Protect tab: |
||||
Add, modify, or delete protection plans |
Yes |
No |
No |
No |
Protect workloads |
Yes |
No |
No |
No |
Identify exposure to sensitive data |
Yes |
No |
No |
No |
List protection plans and details |
Yes |
Yes |
No |
No |
List protection groups |
Yes |
Yes |
No |
No |
View protection group details |
Yes |
Yes |
No |
No |
Create, edit or delete protection group |
Yes |
No |
No |
No |
Download data |
Yes |
Yes |
No |
No |
On the Alerts tab: |
||||
View alerts and alert details |
Yes |
Yes |
No |
No |
Edit incident status |
Yes |
No |
No |
No |
Mark alert for recovery |
Yes |
No |
No |
No |
View incident details |
Yes |
Yes |
No |
No |
Dismiss or resolve incidents |
Yes |
No |
No |
No |
Block user |
Yes |
No |
No |
No |
Get full list of impacted files |
Yes |
No |
No |
No |
Download alerts data |
Yes |
Yes |
No |
No |
View suspicious user activity |
No |
No |
Yes |
Yes |
On the Recover tab: |
||||
Download impacted files |
Yes |
No |
No |
No |
Restore workload |
Yes |
No |
No |
No |
Download recovery data |
Yes |
Yes |
No |
No |
Download reports |
Yes |
Yes |
No |
No |
On the Settings tab: |
||||
Add or modify backup destinations |
Yes |
No |
No |
No |
List backup destinations |
Yes |
Yes |
No |
No |
View connected SIEM targets |
Yes |
Yes |
No |
No |
Add or modify SIEM targets |
Yes |
No |
No |
No |
Configure readiness drill |
Yes |
No |
No |
No |
Start readiness drill |
Yes |
No |
No |
No |
Reset readiness drill |
Yes |
No |
No |
No |
Edit readiness drill |
Yes |
No |
No |
No |
Review readiness drill status |
Yes |
Yes |
No |
No |
Update discovery configuration |
Yes |
No |
No |
No |
View discovery configuration |
Yes |
Yes |
No |
No |
Configure suspicious user behavior settings |
No |
No |
Yes |
No |
On the Reports tab: |
||||
Download reports |
Yes |
Yes |
No |
No |