Application privileges
The following table summarizes the minimum set of permissions required to make use of all of the available features.
*Security administrators may remove permissions if only a subset of the features are required. If you grant additional permissions, you or other administrators can have access to allow the alteration of data on the
Cylance
tenant. Privilege | Permissions |
---|---|
Devices |
|
Global Lists | |
Policies |
|
Threats |
|
Zones |
|
Memory Protection |
|
CylanceOPTICS Commands |
|
CylanceOPTICS Detections |
|