Back=right mouse click.
Up to 128 users can access IWSVA using assigned access rights. When in the application, users can make configuration changes that are recorded in the login accounts log.
The audit log file is where IWSVA stores any configuration changes that users make to the application. The log file contains a prefix that you can use to organize your logs.
The log prefix is autogenerated but you can change this in the Command Line Interface (CLI). To change the log prefix, ensure that you have root permission and then from the CLI, open the configuration file (/etc/iscan/intscan.ini) and make the necessary changes. Finally, restart IWSVA to activate the change.
If you have a team of security administrators who are responsible for different functions and who may also have help desk privileges, then assigning them access rights can be beneficial to your organization. To manage IWSVA, these users can have different logins with different privileges.
Access rights can also give you the ability to audit what is being changed in IWSVA. If you have the need to comply with certain government agency standards, then this function can be critical.
The following discusses the levels of access:
Administrator—Users have complete and unrestricted access to the system. They can read and modify any settings accessible through the console including creating, deleting, and modifying user accounts. This is the default access for new users.
Auditor—Users cannot make any configuration changes; they can only view configurations, logs, and reports. They can change their own passwords.
Reports only—Users can only view the Summary pages and scheduled reports. They can generate logs and real-time report queries and change their own passwords.
Login Account
Add Login Account
Login Account Information