Hiab and Outscan Manage Users
Hiab and Outscan Manage Users
Manage Users
Last update:
9 February 2017
Table of Contents
1. Executive Summary ................................................................................................................................. 3
2. Manage Users Section ............................................................................................................................. 4
2. Manage Users Section
Navigate to “Main Menu -> Settings -> Manage Users” to access the feature. This area allows for viewing and
editing of all the users that you are allowed to administrate in the system.
2.1. Settings
The settings option can be found in the top right corner: the button with the symbol of a small cogwheel. The
settings option is only available if you’ve already setup LDAP/AD in “Main Menu -> Settings -> Server -> LDAP/AD
(tab)”.
In the LDAP/AD Attribute Mapping you may define the mapping between the HIAB and the LDAP/AD fields.
Enter the field that maps to the following fields:
either use the “New” option, or right click and group and choose “New”. This will create a new sub group for that
group.
• Logons - Displays how many times the user has logged into the system
• Last logged on – When the user last logged into the system. If this entry is blank the user has still not logged
into the system
• Export - Will export the all user accounts as a CSV or HTML file
By clicking on the plus icon or double click on a user you will display additional information about the user account
• First name, Last name, Email, Mobile number, country, username and password for the user
• Parent Account - Sets the parent account, could be used to create hierarchy structures
• Authentication - Will allow you to define if the user credentials should be verified against the local database
or the defined LDAP or Active Directory server
• Require password change on next logon - Will force the user to change his/her password the next time they
log in to the system
• Two factor authentication – If enabled, you may set up the mode of authentication from here. Mobile
Security Code and Google Authenticator can be used for authentication. The method used for authentication
can be limited, depending on the options configured for two factor authentication in the security policy.
When Google authentication is selected, you will be asked to enter the credential ID which is used to set up
the account
o Target Group - Will show a small tree of which target groups the HIAB already has defined. Check
the checkbox for the group the user should be able to administrate
o Targets - Should be used sparsely since it will create an overhead when it comes to administrative
task in the long run. The only time you should use this feature is when you would like to grant
access to a whole IP range without having to define all targets within the system
• Granted Scanners - Limit which scanners the user has access to within the system. If the All Scanners box is
checked then the user will also automatically have access to all scanners that are added in the future
When clicking on New you will be prompted with a new window as seen below.
The different options will be explained on the next page. If enabled, some checkboxes will reveal more options
within the specific section.
Maintaining User Role
• Role name - Every user role needs to have a given name in order to identify the role
• LDAP/AD Group - If a LDAP/AD user have this attribute, then this user role will be assigned to that user after
log in
• Read Only - User will not be permitted to do any changes or new creations when this option is enabled
Target management
• Administrate Targets/Target Groups - This will allow the user to administrate targets and groups in the
'Manage Targets' view
Scan Scheduling
Administrate Scheduling - Determines if the user is allowed to define and set up new scans
Force Target Group in Scheduling - Will enforce the user only to use the already defined groups in the
scheduling section. No manual targets can be entered in the targets tab
• Administrate Scanning Policies - Determines if the user is allowed to create, modify and remove scanning
policies within the system
• Stop scans - If the user is allowed to administrate scan scheduling he/she will also be allowed to stop scans if
this setting is enabled
Reporting Tools
• Verify scan – The user will be allowed to perform verification scans. No scans will be deducted from the
license when using this feature
• Mark Exceptions – This will allow the user to mark exceptions in the compliance module
Web Application Scanning
• Administrate Scoping - Allows the user to create, modify or remove any scopes in this module
• Access Reporting - Allows the user to view reports in this module
• Administrate Scoping – Allows the user to create, modify or remove any scopes in this module
• Administrate Scheduling - Allows the user to start and stop PCI scans
Vulnerability Management
• Comment Vulnerability Database – Allows the user to create and edit comments in the vulnerability
database
User Management
• Read Audit Logs – The user will be able to read the auditing log
License
• Administrate HIAB Server - Allows the user to restart the HIAB and setup HIAB settings like backup and
networking
• Administrate Network Monitors - Allows the user to administrate the Monitor Targets
3. Technical Support
Contact our 24/7 support team by email or telephone:
Email support@outpost24.com
Tel (from the UK): +44 20 7193 8410