Organization Users
The Organization Users section manages all users who have access to the organization’s modules within the AttackMetricx platform. It provides full visibility into user roles, permissions, and activity, ensuring strict access governance and accountability.
Adding a New User
To add a user to your organization:
Click Add New User in the top-right corner of the Organization Users tab.
In the Add A New User dialog box, enter the user’s email address.
The email must be valid and associated with the organization.
Click Add to confirm.
The user will be added to the organization with default limited access.
Once added, administrators can define the user’s authorization and role scope by opening the user details.
Managing User Authorization
To configure permissions for an existing user, click the double-arrow icon (››) on the right side of the user’s record.
This opens the User Authorization & Role Settings panel, which displays detailed user attributes and module-specific access options.
Each user entry includes metadata for audit purposes:
Created At: The date and time the user was added.
Modified At: The last time the user’s permissions were changed.
Last Login: The most recent login timestamp for tracking activity and engagement.
Role Configuration
Each user can be assigned specific roles and privileges across AttackMetricx modules, ensuring granular control aligned with operational responsibilities.
Attack Surface
Full Administrator:
Grants unrestricted access to all Attack Surface Management features including scans, issue tracking, configuration settings, and export capabilities.
Limited Access:
Allows controlled interaction based on assigned permissions. When selected, the admin can choose which sub-features the user can access:
Scan Management: Permission to view and initiate vulnerability or exposure scans.
Threat Exposure: Access to view exposure findings and analyze results.
Issue Status: Allows viewing and updating of issue states (Open, Resolved).
Notes Management: Enables adding internal notes or analyst commentary for incidents.
Generate Report: Allows generating on-demand reports for attack surface assessments.
Data Export: Grants the ability to export scan or vulnerability data to CSV or external systems.
Dark Web
Full Administrator:
Provides full access to all Dark Web intelligence modules, including breach data, credential analysis, botnet monitoring, and ransomware.
Limited Access:
Enables selective access to specific intelligence operations:
Scan Management: View or initiate dark web scans.
VIPs: Access to VIP monitoring and executive credential exposure tracking.
Secret Masking Management: Manage masking rules for sensitive data like passwords or credit card numbers to prevent direct exposure.
Get All Victim Credential: Retrieve and review all leaked credentials associated with the organization.
Issue Status: Manage or update investigation status for exposed records.
Notes Management: Add analyst insights or internal comments for breaches.
Generate Report: Create structured dark web exposure reports for compliance or management review.
Data Export: Export breach datasets.
Additional Roles
These options provide elevated cross-module privileges:
Organization Administrator:
Full organizational management including user control, settings, and module-level configuration.
Typically reserved for CISOs, security managers, or platform owners.
Vulnerabilities:
Grants access to vulnerability management sections, enabling review and prioritization of detected system flaws.
Threat Feeds:
Allows visibility into live and historical threat intelligence feeds, ensuring analysts stay informed of emerging threats and attack vectors.
User Actions
Under the Actions section, two critical administrative controls are provided:
Reset Password:
Allows administrators to reset a user’s credentials in case of compromise or lost access.
This maintains account hygiene and ensures quick credential rotation.
Delete this user:
Permanently removes the user from the organization.
Recommended for offboarding users who no longer require access or after role termination.
Security Insight
The Organization Users module enforces a least privilege principle, ensuring every user is granted only the permissions required for their responsibilities.
By differentiating between Full Administrator and Limited Access levels across modules like Attack Surface and Dark Web, the system allows for highly customizable security operations enabling executive oversight while minimizing operational risk.
Last updated
Was this helpful?