Investigate: Roles and Permissions for Malware Analysts

Document created by RSA Information Design and Development on Sep 18, 2017Last modified by RSA Information Design and Development on Oct 24, 2017
Version 8Show Document
  • View in full screen mode
 

This topic identifies the user roles and permissions required for a user to conduct malware analysis in NetWitness Suite. If you cannot perform an analysis task or see a view, the administrator may need to adjust the roles and permissions configured for you.

Required Roles and Permissions

RSA NetWitness Suite manages security by providing access to views and functions using both system permissions and permissions on individual services.

On the system level, the user needs to be assigned a system role, in the Administration > System view, that provides access to specific views and functions.

The default Malware_Analysts role in NetWitness Suite 10.6.1 is assigned all of the permissions listed below. If necessary, an Administrator can create a custom role with some combination of the following permissions:

  • Access Investigation Module (required)
  • Investigation - Navigate Events
  • Investigation - Navigate Values
  • Access Incident Module
  • View and Manage Incidents
  • View Malware Events (to view events)
  • File Download (to download files from the Malware Analysis service)
  • Initiate Malware Scan (to initiate a one-time service scan or one-time file upload)
  • Dashlet permissions for convenience: Dashlet - Investigate Top Values Dashlet, Dashlet - Investigate Service List Dashlet, Dashlet - Investigate Jobs Dashlet, Dashlet - Investage Shortcuts Dashlet.

A use case for creating a custom role would be a Junior Malware Analyst role, with limited permissions that do not include the File Download permission.

On specific services, a malware analyst needs to be a member of the Analysts group, or to a group that has the two default permissions assigned to the Analyst group: sdk.meta and sdk.content. Users who have these permissions can use specific applications, run queries, and view content for purpose of analysis on the service.

You are here
Table of Contents > How NetWitness Investigate Works > Roles and Permissions for Analysts

Attachments

    Outcomes