Does anyone else find the User Permissions overly complicated/not intuitive?
Using the built-in “View” role applied to a user group at the Comcell level seems as though doesn't actually give “View” on everything.
Example: “View” only shows Command Center dashboards Overview and Activate. No virtualization or Hyperscale?
Are there any best practices from a Ransomware perspective (without the obvious least permission statement) to give a user access to the whole environment for monitoring purposes, allow to backup/restore but prevent the ability to delete any data?
Best answer by Christian NegronView original