Creating security lists

You can use advanced security options to restrict user access to sites, reporting, and real-time functions.

Before you can specify advanced security, you must create security lists (device lists, real-time monitor lists, report lists, site lists, and user lists). Each list must contain the devices, real-time monitors, reports, sites, and users to which employees are granted access. You can combine these lists when you assign a security role. For example, you can specify advanced security that permits users to create Employee Group Performance by Employee reports (specific report list) on Kanata employees (specific device list) only.

Before you can specify advanced security, you must create security lists (device lists, real-time monitor lists, report lists, site lists, and user lists). Each list must contain the devices, real-time monitors, reports, sites, and users to which employees are granted access.

Use the following security lists to define advanced security:
If you are using Windows Authentication, you must also enable the following browser settings:
To create a security list
  1. Under the Enterprise pane, click Security list. This displays a pane with the type of security list you want to create.
  2. Select the security list you want to add and click Add. A selection dialog appears displaying the Device Type
  3. Select the check boxes of the group you want to include in the device list. Click OK.
  4. Enter the list Name.
  5. Enter the list Description.
  6. Click Save to save the changes.
To delete a security list
  1. Under the Enterprise pane, click Security list.
  2. Select the security list you want to delete and click Delete.