Administration Groups

Administration groups allow you to provide and manage user access to your organization’s licensed Proofpoint products in the Information and Cloud Security Platform.

You use administrative groups to create access policies that provide Platform access to multiple users. (Access policies are bundles of capabilities that you assign to define the read and write privileges of a Platform user. See Access Policies.)

For example, you might assign the same policy to all members of a team.

If members of the administrative group are also assigned to other access policies, the capabilities will be cumulative meaning the members have the access policies assigned to the group as well as any other access policies they are assigned. (For more information, see Assigning Access Policies.)

Administration Groups can also include Personas.

Adding Groups

  1. From the Proofpoint Information and Cloud Security Platform, select the Administration app. Select User Management > Groups and the list of current groups appears.

  2. Click Add Group and when prompted in the fields, provide an Alias and optionally a Description and then click Save.

    The group is added to the list.

Assigning the Group Membership and Policy

Once you've added a group, you can:

  1. Click on the group you want and the Details window opens.

  2. To edit the description, select the Details tab and click Edit.

  3. To assign access policies, select the Access Policies tab and click Edit. Select the access policies you want to assign to all members of the group.

    Click View to see the list of capabilities for a policy. Click Edit to set an expiration for the access policy.

    Click Done to save.

  4. To assign the members to a group, select Members and click Edit. Select the users, groups and personas you want to assign as members of the group and click Done to save.

  5. To assign a groups to the group, select the Assignment tab and click Edit. Select the groups that you want to add to the group and click Done to save.


Related Topics:

Explorations

ITM / Endpoint DLP Rules