Security Settings - User Guide - 2 - Cortex XPANSE - Cortex - Security Operations

Cortex Xpanse Expander User Guide

Product
Cortex XPANSE
Version
2
Creation date
2024-05-22
Last date published
2024-07-12
Category
User Guide
Solution
Cloud
Abstract

Define user login expiration, dashboard expiration, allowed domains, and other security features.

On the Security Settings page you can define how long a user can be logged in, restrict user access based on email or IP range, specify domains for distribution lists, and other session security features. To navigate to the Security Settings page, go to (SettingsConfigurationsSecurity Settings).

The following tables describe each of the security settings.

Session Expiration

Settings

Description

User Login Expiration

Select the number of hours after which the user login session expires.

Optionally Enable Auto Logout, which automatically logs out a user after a specified amount of inactivity.

Dashboard Expiration

Select whether the dashboard window expires at the same time as login or after 7 days. This is useful where you view a dashboard on a separate screen. For example if the user selects 7 days for dashboards and 8 hours for login expiration, if the user is currently viewing the dashboards screen, the dashboard expiration takes priority (7 days).

Allowed Sessions

Settings

Description

Approved Domains

If enabled, specify the domains from which you want to allow user access (login) to Cortex Xpanse. You can add or remove domains as necessary.

Approved IP ranges

If enabled, specify the IP ranges from which you want to allow user access (login) to Cortex Xpanse.

User Expiration

Settings

Description

Deactivate Inactive User

Enables you to deactivate inactive users, and set the user deactivation trigger period. By default, user expiration is disabled. When enabled, enter the number of days after which inactive users should be deactivated.

Allowed Domains

Settings

Description

Domain Name

Enables you to specify one or more domain names that can be used in your distribution lists for reports. For example, when generating a report, ensure the reports are not sent to email addresses outside your organization.