Users
The Users page provides administrators with a centralized interface to manage all user accounts registered within the CyberGuard.ai platform. It lists essential user details, including email, first name, last name, and user-specific attributes such as SSO exclusion status and third-party designation.
This page allows system owners to easily review who has access to the system, differentiate between internal and third-party users, and manage authentication preferences. The clear, tabular layout supports quick identification and sorting of users while providing convenient action icons for viewing, editing, and removing user profiles.
By maintaining user information through this module, organizations ensure consistent identity management, controlled access, and proper role-based security administration across all CyberGuard.ai modules.
Usage Notes
Adding New Users
Click the Add User button to register a new user within the system.
Enter the user’s email, name details, and define whether they are a third-party or internal member.
Managing User Profiles
Use the edit icon to update user details or change their SSO or third-party settings.
Select the view icon to access a detailed profile, including assigned roles and group memberships.
Excluding from Forced SSO
The Exclude from Forced SSO option allows administrators to exempt specific accounts (e.g., service accounts or contractors) from single sign-on requirements.
Removing Users
The delete icon permanently removes a user from the system.
Exercise caution when deleting users, as this may impact existing assignments or linked audit records.
Searching and Filtering
Use the search bar to quickly locate users by name or email.
Filter tools can be applied to streamline results for large organizations with multiple user accounts.
Related Pages
User Groups – Learn how to create and manage user groups for role-based access control and permission assignment.
Domains – Understand how organizational domains define the structural hierarchy for users and assets.
Perimeters – Explore how perimeters link to domains to define assessment and security boundaries.

Last updated