Capability reference for Splunk Enterprise Security

Splunk Enterprise Security uses capabilities to control access to specific features. Capabilities are defined in the authorize.conf configuration file for Splunk Enterprise Security. The following reference table defines relevant capabilities for Splunk Enterprise Security and specifies which roles include each capability by default.
Note:

Do not remove the list_inputs capability from a role

CapabilityDescriptioness_useress_analystess_admin
edit_filter_setsAllows a Splunk Enterprise Security administrator to configure specific views for analysts based on their roles in the organization. Also allows users and analysts to see the saved views that are available to them.XX
edit_uba_settingsAccess data from Splunk Enterprise to Splunk UBA.X
edit_cam_queueWrite the Common Action Model (CAM) queue. See Configure adaptive response action relays in Splunk Enterprise Security.X
edit_modinput_configuration_checkAllows you to run configuration checks.X
edit_notable_eventsCreate ad-hoc findings from search results. See Configure findings manually to track specific fields in Splunk Enterprise Security.XX
admin_all_objects
list_storage_passwords
list_app_certs
edit_app_certs
delete_app_certs
Manage credentials and certificates for Splunk Enterprise Security and other apps. Cannot be set on the Permissions page. See Manage credentials in Splunk Enterprise Security.X
edit_modinput_data_migratorAllows you to perform one-time data migrations.X
edit_modinput_dm_accel_settings

Identify who can edit the Data Model Acceleration modular input. DMA is turned on for the required data models using a modular input by default.

X
edit_modinput_whoisMake changes to edit the modular name by using the "whois" feature.X
edit_search_schedule_priority
edit_search_schedule_window
Edit the schedule priority and schedule window of detections.X
edit_correlationsearches
schedule_search
Edit detections. Users with this capability can also export content from Content Management as an app. See Export content as an app from Splunk Enterprise Security.X
edit_modinput_es_deployment_managerUse distributed configuration management. See Deploy add-ons included with Splunk Enterprise Security.X
edit_es_navigationMake changes to the Splunk Enterprise Security navigation. See Customize the menu bar in Splunk Enterprise Security.X
edit_modinput_identity_managerManage asset and Identity lookup configurations. See Add asset and identity data to Splunk Enterprise Security,How asset and identity correlation works, and Manage assets and identities in Splunk Enterprise Security.X
edit_log_review_settingsMake changes to the analyst queue settings. See Configure the settings for the analyst queue in Splunk Enterprise Security.X
edit_lookups, edit_managed_configurationsCreate and make changes to lookup table files. See Create and manage lookups in Splunk Enterprise Security.X
edit_reviewstatusesMake changes to the status of a finding or an investigation. See Change the status of a finding or an investigation in Splunk Enterprise Security.X
edit_suppressionsEdit Splunk eventtypes in the Threat Intelligence supporting add-on, and create and edit suppressions for findings. See Create suppression rules for findings in Splunk Enterprise Security.

The ess_user and ess_analyst roles don't have the default ability to edit suppressions through Splunk Web. However, they have the ability to perform read and write operations on eventtypes, so they can edit suppressions through the event types interface.

X
edit_notable_eventsMake changes to findings, such as assigning them and transition them between statuses. Statuses for Splunk Enterprise Security investigations are stored in the reviewstatuses.conf file. See Manage analyst workflows using the analyst queue in Splunk Enterprise Security.XX
edit_per_panel_filtersPermits the role to update per-panel filters on dashboards. See Configure per-panel filtering in Splunk Enterprise Security.X
edit_modinput_app_permissions_managerAllows you to edit app permissions manager. Required for essinstall.X
edit_modinput_threatlistChange intelligence download settings.X
edit_risk_factorsChange risk factor settings. See Create risk factors to adjust risk scores in Splunk Enterprise Security.X
edit_threat_intel_collectionsUpload threat intelligence and perform CRUD operations on threat intelligence collections using the REST API.X
edit_modinput_ess_content_importerAllows you to import content from installed applications.X
migrate_correlationsearches(Internal) Used by the background script to migrate detections.X
edit_managed_configurationsMake changes to the general settings or the list of editable lookups. See Configure general settings for Splunk Enterprise Security.X
manage_all_investigationsAllows the role to view and make changes to all investigations. See Managing access to investigations in Splunk Enterprise Security.X
edit_analyticstoriesAllows the role to make changes to analytics stories. See Manage analytics stories in Splunk Enterprise SecurityXX
edit_timelineCreate and edit investigations. Roles with this capability can make changes to investigations on which they are a collaborator. See Collaborate on investigations in Splunk Enterprise Security.XX
can_own_notable_eventsAllows the role to be an owner of findings.XX
edit_managed_configurations
schedule_search
Create lookup tables that can be populated by a search. See Create search-driven lookups in Splunk Enterprise Security.X
edit_modinput_app_imports_updateAllows you to update app imports with all apps matching a given regular expression.X

mc_assets_readAllows retrieving asset data via public API.XXX
mc_identity_readAllows retrieving identity data via public API.XXX
mc_risk_score_readAllows retrieving a list of risk scores by Entity via public API.XXX
mc_risk_score_writeAllows adding risk modifiers for an entity via public API.XX
mc_investigation_readViewing investigation data, such as viewing the Investigation’s Overview or retrieving investigation data through public APIs.XXX
mc_investigation_writeEdit investigation data, such as applying a response plan to an investigation or editing an investigation through public APIs.XX
mc_display_idAllows retrieving and creating human readable IDs for investigations in Splunk Mission Control.X
edit_missioncontrol_agreementsAccept the initial user agreement and activate or deactivate Splunk Mission Control.
edit_intelligence_managementCreate, edit, delete, and activate intelligence workflows with Threat Intelligence Management in Splunk Mission Control.XX
mc_delete_soar_assetDelete assets in Splunk SOAR (Cloud).
mc_edit_soar_appsEdit apps in Splunk SOAR (Cloud).
mc_edit_soar_assetsEdit assets in Splunk SOAR (Cloud).
mc_health_reportCall the health report endpoint on Splunk Mission Control.XXX
mc_incident_settings_readView the Splunk Mission Control settings page.X
mc_incident_settings_editEdit Splunk Mission Control settings.X
mc_response_template_viewView response templates.XXX
mc_response_template_editEdit response templates.X
mc_trigger_backfillTrigger all incidents in the backfill to get pushed directly to Splunk SOAR.
mc_view_soar_appsView apps in Splunk SOAR (Cloud).
mc_view_soar_assetsView assets in Splunk SOAR (Cloud).
mc_incident_sla_settings_readView the Splunk Mission Control incident settings SLA page.XXX
mc_incident_sla_settings_editEdit the Splunk Mission Control incident SLA settings.X
mc_view_soar_system_settingsView system settings in Splunk SOAR (Cloud).
mc_edit_soar_system_settingsEdit system settings in Splunk SOAR (Cloud).
mc_view_soar_custom_listsView custom lists in Splunk SOAR (Cloud).
mc_edit_soar_custom_listsEdit custom lists in Splunk SOAR (Cloud).
mc_delete_soar_custom_listsDelete custom lists in Splunk SOAR (Cloud).
mc_view_soar_users_rolesView users and their roles in Splunk SOAR (Cloud).
mc_view_im_dataAccess Threat Intelligence Management data.