• /
  • EnglishEspañolFrançais日本語한국어Português
  • Log inStart now

Prerequisites and user roles for Security RX

Prerequisites

Before you can use the Security RX capability, you must have the following:

Capabilities used by Security RX

  • Security capability refers to the ability to view and manage security findings (vulnerabilities and misconfigurations) detected in entities.
  • Applied Intelligence - Channels capability is required to create new outbound alerts based on vulnerabilities detected.
  • Applied Intelligence - Destinations capability is required to create new outbound alerts based on vulnerabilities detected.

Granting access to Security RX

Review the current custom roles created for your organizations. Add 'read' permissions for the 'security' capability to grant access to view Security RX. Standard roles are automatically granted this capability but custom roles need to have 'read' permissions granted. For more information about custom roles, see user roles.

An image showing the summary Vulnerability Management overview page.

Removing user access from Security RX

Users with the ability to create/adjust roles within their organization can modify who has access to Security RX feature. You can remove access from Security RX by creating a custom role that does not have 'read' permissions for the 'security' capability. You must then apply this custom role to the users that you wish to restrict.

What's next?

Now that you've verified your prerequisites, set up your first integration:

Set up integrations

Configure APM agents, Infrastructure agents, or third-party security tools

Understand prioritization

Learn how Security RX ranks vulnerabilities by risk

Security RX for Applications

Start monitoring application vulnerabilities

Security RX for Infrastructure

Start monitoring infrastructure vulnerabilities

Copyright © 2025 New Relic Inc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.