• /
  • EnglishEspañol日本語한국어Português
  • Log inStart now

Prerequisite and user roles for Security RX

Prerequisites

Before you can use the Security RX capability, you must have the following:

Capabilities used by Security RX

Granting access to Security RX

Review the current custom roles created for your organizations. Add 'read' permissions for the 'vulnerabilities' capability to grant access to view Security RX. Standard roles are automatically granted this capability but custom roles need to have 'read' permissions granted. For more information about custom roles, see user roles.

An image showing the summary Vulnerability Management overview page.

Removing user access from Security RX

Users with the ability to create/adjust roles within their organization can modify who has access to Security RX feature. You can remove access from Security RX by creating a custom role that does not have 'read' permissions for the 'vulnerabilities' capability. You must then apply this custom role to the users that you wish to restrict.

Copyright © 2025 New Relic Inc.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.