Security Policies

Administrative controls that give administrators precise control over how specific features in LogScale can be used across the organization. Security policies provide three main types of restrictions: complete access control (turning features on or off entirely), network-based access (allowing access only from specific IP addresses or networks), and usage controls (setting limits on how features can be used). For example, dashboard security policies control whether users can create shared dashboards, while email action security policies determine if email actions are available and which email addresses can receive notifications. These policies often work in combination with IP filters to provide comprehensive access control for API tokens, dashboard sharing, automated actions, and other system features, enabling fine-grained security management across all LogScale functionality.

Related ContentRelated Terms