Join fellow LogicMonitor users at the Elevate Community Conference and get hands-on with our latest product innovations.

Register Now

Resources

Explore our blogs, guides, case studies, eBooks, and more actionable insights to enhance your IT monitoring and observability.

View Resources

About us

Get to know LogicMonitor and our team.

About us

Documentation

Read through our documentation, check out our latest release notes, or submit a ticket to our world-class customer service team.

View Resources

High-Risk Permissions

Last updated on 19 September, 2024

Unless you are using an API endpoint that requires these permissions, we recommend you avoid generating API tokens with them without explicit thought as they provide access which can pose a higher risk if misused:

Permission Tab (uiv4)Permission NamePermission Value
SettingsAccount InformationManage
SettingsSecurityManage
SettingsUser AccessManage
SettingsUser ProfileManage
ModulesAll Installed ModulesManage
ModulesAllow management of Access Groups* Enabled
ResourcesAll Devices*Manage
ResourcesAll Devices*Remote Session
ResourcesCollectorsManage
ResourcesCollectorsRemote Session


*We recommend scoping your Resource access rather than providing access to All Devices.

Start Your Trial

Full access to the LogicMonitor platform.
Comprehensive monitoring and alerting for unlimited devices.