<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Permission Restriction for High-Impact Settings in Open Q&amp;A</title>
    <link>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283228#M37283</link>
    <description>&lt;P&gt;Well, this is a broad answer and may vary from organization to organization, but I can share my dedicated policy for power users to use in conjunction with the ALLOW environment:roles:viewer; role:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;ALLOW settings:objects:read, settings:objects:write, settings:schemas:read WHERE settings:schemaId IN ("builtin:synthetic.browser.name", "builtin:synthetic.browser.scheduling", "builtin:synthetic.http.name", "builtin:synthetic.http.scheduling", "builtin:synthetic.browser.assigned-applications", "builtin:synthetic.http.performance-thresholds", "builtin:synthetic.browser.kpms", "builtin:synthetic.http.assigned-applications", "builtin:synthetic.http.cookies", "builtin:synthetic.browser.performance-thresholds");
ALLOW settings:objects:read, settings:objects:write, settings:schemas:read WHERE settings:schemaId IN ("builtin:failure-detection.service.http-parameters", "builtin:failure-detection.service.general-parameters", "builtin:anomaly-detection.metric-events", "builtin:davis.anomaly-detectors", "builtin:metric.metadata", "builtin:settings.calculated-service-metrics", "builtin:user-action-custom-metrics" , "builtin:custom-metrics" , "builtin:tags.auto-tagging", "builtin:tags.manual-tagging", "builtin:alerting.maintenance-window", "builtin:alerting.profile", "builtin:problem.notifications", "builtin:monitoring.slo");
ALLOW settings:objects:read, settings:objects:write, settings:schemas:read WHERE settings:schemaId IN  ("builtin:rum.mobile.name", "builtin:rum.mobile.key-performance-metrics", "builtin:rum.mobile.request-errors", "builtin:rum.source-mappings", "builtin:rum.web.name", "builtin:rum.web.request-errors", "builtin:rum.web.custom-errors");
ALLOW settings:objects:read, settings:objects:write, settings:schemas:read WHERE settings:schemaId IN  ("builtin:settings.mutedrequests", "builtin:settings.subscriptions.service");&lt;/LI-CODE&gt;&lt;P&gt;Hope it helps! At least is not a blank sheet to work on....&lt;/P&gt;</description>
    <pubDate>Wed, 06 Aug 2025 23:05:09 GMT</pubDate>
    <dc:creator>DanielS</dc:creator>
    <dc:date>2025-08-06T23:05:09Z</dc:date>
    <item>
      <title>Permission Restriction for High-Impact Settings</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283187#M37272</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;We are a small Dynatrace team working within a large organization, focusing on a self-serve model where "Power Users" manage application monitoring. Recently, we've encountered challenges with unintended changes affecting the organization, such as broad Maintenance Windows affecting alerting and issues with accidental OPL deletion.&lt;/P&gt;&lt;P&gt;We are seeking advice on what settings and applications we should restrict to admin-only access for settings we haven't thought of yet. While we have already secured the above examples and provided guidance on protocols, we would appreciate insights on additional settings or applications that should be exclusively managed by our team.&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 17:11:06 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283187#M37272</guid>
      <dc:creator>eric_holloway</dc:creator>
      <dc:date>2025-08-06T17:11:06Z</dc:date>
    </item>
    <item>
      <title>Re: Permission Restriction for High-Impact Settings</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283198#M37276</link>
      <description>&lt;P&gt;Hello&amp;nbsp;&lt;a href="https://community.dynatrace.com/t5/user/viewprofilepage/user-id/65063"&gt;@eric_holloway&lt;/a&gt;&amp;nbsp;what you want is perfectly doable.&lt;/P&gt;&lt;P&gt;The way to do it through policies. I leave you the reference to start.&amp;nbsp;&lt;A href="https://docs.dynatrace.com/docs/shortlink/iam-policystatements" target="_blank"&gt;https://docs.dynatrace.com/docs/shortlink/iam-policystatements&lt;/A&gt;&amp;nbsp;and an overall guide&amp;nbsp;&lt;A href="https://docs.dynatrace.com/docs/shortlink/access-platform" target="_blank"&gt;https://docs.dynatrace.com/docs/shortlink/access-platform&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please let me know if I can be of further assistance.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 15:54:44 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283198#M37276</guid>
      <dc:creator>DanielS</dc:creator>
      <dc:date>2025-08-06T15:54:44Z</dc:date>
    </item>
    <item>
      <title>Re: Permission Restriction for High-Impact Settings</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283199#M37277</link>
      <description>&lt;P&gt;I also add this &lt;A href="https://www.dynatrace.com/news/blog/tailored-access-management-for-dynatrace-part-1-one-configuration-for-all-authorization-requirements/" target="_blank" rel="noopener"&gt;blog post&lt;/A&gt; where you have a longer explanation, have in mind that this is the first one on a series.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 15:57:04 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283199#M37277</guid>
      <dc:creator>DanielS</dc:creator>
      <dc:date>2025-08-06T15:57:04Z</dc:date>
    </item>
    <item>
      <title>Re: Permission Restriction for High-Impact Settings</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283204#M37279</link>
      <description>&lt;P&gt;Yeah, we are doing it through policies. My questions is "what settings can be high impact for an org and should be locked down to admins only?"&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 17:09:40 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283204#M37279</guid>
      <dc:creator>eric_holloway</dc:creator>
      <dc:date>2025-08-06T17:09:40Z</dc:date>
    </item>
    <item>
      <title>Re: Permission Restriction for High-Impact Settings</title>
      <link>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283228#M37283</link>
      <description>&lt;P&gt;Well, this is a broad answer and may vary from organization to organization, but I can share my dedicated policy for power users to use in conjunction with the ALLOW environment:roles:viewer; role:&lt;/P&gt;&lt;LI-CODE lang="markup"&gt;ALLOW settings:objects:read, settings:objects:write, settings:schemas:read WHERE settings:schemaId IN ("builtin:synthetic.browser.name", "builtin:synthetic.browser.scheduling", "builtin:synthetic.http.name", "builtin:synthetic.http.scheduling", "builtin:synthetic.browser.assigned-applications", "builtin:synthetic.http.performance-thresholds", "builtin:synthetic.browser.kpms", "builtin:synthetic.http.assigned-applications", "builtin:synthetic.http.cookies", "builtin:synthetic.browser.performance-thresholds");
ALLOW settings:objects:read, settings:objects:write, settings:schemas:read WHERE settings:schemaId IN ("builtin:failure-detection.service.http-parameters", "builtin:failure-detection.service.general-parameters", "builtin:anomaly-detection.metric-events", "builtin:davis.anomaly-detectors", "builtin:metric.metadata", "builtin:settings.calculated-service-metrics", "builtin:user-action-custom-metrics" , "builtin:custom-metrics" , "builtin:tags.auto-tagging", "builtin:tags.manual-tagging", "builtin:alerting.maintenance-window", "builtin:alerting.profile", "builtin:problem.notifications", "builtin:monitoring.slo");
ALLOW settings:objects:read, settings:objects:write, settings:schemas:read WHERE settings:schemaId IN  ("builtin:rum.mobile.name", "builtin:rum.mobile.key-performance-metrics", "builtin:rum.mobile.request-errors", "builtin:rum.source-mappings", "builtin:rum.web.name", "builtin:rum.web.request-errors", "builtin:rum.web.custom-errors");
ALLOW settings:objects:read, settings:objects:write, settings:schemas:read WHERE settings:schemaId IN  ("builtin:settings.mutedrequests", "builtin:settings.subscriptions.service");&lt;/LI-CODE&gt;&lt;P&gt;Hope it helps! At least is not a blank sheet to work on....&lt;/P&gt;</description>
      <pubDate>Wed, 06 Aug 2025 23:05:09 GMT</pubDate>
      <guid>https://community.dynatrace.com/t5/Open-Q-A/Permission-Restriction-for-High-Impact-Settings/m-p/283228#M37283</guid>
      <dc:creator>DanielS</dc:creator>
      <dc:date>2025-08-06T23:05:09Z</dc:date>
    </item>
  </channel>
</rss>

