Users
The User Management module allows administrators and HelpDesk personnel to monitor and manage e-mail access on a targeted, per-user basis. Instead of navigating the entire device inventory, this module focuses on the user identity, enhancing operational efficiency and reducing errors during support sessions.
Role-Based Access Control
Administrators: Possess full authority to view, query, and manage all users and their associated devices across the organization.
HelpDesk Operators: Authorized to search for users and perform standard device-level actions such as "Allow" or "Block".
User Inquiry and Filtering
Staff can use the Search Panel to locate specific personnel using the following parameters:
Display Name: The full name of the user as it appears in the system.
Username: The unique login ID or Active Directory identity.
E-Mail: The primary corporate e-mail address of the user.

User-Specific Device Management
To manage the devices belonging to a specific individual, follow these steps:
Search: Use the search panel to filter and locate the target user.
Access Devices: Click the "Devices" button located on the right side of the user's row. This will redirect the view to a filtered list containing only that user's registered devices.
Status Filtering: Within the device list, you can quickly filter by "Allowed", "Blocked", "Quarantined", or "Unspecified" statuses.

Device Actions and Technical Details
Once a user's device is identified, the following administrative actions are available:
Allow: Immediately grants the device permission to synchronize e-mails.
Block: Suspends e-mail access for the device in accordance with security policies.
Delete: Permanently removes the device record from the user's profile.
Info (Device Details): Clicking the info button opens a side panel containing comprehensive technical data. This includes the Device OS (e.g., iOS 17.6.1), Device ID, First Sync time, and Modified Time.

Security Note
The User Management workflow is designed to ensure that HelpDesk personnel interact only with the necessary user data. By restricting the view to a single user's devices at a time, the system minimizes the risk of accidental global configuration changes and maintains a strict focus on targeted troubleshooting.
Last updated