Insight into Security Groups and AI Agents
Traditionally, monitoring focuses on the 'normal' user: an employee who logs in and performs specific actions. But what happens 'under the hood'?
Technically speaking, security groups and AI agents behave exactly like users within the system. They acquire permissions, execute tasks, and have access to sensitive functionality. If these are not included in the risk analysis, a blind spot forms in your security. With our recent adjustments, we make these new types of users visible.
What’s New?
1. Insight into AI Agents
Recently, AI agents have been introduced to Business Central. These agents operate as autonomous users that perform tasks
independently, and they require specific permissions to do so. But does such an agent unintentionally have access to critical processes? In our updated monitoring, these agents are now explicitly visible.
We make a distinction based on the license type. This allows you to see at a glance whether a risk is caused by a human user or an automated agent.
2. Transparency in Security Groups
Managing permissions with security groups is efficient, but it can obscure compliance insights when combined with regular permission
sets and organizational roles. After all, exactly which permissions does a user obtain through which group?
In the new update, we have made this completely transparent:
-
Direct insight: Security groups are now analyzed for risks, just like users.
-
The origin of permissions: When reviewing the analysis result of an
individual user, you can now see exactly which permissions are
assigned directly, which are obtained through membership in a security group, and which come from regular permission sets.
Grip on Your Entire Landscape
With these additions, we ensure that your risk analysis is complete. Whether it concerns a new colleague, a smart AI assistant, or a complex permissions structure via groups: you stay in control.
The update is available immediately in the Authorization Box. Do you have questions about how to best interpret these new insights? Feel free to contact us.