User and Group Management
Idle Timeout
Settings Idle Timeout Automatically log out users after a defined period of inactivity to improve session security and prevent unauthorised access on unattended workstations. Overview The Idle Timeout feature in Cloudmon automatically ends a user's ...
Password Management and MFA
Settings Password Management and MFA Manage your login credentials and add a second layer of security by enabling multi-factor authentication via OTP authenticator apps or email verification. Password ManagementManagement First Login and Setting a ...
Authentication Methods
Settings Authentication Methods Cloudmon supports two multi-factor authentication methods: an OTP authenticator app and email OTP. Both are configured per user from the Edit Profile page. Overview Authentication in Cloudmon is based on a username and ...
IP Restrictions
Settings IP Restrictions Control which IP addresses and networks are permitted to access the Cloudmon controller. IP restrictions prevent unauthorised access from addresses outside your approved list. Overview IP Restrictions in Cloudmon allow ...
Groups
Settings Groups Organise monitored devices into logical groups for bulk association with monitoring profiles, alarm rules, and user access restrictions. Groups support hierarchical parent-child structures and automatic tag-based assignment. Overview ...
User Accounts
Settings User Accounts Add and manage individual Cloudmon user accounts. Each account is assigned a role, linked to specific customers and groups, and configured with notification preferences and access controls. Overview User accounts in Cloudmon ...
User Roles
Settings User Roles Create and manage roles that define which pages users can access and which actions they are permitted to perform within Cloudmon. Overview User roles are the foundation of access control in Cloudmon. Every user account must be ...
User Management
Settings User Management Manage who can access Cloudmon and what they can do. User Management covers roles, accounts, groups, and access controls that together define a secure and organised user hierarchy across your organisation. Overview User ...