Changing an Employee's Account Access Level
You can change the account type/access level/role of an employee from their profile:
1. From the main menu, select Employees.
2. Scroll down to the employee who's account you want to change. Then click the Three Dots
in front of their name. This will open the Context Menu.
3. From the Context Menu, select the Edit Profile option. This will open a panel on the right side of the screen.
4. Click the Account tab.
5. Select an account role from the Access Level drop-down menu.
6. Click the Apply changes button to set the access level.
Account Access Level vs. Access Control
Account Access Levels are built-in roles that control which core features an user can see and interact with. These are pre-defined, fixed roles, such as Administrator, Infrastructure Administrator, Employee, etc. and cannot be altered.
Access Control, on the other hand, allow you to create customized, granular permission settings for non-admin users (such as regular employees and department managers). By assigning these policies, you can precisely define which specific data or actions they are authorized to view or perform, effectively elevating their status with tailored privileges.
Access Levels Explained
Teramind has several account access levels you can assign to users to limit which features and options they can access. You can change the account access level of a user from their profile.
The access levels are prioritized as follows:
Administrator
Operational Administrator
Infrastructure Administrator
Department Manager (see the Configurations > Departments section of the User Guide)
Employee with special permissions assigned via Access Control (see the Configurations > Access Control section of the User Guide)
Employee
If you change a user's access level from a lower role to a higher role, the previous permissions will be overridden. For example, if you change an "Employee with special permissions" to a "Department Manager", they will now have the permissions available to a Department Manager and all their previous access control permissions will be ignored.
Administrator
The most powerful access level. They can monitor all employees, other admins, and change any settings with no restrictions.
Operational Administrator
A step down from an Administrator access level, Operational Administrators are granted the ability to manage global settings without being able to view monitoring data.
The table below details the specific permissions and restrictions for users assigned this access level. It outlines their capabilities across various system features, including profile management, employee and computer administration, and configuration settings, providing a comprehensive overview of their operational scope.
My Profile |
|
Dashboards | X |
Session Player | X |
Employees |
|
Computers |
|
Configurations > Shared Lists | ✔ |
Configurations > Behavior Policies | ✔ |
Configurations > Access Control | X |
Configurations > Monitoring Profiles | ✔ |
Configurations > Productivity Profiles |
|
Configurations > Departments | ✔ |
Configurations > Settings |
|
Configurations > Positions | ✔ |
Configurations > Tasks | ✔ |
Configurations > Locations | ✔ |
System > Download Agent | ✔ |
System > Deployments |
|
System > Dashboard Exports |
|
System > Video Exports | X |
Issues/Notifications Report | ✔ |
Infrastructure Administrator
This access level has more limited access than an Administrator or Operational Administrator. Infrastructure Administrators are not able to list employee or computer accounts or view any monitoring data, screen recordings, or productivity metrics but they are allowed to edit the subscription (cloud accounts), download agents, and adjust global dashboard settings and monitoring settings.
The table below outlines the specific permissions and restrictions for users holding this access level. It details their capabilities concerning profile management, configurations and monitoring profiles, and certain system functions, providing a clear overview of their role in managing system infrastructure.
My Profile |
|
Dashboards | X |
Session Player | X |
Employees | X |
Computers | X |
Configurations > Shared Lists | ✔ |
Configurations > Behavior Policies | X |
Configurations > Access Control | X |
Configurations > Monitoring Profiles | ✔ |
Configurations > Productivity Profiles | X |
Configurations > Departments | X |
Configurations > Settings |
|
Configurations > Positions | X |
Configurations > Tasks | X |
Configurations > Locations | X |
System > Download Agent | ✔ |
System > Deployments |
|
System > Dashboard Exports | X |
System > Video Exports | X |
Issues/Notifications Report | X |
Department Manager / Supervisor
This is a special type of permission not available under the Account Type and can only be created from the Departments menu. Please see the section Configure > Departments on the Teramind User Guide to learn more about departments.
Any employee that is not assigned one of the administrator roles can be assigned as a department manager. These managers can then view/manage the employees in their assigned department.
The reports accessible in the dashboards will be very similar to what an Administrator can see but the results will be filtered to the employees that are listed in the Employees field for Departments that person manages.
Note that, if you change the account access level of a manager (i.e. make them an Administrator, Infrastructure Administrator etc.), that access level will override their Department Manager privilege.
The table below details the specific permissions and restrictions for users assigned this access level. It outlines their capabilities concerning profile management, dashboard access and creation, and the ability to view and manage tasks and employee/computer data relevant to their department.
My Profile |
|
Dashboards |
|
Session Player | ✔ |
Employees |
|
Computers |
|
Configurations > Shared Lists | X |
Configurations > Behavior Policies | X |
Configurations > Access Control | X |
Configurations > Monitoring Profiles | X |
Configurations > Productivity Profiles | X |
Configurations > Departments |
|
Configurations > Settings |
|
Configurations > Positions | X |
Configurations > Tasks |
|
Configurations > Locations | X |
System > Download Agent |
|
System > Deployments | X |
System > Dashboard Exports |
|
System > Video Exports |
|
Issues/Notifications Report | X |
Employee
An employee can access their activity reports and mange their profile - only if allowed by an administrator.
The table below outlines the specific permissions and restrictions for standard users with employee access. It details their capabilities for managing their own profile and viewing various dashboards and reports related to their personal activity.
My Profile |
|
Dashboards |
|
Session Player |
|
Employees | X |
Computers | X |
Configurations > Shared Lists | X |
Configurations > Behavior Policies | X |
Configurations > Access Control | X |
Configurations > Monitoring Profiles | X |
Configurations > Productivity Profiles | X |
Configurations > Departments | X |
Configurations > Settings | X |
Configurations > Positions | X |
Configurations > Tasks | X |
Configurations > Locations | X |
System > Download Agent |
|
System > Deployments | X |
System > Dashboard Exports | X |
System > Video Exports | X |
Issues/Notifications Report | X |
External Security Risks of Operational and Infrastructure Administrator Roles and How to Mitigate Them
The Operational Administrator and Infrastructure Administrator roles are granted access to system settings. This privilege presents several security risks when used with an external identity provider or third-party integrations:
Credential Escalation Risk: If these roles have control over authentication solutions (such as LDAP, SSO, or SMTP configurations), they may be able to manipulate settings to authenticate and log in as a full Administrator (e.g., by using a different, authorized email).
Monitoring Data Exposure: Access to monitoring profiles and system settings also enables them to integrate with external systems, such as a SIEM solution. A SIEM integration could allow them to read and access all monitoring data for employees, bypassing dashboard-level restrictions.
Mitigation Strategy
To mitigate the security risks, employ a three-pronged strategy:
External IdP Mapping: Avoid assigning users the inherently risky built-in roles when integrating with your external Identity Provider. Instead, map those users to the more restrictive Employee role.
Internal Privilege Control: Utilize Teramind’s Access Control Policies to grant only the exact, necessary system privileges (e.g., to edit a single monitoring profile), bypassing the full scope of the built-in admin access and upholding the Principle of Least Privilege.
SIEM Configurations: Configure your SIEM integrations to transmit only relevant security data points and logs. If needed, create multiple integrations for different analysts/use cases.

