Case number 302917
In order to get better value out of Log and Event Manager, we would like to give more invididuals in IT access to LEM so they can make better sense of the logs originating from the devices they administer.
Unfortunately, there are certain types of logs we do not wish to give access to. In order to prevent inappropriate access to logs, it would be great if we could control access for a particular LEM user on a per-source-device basis. The end result would be, for example, a network administrator who can only see logs which originate from a list of network devices and not access any Active Directory related logs.