Welcome to Community Week 2025! Join us to learn, connect, and be recognized as we celebrate the spirit of Community and the power of AI. Get the details  

Restrict users to see incidents

GirishBabuK
Tera Contributor

I have one requirement that if u_incident_type is security, and assignment_group is SOC then those incidents should be visible to only the people who has the role Splunk-Access.

 

Kindly suggest me

4 REPLIES 4

SN_Learn
Kilo Patron
Kilo Patron

Hi @GirishBabuK ,

 

You can create a read ACL with the below script in incident table.

 

 

if(current.assignment_group == 'sys_id_of_SOC_group' && current.u_incident_type == 'Security'){
answer = gs.hasRole('Splunk_Access');
}

 

 Replace with the correct sysIds.

 

Note: The best practice will be to store the sysID of group in a system property and call it as below:

gs.getProperty('<property_name>'); 

 

 

Mark this as Helpful / Accept the Solution if this helps

----------------------------------------------------------------
Mark this as Helpful / Accept the Solution if this helps.

this is not working

James Chun
Kilo Patron

Hi @GirishBabuK,

 

You can use the Data Filtration capability - https://docs.servicenow.com/bundle/washingtondc-platform-security/page/administer/security/concept/d...

 

Should be pretty easy to set one up.

 

Cheers

Dr Atul G- LNG
Tera Patron
Tera Patron

Hi @GirishBabuK 

 

You can use ACL as well for this. 

*************************************************************************************************************
If my response proves useful, please indicate its helpfulness by selecting " Accept as Solution" and " Helpful." This action benefits both the community and me.

Regards
Dr. Atul G. - Learn N Grow Together
ServiceNow Techno - Functional Trainer
LinkedIn: https://www.linkedin.com/in/dratulgrover
YouTube: https://www.youtube.com/@LearnNGrowTogetherwithAtulG
Topmate: https://topmate.io/atul_grover_lng [ Connect for 1-1 Session]

****************************************************************************************************************