After you add an attachment category to a case type, you can configure it to restrict user operations. By controlling the actions that users can take, you provide security for the attachments in your cases.
Open the attachment category rule that supports your case type.
On the Availability tab, select a check box for each attachment type that is supported by your attachment category.
Caution: Your attachment category is inaccessible if you do not select at least one check box.
On the Security tab, define how user operations are restricted. You can provide any combination of privileges and when conditions.
Click + Add privilege to add a new row to the grid.
In the Privilege column, press the Down Arrow key and select the name of a privilege.
Alternatively, you can enter a unique name and click the Magnifying glass icon to create a new privilege.
Select a check box in one or more columns, based on the user operations that are granted by your specified privilege.
For example, select the check box in the Delete own column to allow users to delete attachments that they have created.
Repeat steps a through c for each privilege to consider at run time.
Click + Add when to add a new row to the grid.
In the When column, press the Down Arrow key and select the name of a when condition.
Alternatively, you can enter a unique name and click the Magnifying glass icon to create a new when condition.
Select a check box in one or more columns, based on the user operations that are granted by your specified privilege.
For example, select the check box in the Create column to allow users to add attachments to a case.
Repeat steps a through c for each when condition to consider at run time.
Optional: Select the Enable attachment-level security check box to allow users to list the work groups that can access an individual attachment after it has been added to a case.
Click Save.
At run time, the restricted operation is available when all the specified when conditions return a true value, and the user is associated with a required work group and holds at least one of the required privileges.