Podcast
Questions and Answers
What is the primary function of CyberArk PAM's discover feature?
What is the primary function of CyberArk PAM's discover feature?
What is the purpose of password rotation frequency in CyberArk PAM?
What is the purpose of password rotation frequency in CyberArk PAM?
What is the primary goal of CyberArk PAM's remediate feature?
What is the primary goal of CyberArk PAM's remediate feature?
What is the purpose of policies in CyberArk PAM?
What is the purpose of policies in CyberArk PAM?
Signup and view all the answers
What is the primary function of CyberArk PAM's record feature?
What is the primary function of CyberArk PAM's record feature?
Signup and view all the answers
What is the primary function of CyberArk PAM's monitor feature?
What is the primary function of CyberArk PAM's monitor feature?
Signup and view all the answers
What is the primary purpose of the Vault in the given diagram?
What is the primary purpose of the Vault in the given diagram?
Signup and view all the answers
What is the primary function of the Privileged Session Manager in the context of the Vault?
What is the primary function of the Privileged Session Manager in the context of the Vault?
Signup and view all the answers
What type of encryption model is used in the given diagram?
What type of encryption model is used in the given diagram?
Signup and view all the answers
What is the recommended factor of authentication in the given diagram?
What is the recommended factor of authentication in the given diagram?
Signup and view all the answers
What is the primary benefit of using a Password Vault in the context of the Vault?
What is the primary benefit of using a Password Vault in the context of the Vault?
Signup and view all the answers
What is the primary purpose of Auditing in the given diagram?
What is the primary purpose of Auditing in the given diagram?
Signup and view all the answers
What is the role of the Central Policy Manager in the context of the Vault?
What is the role of the Central Policy Manager in the context of the Vault?
Signup and view all the answers
What is the benefit of using a Hierarchical Encryption Model?
What is the benefit of using a Hierarchical Encryption Model?
Signup and view all the answers
What is the primary risk associated with unmanaged target accounts and servers?
What is the primary risk associated with unmanaged target accounts and servers?
Signup and view all the answers
What is the primary purpose of the firewall in the given diagram?
What is the primary purpose of the firewall in the given diagram?
Signup and view all the answers
What is the primary purpose of the Vault in the context of Privileged Account Management?
What is the primary purpose of the Vault in the context of Privileged Account Management?
Signup and view all the answers
What is the primary benefit of using a Privileged Session Manager in the context of the Vault?
What is the primary benefit of using a Privileged Session Manager in the context of the Vault?
Signup and view all the answers
What is the benefit of using granular permissions in the given diagram?
What is the benefit of using granular permissions in the given diagram?
Signup and view all the answers
What is the primary purpose of the Authentication process in the given diagram?
What is the primary purpose of the Authentication process in the given diagram?
Signup and view all the answers
What task can be performed via the PVWA interface?
What task can be performed via the PVWA interface?
Signup and view all the answers
What type of users can be viewed via the PVWA interface?
What type of users can be viewed via the PVWA interface?
Signup and view all the answers
What can be created manually through the PVWA interface?
What can be created manually through the PVWA interface?
Signup and view all the answers
What action can be taken on a user's password via the PVWA interface?
What action can be taken on a user's password via the PVWA interface?
Signup and view all the answers
What is a feature of the User Management module in the PVWA interface?
What is a feature of the User Management module in the PVWA interface?
Signup and view all the answers
What is a capability of the PVWA interface in terms of user management?
What is a capability of the PVWA interface in terms of user management?
Signup and view all the answers
Where are users stored in PrivateArk Client?
Where are users stored in PrivateArk Client?
Signup and view all the answers
How can users be added to PrivateArk Client?
How can users be added to PrivateArk Client?
Signup and view all the answers
What is the recommended approach to managing users in PrivateArk Client?
What is the recommended approach to managing users in PrivateArk Client?
Signup and view all the answers
What can be configured for a user in PrivateArk Client?
What can be configured for a user in PrivateArk Client?
Signup and view all the answers
What is the purpose of the General Tab in PrivateArk Client?
What is the purpose of the General Tab in PrivateArk Client?
Signup and view all the answers
How can you change the Master user password in PrivateArk Client?
How can you change the Master user password in PrivateArk Client?
Signup and view all the answers
What is the primary distinction between Users and Accounts in the context of User Management?
What is the primary distinction between Users and Accounts in the context of User Management?
Signup and view all the answers
What is the main difference between Internal users and groups and Transparent users and groups?
What is the main difference between Internal users and groups and Transparent users and groups?
Signup and view all the answers
What is the purpose of directory mapping in User Management?
What is the purpose of directory mapping in User Management?
Signup and view all the answers
What can be managed in PrivateArk Client and PVWA?
What can be managed in PrivateArk Client and PVWA?
Signup and view all the answers
What is the primary benefit of using custom directory mapping?
What is the primary benefit of using custom directory mapping?
Signup and view all the answers
What is the main difference between Vault authorizations and Safe authorizations?
What is the main difference between Vault authorizations and Safe authorizations?
Signup and view all the answers
What is the primary role of predefined users and groups in User Management?
What is the primary role of predefined users and groups in User Management?
Signup and view all the answers
What is the main benefit of using Transparent users and groups?
What is the main benefit of using Transparent users and groups?
Signup and view all the answers
What is the significance of the '30' in the platform name 'LIN SSH 30'?
What is the significance of the '30' in the platform name 'LIN SSH 30'?
Signup and view all the answers
What is the purpose of the 'Generate Password' section in the Edit Platform settings?
What is the purpose of the 'Generate Password' section in the Edit Platform settings?
Signup and view all the answers
Why would a Vault administrator deactivate a platform?
Why would a Vault administrator deactivate a platform?
Signup and view all the answers
What is a key characteristic of the platform name 'LIN SSH 30'?
What is a key characteristic of the platform name 'LIN SSH 30'?
Signup and view all the answers
What can be modified in the Edit Platform settings?
What can be modified in the Edit Platform settings?
Signup and view all the answers
What is divided into two broad sections in the Edit Platform settings?
What is divided into two broad sections in the Edit Platform settings?
Signup and view all the answers
What is the primary purpose of plug-ins in Platform Management?
What is the primary purpose of plug-ins in Platform Management?
Signup and view all the answers
What is a key aspect of password policy settings in Platform Management?
What is a key aspect of password policy settings in Platform Management?
Signup and view all the answers
How are platforms organized in Platform Management?
How are platforms organized in Platform Management?
Signup and view all the answers
What is the basis for exceptions to the Master Policy?
What is the basis for exceptions to the Master Policy?
Signup and view all the answers
Why is it necessary to duplicate a platform in Platform Management?
Why is it necessary to duplicate a platform in Platform Management?
Signup and view all the answers
Where are platforms located in the interface?
Where are platforms located in the interface?
Signup and view all the answers
What can be viewed in the Platform Management page?
What can be viewed in the Platform Management page?
Signup and view all the answers
What was discussed in this session?
What was discussed in this session?
Signup and view all the answers
What is the next exercise after completing this session?
What is the next exercise after completing this session?
Signup and view all the answers
What is the purpose of the CyberArk Marketplace?
What is the purpose of the CyberArk Marketplace?
Signup and view all the answers
What can be done in the Platform Management page?
What can be done in the Platform Management page?
Signup and view all the answers
What is the result of configuring key parameters in Platforms?
What is the result of configuring key parameters in Platforms?
Signup and view all the answers
What is the relationship between the Master Policy and Platforms?
What is the relationship between the Master Policy and Platforms?
Signup and view all the answers
What is the purpose of editing the Master Policy?
What is the purpose of editing the Master Policy?
Signup and view all the answers
What is the maximum number of objects recommended to be stored in a Safe?
What is the maximum number of objects recommended to be stored in a Safe?
Signup and view all the answers
What is the principle that should be followed when storing objects in Safes?
What is the principle that should be followed when storing objects in Safes?
Signup and view all the answers
What type of accounts should have separate Safes?
What type of accounts should have separate Safes?
Signup and view all the answers
What is the character limit for safe names?
What is the character limit for safe names?
Signup and view all the answers
What is the recommended approach to managing access control to privileged identities in CyberArk?
What is the recommended approach to managing access control to privileged identities in CyberArk?
Signup and view all the answers
How many characters are double-byte characters limited to?
How many characters are double-byte characters limited to?
Signup and view all the answers
Who can be granted access to a Safe?
Who can be granted access to a Safe?
Signup and view all the answers
What is the purpose of permissions in a Safe?
What is the purpose of permissions in a Safe?
Signup and view all the answers
How are permissions organized in a Safe?
How are permissions organized in a Safe?
Signup and view all the answers
What can be done to a Safe if you have the appropriate permissions?
What can be done to a Safe if you have the appropriate permissions?
Signup and view all the answers
What is a benefit of using granular permissions in a Safe?
What is a benefit of using granular permissions in a Safe?
Signup and view all the answers
What is managed through the permissions assigned to Members of a Safe?
What is managed through the permissions assigned to Members of a Safe?
Signup and view all the answers
What is the maximum number of characters allowed in a safe name?
What is the maximum number of characters allowed in a safe name?
Signup and view all the answers
What is the purpose of the AllowedSafes parameter?
What is the purpose of the AllowedSafes parameter?
Signup and view all the answers
Why is object-level access control not recommended?
Why is object-level access control not recommended?
Signup and view all the answers
What can be used to add members and manage permissions in a safe?
What can be used to add members and manage permissions in a safe?
Signup and view all the answers
What is the benefit of using permission presets?
What is the benefit of using permission presets?
Signup and view all the answers
What can be searched for in the Vault or LDAP using the new wizard?
What can be searched for in the Vault or LDAP using the new wizard?
Signup and view all the answers
What is the purpose of predefined users and groups?
What is the purpose of predefined users and groups?
Signup and view all the answers
What is the significance of the string 'Lin-' in the AllowedSafes parameter?
What is the significance of the string 'Lin-' in the AllowedSafes parameter?
Signup and view all the answers
What is the purpose of the Scan Vault for Account step?
What is the purpose of the Scan Vault for Account step?
Signup and view all the answers
What happens after a successful login using new credentials?
What happens after a successful login using new credentials?
Signup and view all the answers
What is discussed in this session?
What is discussed in this session?
Signup and view all the answers
What is the outcome of the Change Process?
What is the outcome of the Change Process?
Signup and view all the answers
What is the purpose of the Generate Password step?
What is the purpose of the Generate Password step?
Signup and view all the answers
What happens after a successful connection and run of the change password process?
What happens after a successful connection and run of the change password process?
Signup and view all the answers
What is the purpose of the Login using current credentials step?
What is the purpose of the Login using current credentials step?
Signup and view all the answers
What is the outcome of the Login using current credentials step?
What is the outcome of the Login using current credentials step?
Signup and view all the answers
What is the purpose of the Store new credentials step?
What is the purpose of the Store new credentials step?
Signup and view all the answers
What is the purpose of the Change Process diagram?
What is the purpose of the Change Process diagram?
Signup and view all the answers
What is the purpose of using CyberArk PAM to push private keys to application servers?
What is the purpose of using CyberArk PAM to push private keys to application servers?
Signup and view all the answers
What is the benefit of securing Unix accounts with SSH keys?
What is the benefit of securing Unix accounts with SSH keys?
Signup and view all the answers
What is the purpose of the 'Verify you can login with the Private Key' exercise?
What is the purpose of the 'Verify you can login with the Private Key' exercise?
Signup and view all the answers
What is the benefit of using linked accounts in CyberArk PAM?
What is the benefit of using linked accounts in CyberArk PAM?
Signup and view all the answers
What is the purpose of generating a key-pair in SSH key management?
What is the purpose of generating a key-pair in SSH key management?
Signup and view all the answers
What is the benefit of securing Windows Server Local Accounts via a reconcile account?
What is the benefit of securing Windows Server Local Accounts via a reconcile account?
Signup and view all the answers
What is the main benefit of using SSH keys instead of passwords?
What is the main benefit of using SSH keys instead of passwords?
Signup and view all the answers
What is the role of the Central Policy Manager in the context of the Vault?
What is the role of the Central Policy Manager in the context of the Vault?
Signup and view all the answers
What is the primary purpose of storing private keys in the Vault?
What is the primary purpose of storing private keys in the Vault?
Signup and view all the answers
What is the benefit of using unique key-pairs for each target system?
What is the benefit of using unique key-pairs for each target system?
Signup and view all the answers
What happens when a target system is compromised?
What happens when a target system is compromised?
Signup and view all the answers
What is the primary function of the SSH Key Manager?
What is the primary function of the SSH Key Manager?
Signup and view all the answers
What is the purpose of the Central Policy Manager changing key-pairs frequently?
What is the purpose of the Central Policy Manager changing key-pairs frequently?
Signup and view all the answers
What is the benefit of using the SSH Key Manager to authenticate to target systems?
What is the benefit of using the SSH Key Manager to authenticate to target systems?
Signup and view all the answers
What is the main purpose of a Logon account?
What is the main purpose of a Logon account?
Signup and view all the answers
What is a best practice for Root account management?
What is a best practice for Root account management?
Signup and view all the answers
What is the primary purpose of SSH key management?
What is the primary purpose of SSH key management?
Signup and view all the answers
What is the purpose of password reconciliation?
What is the purpose of password reconciliation?
Signup and view all the answers
What is the primary concern of Privileged Access Security?
What is the primary concern of Privileged Access Security?
Signup and view all the answers
What is a key aspect of SSH policy configuration?
What is a key aspect of SSH policy configuration?
Signup and view all the answers
What type of files can the CPM manage application accounts in?
What type of files can the CPM manage application accounts in?
Signup and view all the answers
What happens when the CPM changes the password for a privileged account?
What happens when the CPM changes the password for a privileged account?
Signup and view all the answers
What is required to add a configuration file usage?
What is required to add a configuration file usage?
Signup and view all the answers
What type of file is used by the application to retrieve credentials?
What type of file is used by the application to retrieve credentials?
Signup and view all the answers
What is the purpose of the CPM in relation to the config file?
What is the purpose of the CPM in relation to the config file?
Signup and view all the answers
What is the role of the CPM in managing application accounts?
What is the role of the CPM in managing application accounts?
Signup and view all the answers
What is the purpose of Usages in CyberArk PAM?
What is the purpose of Usages in CyberArk PAM?
Signup and view all the answers
What happens when the password for a target account is changed in CyberArk PAM?
What happens when the password for a target account is changed in CyberArk PAM?
Signup and view all the answers
What is the purpose of Dependent Platforms in CyberArk PAM?
What is the purpose of Dependent Platforms in CyberArk PAM?
Signup and view all the answers
How does the CPM synchronize account passwords in CyberArk PAM?
How does the CPM synchronize account passwords in CyberArk PAM?
Signup and view all the answers
What is an example of a Dependent Platform in CyberArk PAM?
What is an example of a Dependent Platform in CyberArk PAM?
Signup and view all the answers
What is the result of setting SearchForUsages to Yes in CyberArk PAM?
What is the result of setting SearchForUsages to Yes in CyberArk PAM?
Signup and view all the answers
What is the purpose of specifying the section and parameter in the INI config file usage?
What is the purpose of specifying the section and parameter in the INI config file usage?
Signup and view all the answers
What is the benefit of encrypting passwords in configuration files?
What is the benefit of encrypting passwords in configuration files?
Signup and view all the answers
What is the purpose of associating a logon account with the usage?
What is the purpose of associating a logon account with the usage?
Signup and view all the answers
What is the purpose of the Encryption Command parameter?
What is the purpose of the Encryption Command parameter?
Signup and view all the answers
What is the effect of the CPM changing the password for dba01?
What is the effect of the CPM changing the password for dba01?
Signup and view all the answers
What is the purpose of the INI file in the context of the CPM?
What is the purpose of the INI file in the context of the CPM?
Signup and view all the answers
What is required to log onto the remote machine where the usage exists?
What is required to log onto the remote machine where the usage exists?
Signup and view all the answers
What is the benefit of using the CPM to manage passwords?
What is the benefit of using the CPM to manage passwords?
Signup and view all the answers
What is the primary purpose of requiring users to specify a reason for access in Privileged Account Management?
What is the primary purpose of requiring users to specify a reason for access in Privileged Account Management?
Signup and view all the answers
What is the primary role of Safe membership in Dual Control policies?
What is the primary role of Safe membership in Dual Control policies?
Signup and view all the answers
What is the primary benefit of using Dual Control policies in Privileged Account Management?
What is the primary benefit of using Dual Control policies in Privileged Account Management?
Signup and view all the answers
What is the primary purpose of the Privileged Account Request section in a Platform?
What is the primary purpose of the Privileged Account Request section in a Platform?
Signup and view all the answers
Who are the Requesters in the context of Dual Control policies?
Who are the Requesters in the context of Dual Control policies?
Signup and view all the answers
What is the primary benefit of requiring users to specify a reason for access in a Platform?
What is the primary benefit of requiring users to specify a reason for access in a Platform?
Signup and view all the answers
What is the primary function of the multi-level approval process in Dual Control?
What is the primary function of the multi-level approval process in Dual Control?
Signup and view all the answers
What is the purpose of selecting 'All' in the number of confirmers for a request?
What is the purpose of selecting 'All' in the number of confirmers for a request?
Signup and view all the answers
How does the multi-group approval process work?
How does the multi-group approval process work?
Signup and view all the answers
What is the purpose of the IT Directors group in the multi-level approval process?
What is the purpose of the IT Directors group in the multi-level approval process?
Signup and view all the answers
What is the benefit of using a multi-level approval process?
What is the benefit of using a multi-level approval process?
Signup and view all the answers
What is the purpose of enabling direct manager approval?
What is the purpose of enabling direct manager approval?
Signup and view all the answers
What happens to the password when multiple users access it simultaneously?
What happens to the password when multiple users access it simultaneously?
Signup and view all the answers
What is the purpose of the password release mechanism?
What is the purpose of the password release mechanism?
Signup and view all the answers
What is an essential component of the Dual Control workflow?
What is an essential component of the Dual Control workflow?
Signup and view all the answers
What is the benefit of using Exclusive Passwords in Privileged Account Management?
What is the benefit of using Exclusive Passwords in Privileged Account Management?
Signup and view all the answers
What is the primary goal of the One-time Passwords workflow?
What is the primary goal of the One-time Passwords workflow?
Signup and view all the answers
What is the purpose of the Minimum validity period in password management?
What is the purpose of the Minimum validity period in password management?
Signup and view all the answers
What is a key aspect of the Dual Control policy?
What is a key aspect of the Dual Control policy?
Signup and view all the answers
What is the primary benefit of using Safe Membership Configuration in Privileged Account Management?
What is the primary benefit of using Safe Membership Configuration in Privileged Account Management?
Signup and view all the answers
What is the primary purpose of the Accounts Discovery and Onboarding Rules feature?
What is the primary purpose of the Accounts Discovery and Onboarding Rules feature?
Signup and view all the answers
What method can be used to add multiple accounts at once?
What method can be used to add multiple accounts at once?
Signup and view all the answers
How can scripts and applications interact with the Vault?
How can scripts and applications interact with the Vault?
Signup and view all the answers
What is the purpose of Continuous Accounts Discovery?
What is the purpose of Continuous Accounts Discovery?
Signup and view all the answers
What is the primary purpose of the Discovery and Audit (DNA) feature?
What is the primary purpose of the Discovery and Audit (DNA) feature?
Signup and view all the answers
What is the primary benefit of integrating with the Vault using the Rest API?
What is the primary benefit of integrating with the Vault using the Rest API?
Signup and view all the answers
What is the primary benefit of using Accounts Discovery with Automatic Onboarding Rules?
What is the primary benefit of using Accounts Discovery with Automatic Onboarding Rules?
Signup and view all the answers
What is the purpose of Continuous Accounts Discovery?
What is the purpose of Continuous Accounts Discovery?
Signup and view all the answers
What is an advantage of adding multiple accounts from a file?
What is an advantage of adding multiple accounts from a file?
Signup and view all the answers
What is the purpose of the REST API integration in PAM Administration?
What is the purpose of the REST API integration in PAM Administration?
Signup and view all the answers
Which onboarding method is preferred when dealing with a large number of accounts?
Which onboarding method is preferred when dealing with a large number of accounts?
Signup and view all the answers
What is the benefit of using Accounts Discovery with Automatic Onboarding Rules?
What is the benefit of using Accounts Discovery with Automatic Onboarding Rules?
Signup and view all the answers
What is the primary purpose of the Discovery and Audit (DNA) method?
What is the primary purpose of the Discovery and Audit (DNA) method?
Signup and view all the answers
What is the benefit of using Continuous Accounts Discovery?
What is the benefit of using Continuous Accounts Discovery?
Signup and view all the answers
What is the main purpose of the Add Account method in onboarding accounts?
What is the main purpose of the Add Account method in onboarding accounts?
Signup and view all the answers
Which method is used to upload discovered accounts to the Pending Safe?
Which method is used to upload discovered accounts to the Pending Safe?
Signup and view all the answers
What is the purpose of the Add Discovered Accounts method?
What is the purpose of the Add Discovered Accounts method?
Signup and view all the answers
How many main REST methods are relevant for the process of onboarding accounts?
How many main REST methods are relevant for the process of onboarding accounts?
Signup and view all the answers
What is the purpose of automatic onboarding rules in the Add Discovered Accounts method?
What is the purpose of automatic onboarding rules in the Add Discovered Accounts method?
Signup and view all the answers
What are the three main REST methods relevant for onboarding accounts?
What are the three main REST methods relevant for onboarding accounts?
Signup and view all the answers
What is the purpose of RDP over SSL in the PSM flow?
What is the purpose of RDP over SSL in the PSM flow?
Signup and view all the answers
How does the Privileged Session Manager enhance privileged access control?
How does the Privileged Session Manager enhance privileged access control?
Signup and view all the answers
What is the purpose of fetching credentials from the Vault?
What is the purpose of fetching credentials from the Vault?
Signup and view all the answers
What is the benefit of integrating with SIEM and PTA?
What is the benefit of integrating with SIEM and PTA?
Signup and view all the answers
What is the purpose of the Vault in the PSM flow?
What is the purpose of the Vault in the PSM flow?
Signup and view all the answers
What is the purpose of logging and auditing in the PSM flow?
What is the purpose of logging and auditing in the PSM flow?
Signup and view all the answers
What is the primary benefit of using PSM in the given diagram?
What is the primary benefit of using PSM in the given diagram?
Signup and view all the answers
What is the purpose of the Vault in the given diagram?
What is the purpose of the Vault in the given diagram?
Signup and view all the answers
What happens to logs in the given diagram?
What happens to logs in the given diagram?
Signup and view all the answers
What is the primary purpose of using RDP over SSL in the given diagram?
What is the primary purpose of using RDP over SSL in the given diagram?
Signup and view all the answers
What is the benefit of using PSM with the Vault?
What is the benefit of using PSM with the Vault?
Signup and view all the answers
What is the primary benefit of integrating with SIEM/PTA in the given diagram?
What is the primary benefit of integrating with SIEM/PTA in the given diagram?
Signup and view all the answers
What is the primary purpose of the PSM for SSH?
What is the primary purpose of the PSM for SSH?
Signup and view all the answers
What happens after the user opens an SSH session to the PSM server?
What happens after the user opens an SSH session to the PSM server?
Signup and view all the answers
What is the purpose of the Vault in the given diagram?
What is the purpose of the Vault in the given diagram?
Signup and view all the answers
What is the benefit of using PSM for SSH?
What is the benefit of using PSM for SSH?
Signup and view all the answers
What is the purpose of logging in the given diagram?
What is the purpose of logging in the given diagram?
Signup and view all the answers
What is the role of PSM in the given diagram?
What is the role of PSM in the given diagram?
Signup and view all the answers
What is the benefit of integrating PSM with SIEM and PTA?
What is the benefit of integrating PSM with SIEM and PTA?
Signup and view all the answers
What is the primary purpose of the PSM connection?
What is the primary purpose of the PSM connection?
Signup and view all the answers
What can be viewed using the PSM for SSH?
What can be viewed using the PSM for SSH?
Signup and view all the answers
What action can the PSM take when notified by PTA or a third-party threat analytics tool?
What action can the PSM take when notified by PTA or a third-party threat analytics tool?
Signup and view all the answers
What can authorized users do with active sessions using the PSM?
What can authorized users do with active sessions using the PSM?
Signup and view all the answers
What protocol is being used for remote desktop connection in the given diagram?
What protocol is being used for remote desktop connection in the given diagram?
Signup and view all the answers
What is the purpose of the PSM in the given diagram?
What is the purpose of the PSM in the given diagram?
Signup and view all the answers
What is the purpose of the PVWA interface in the given diagram?
What is the purpose of the PVWA interface in the given diagram?
Signup and view all the answers
What is the unit of measurement for the average bit rate of recorded sessions?
What is the unit of measurement for the average bit rate of recorded sessions?
Signup and view all the answers
What is the formula to calculate the required storage on the PSM Server?
What is the formula to calculate the required storage on the PSM Server?
Signup and view all the answers
What is the average length of a recorded session used in the example calculation?
What is the average length of a recorded session used in the example calculation?
Signup and view all the answers
What is the required storage on the Vault Server calculated based on?
What is the required storage on the Vault Server calculated based on?
Signup and view all the answers
What is the purpose of the calculation for the required storage on the PSM Server?
What is the purpose of the calculation for the required storage on the PSM Server?
Signup and view all the answers
What is the result of the calculation for the required storage on the Vault Server?
What is the result of the calculation for the required storage on the Vault Server?
Signup and view all the answers
Where can PSM video and text recordings be stored?
Where can PSM video and text recordings be stored?
Signup and view all the answers
What is the purpose of monitoring privileged session recordings?
What is the purpose of monitoring privileged session recordings?
Signup and view all the answers
What is the primary benefit of using the Vault for storage?
What is the primary benefit of using the Vault for storage?
Signup and view all the answers
What can be monitored using the PSM?
What can be monitored using the PSM?
Signup and view all the answers
What is the primary function of the PSM in the context of the Vault?
What is the primary function of the PSM in the context of the Vault?
Signup and view all the answers
What is the primary benefit of using the PSM for SSH?
What is the primary benefit of using the PSM for SSH?
Signup and view all the answers
What can be managed using the PSM?
What can be managed using the PSM?
Signup and view all the answers
What is the primary purpose of privileged session management?
What is the primary purpose of privileged session management?
Signup and view all the answers
What is the primary function of the CyberArk Privileged Threat Analytics?
What is the primary function of the CyberArk Privileged Threat Analytics?
Signup and view all the answers
What is the benefit of using CyberArk Privileged Threat Analytics?
What is the benefit of using CyberArk Privileged Threat Analytics?
Signup and view all the answers
What type of data does CyberArk Privileged Threat Analytics collect?
What type of data does CyberArk Privileged Threat Analytics collect?
Signup and view all the answers
What is the purpose of the ALERT feature in CyberArk Privileged Threat Analytics?
What is the purpose of the ALERT feature in CyberArk Privileged Threat Analytics?
Signup and view all the answers
What is the primary goal of CyberArk Privileged Threat Analytics?
What is the primary goal of CyberArk Privileged Threat Analytics?
Signup and view all the answers
What is the significance of real-time analytics in CyberArk Privileged Threat Analytics?
What is the significance of real-time analytics in CyberArk Privileged Threat Analytics?
Signup and view all the answers
What is the primary purpose of modifying and adding rules for suspicious session activities in CyberArk?
What is the primary purpose of modifying and adding rules for suspicious session activities in CyberArk?
Signup and view all the answers
What is the function of the Category field in defining a rule in CyberArk?
What is the function of the Category field in defining a rule in CyberArk?
Signup and view all the answers
What is the role of the Security Team in the Session Analysis and Response Life Cycle?
What is the role of the Security Team in the Session Analysis and Response Life Cycle?
Signup and view all the answers
What is the purpose of the demos featured in the 'Demos' section?
What is the purpose of the demos featured in the 'Demos' section?
Signup and view all the answers
What is the primary benefit of using a customized set of rules for suspicious session activities in CyberArk?
What is the primary benefit of using a customized set of rules for suspicious session activities in CyberArk?
Signup and view all the answers
What is the primary objective of Privileged Threat Analytics (PTA)?
What is the primary objective of Privileged Threat Analytics (PTA)?
Signup and view all the answers
What is the purpose of the Threat Score in defining a rule in CyberArk?
What is the purpose of the Threat Score in defining a rule in CyberArk?
Signup and view all the answers
What type of data sources are used by Privileged Threat Analytics (PTA)?
What type of data sources are used by Privileged Threat Analytics (PTA)?
Signup and view all the answers
What is the primary benefit of configuring automatic responses in PTA?
What is the primary benefit of configuring automatic responses in PTA?
Signup and view all the answers
What is the primary goal of session analysis in PTA?
What is the primary goal of session analysis in PTA?
Signup and view all the answers
What is the primary risk associated with unmanaged target accounts and servers?
What is the primary risk associated with unmanaged target accounts and servers?
Signup and view all the answers
What is the primary benefit of using real-time analytics in PTA?
What is the primary benefit of using real-time analytics in PTA?
Signup and view all the answers
What is the primary purpose of threat profiling in PTA?
What is the primary purpose of threat profiling in PTA?
Signup and view all the answers
What is the primary benefit of integrating PTA with Active Directory Security?
What is the primary benefit of integrating PTA with Active Directory Security?
Signup and view all the answers
What is the primary purpose of the Privileged Accounts Inventory Report?
What is the primary purpose of the Privileged Accounts Inventory Report?
Signup and view all the answers
What is the main difference between Operational reports and Audit/Compliance reports?
What is the main difference between Operational reports and Audit/Compliance reports?
Signup and view all the answers
What can be done with finished reports?
What can be done with finished reports?
Signup and view all the answers
What is the purpose of the Refresh button in report status?
What is the purpose of the Refresh button in report status?
Signup and view all the answers
What information is provided by the Applications Inventory Report?
What information is provided by the Applications Inventory Report?
Signup and view all the answers
What is the benefit of adding subscribers to a report?
What is the benefit of adding subscribers to a report?
Signup and view all the answers
What type of report is an Entitlement Report categorized as?
What type of report is an Entitlement Report categorized as?
Signup and view all the answers
Which type of report provides information about Privileged Accounts?
Which type of report provides information about Privileged Accounts?
Signup and view all the answers
What is the main focus of the Compliance Status report?
What is the main focus of the Compliance Status report?
Signup and view all the answers
Which report provides a record of all activities performed in the system?
Which report provides a record of all activities performed in the system?
Signup and view all the answers
Which type of report would be of interest to Vault Admins?
Which type of report would be of interest to Vault Admins?
Signup and view all the answers
What is the main focus of the Applications Inventory report?
What is the main focus of the Applications Inventory report?
Signup and view all the answers
What type of report can be generated using the EVD Utility?
What type of report can be generated using the EVD Utility?
Signup and view all the answers
What is required to run different reports in PrivateArk Client?
What is required to run different reports in PrivateArk Client?
Signup and view all the answers
What type of report provides a list of all users in the system?
What type of report provides a list of all users in the system?
Signup and view all the answers
Which application can be used to generate various reports, including the Privileged Accounts Inventory report?
Which application can be used to generate various reports, including the Privileged Accounts Inventory report?
Signup and view all the answers
What type of report provides information on the compliance status of privileged accounts?
What type of report provides information on the compliance status of privileged accounts?
Signup and view all the answers
What is the primary purpose of generating reports using the PVWA and PrivateArk Client?
What is the primary purpose of generating reports using the PVWA and PrivateArk Client?
Signup and view all the answers
What type of report provides a list of all safes in the system?
What type of report provides a list of all safes in the system?
Signup and view all the answers
What is the primary benefit of generating reports using the PVWA and PrivateArk Client?
What is the primary benefit of generating reports using the PVWA and PrivateArk Client?
Signup and view all the answers
What is the primary deployment model of PAM Self-Hosted?
What is the primary deployment model of PAM Self-Hosted?
Signup and view all the answers
What is a key benefit of PAM Self-Hosted?
What is a key benefit of PAM Self-Hosted?
Signup and view all the answers
What is the primary concern for scalability planning in PAM Self-Hosted?
What is the primary concern for scalability planning in PAM Self-Hosted?
Signup and view all the answers
What is a key infrastructure requirement for PAM Self-Hosted?
What is a key infrastructure requirement for PAM Self-Hosted?
Signup and view all the answers
What is a primary security consideration for PAM Self-Hosted?
What is a primary security consideration for PAM Self-Hosted?
Signup and view all the answers
What is a key benefit of PAM Self-Hosted in terms of high availability?
What is a key benefit of PAM Self-Hosted in terms of high availability?
Signup and view all the answers
What is the primary purpose of the Vault in the provided architecture?
What is the primary purpose of the Vault in the provided architecture?
Signup and view all the answers
What is the benefit of deploying the Vault in a High Availability (HA) cluster configuration?
What is the benefit of deploying the Vault in a High Availability (HA) cluster configuration?
Signup and view all the answers
What is the role of the Central Policy Manager (CPM) in the provided architecture?
What is the role of the Central Policy Manager (CPM) in the provided architecture?
Signup and view all the answers
What is the primary consideration when deploying the CyberArk architecture in a distributed environment?
What is the primary consideration when deploying the CyberArk architecture in a distributed environment?
Signup and view all the answers
What is the primary benefit of using a hierarchical encryption model in the CyberArk architecture?
What is the primary benefit of using a hierarchical encryption model in the CyberArk architecture?
Signup and view all the answers
What is the primary reason for implementing a disaster recovery (DR) site in the provided architecture?
What is the primary reason for implementing a disaster recovery (DR) site in the provided architecture?
Signup and view all the answers
What is the primary function of the Central Policy Manager?
What is the primary function of the Central Policy Manager?
Signup and view all the answers
What is the purpose of the Privileged Session Manager?
What is the purpose of the Privileged Session Manager?
Signup and view all the answers
What is the primary benefit of using a Password Vault?
What is the primary benefit of using a Password Vault?
Signup and view all the answers
What is the function of the Secure Digital Vault?
What is the function of the Secure Digital Vault?
Signup and view all the answers
What is the role of the Privilege Threat Analytics?
What is the role of the Privilege Threat Analytics?
Signup and view all the answers
What is the purpose of the Password Vault Web Access?
What is the purpose of the Password Vault Web Access?
Signup and view all the answers
What is the primary function of the Central Policy Manager in the context of the Vault?
What is the primary function of the Central Policy Manager in the context of the Vault?
Signup and view all the answers
What is the primary benefit of using a Privileged Session Manager in the context of the Vault?
What is the primary benefit of using a Privileged Session Manager in the context of the Vault?
Signup and view all the answers
Where are the Safes in the Vault stored?
Where are the Safes in the Vault stored?
Signup and view all the answers
What is the purpose of the Credential File in the Replicator utility?
What is the purpose of the Credential File in the Replicator utility?
Signup and view all the answers
What is essential to back up regularly in the Vault?
What is essential to back up regularly in the Vault?
Signup and view all the answers
What is the command used to launch a backup at a command line?
What is the command used to launch a backup at a command line?
Signup and view all the answers
What is a requirement for integrating with an Enterprise Backup Solution?
What is a requirement for integrating with an Enterprise Backup Solution?
Signup and view all the answers
What is the purpose of the Vault.ini file?
What is the purpose of the Vault.ini file?
Signup and view all the answers
What can be backed up and restored in the Vault?
What can be backed up and restored in the Vault?
Signup and view all the answers
Where are database files stored in the Vault?
Where are database files stored in the Vault?
Signup and view all the answers
What is the purpose of enabling the Backup user?
What is the purpose of enabling the Backup user?
Signup and view all the answers
What is the purpose of setting a password on the Primary Vault?
What is the purpose of setting a password on the Primary Vault?
Signup and view all the answers
What is the name of the solution that replicates data?
What is the name of the solution that replicates data?
Signup and view all the answers
What is the purpose of the Replicator module?
What is the purpose of the Replicator module?
Signup and view all the answers
What is a key requirement for the backup server when using the Replicate Utility?
What is a key requirement for the backup server when using the Replicate Utility?
Signup and view all the answers
What is the recommended approach to backing up the Vault using the Replicate Utility?
What is the recommended approach to backing up the Vault using the Replicate Utility?
Signup and view all the answers
Why is the Indirect Backup method recommended over the Direct Backup method?
Why is the Indirect Backup method recommended over the Direct Backup method?
Signup and view all the answers
What is a necessary feature of the backup server when using the Replicate Utility?
What is a necessary feature of the backup server when using the Replicate Utility?
Signup and view all the answers
What is a key benefit of using the Replicate Utility for backup and restore?
What is a key benefit of using the Replicate Utility for backup and restore?
Signup and view all the answers
What is a key consideration when installing the Replicate Utility on a separate server?
What is a key consideration when installing the Replicate Utility on a separate server?
Signup and view all the answers
What is the role of the Replicate Utility in the backup and restore process?
What is the role of the Replicate Utility in the backup and restore process?
Signup and view all the answers
What is a necessary step before installing the Replicate Utility?
What is a necessary step before installing the Replicate Utility?
Signup and view all the answers
What is the recommended approach to avoid data loss during replication?
What is the recommended approach to avoid data loss during replication?
Signup and view all the answers
What is the purpose of using a DNS Alias for the Vaults?
What is the purpose of using a DNS Alias for the Vaults?
Signup and view all the answers
What is the primary goal of automatic failover in PVWA setup?
What is the primary goal of automatic failover in PVWA setup?
Signup and view all the answers
What is the risk associated with not saving audit data during replication?
What is the risk associated with not saving audit data during replication?
Signup and view all the answers
What is the purpose of using a Disaster Recovery Environment?
What is the purpose of using a Disaster Recovery Environment?
Signup and view all the answers
What is the primary benefit of using a Primary Vault Synchronization?
What is the primary benefit of using a Primary Vault Synchronization?
Signup and view all the answers
What is the purpose of the CheckInterval parameter in automatic failover?
What is the purpose of the CheckInterval parameter in automatic failover?
Signup and view all the answers
What happens when the DR Vault is unable to contact the Primary Vault after the retry attempts?
What happens when the DR Vault is unable to contact the Primary Vault after the retry attempts?
Signup and view all the answers
What is the purpose of setting EnableFailover to No in manual failover?
What is the purpose of setting EnableFailover to No in manual failover?
Signup and view all the answers
What is required to perform a manual failover?
What is required to perform a manual failover?
Signup and view all the answers
What is the sequence of events in the failover process?
What is the sequence of events in the failover process?
Signup and view all the answers
What is the purpose of EnableDbsync in manual failover?
What is the purpose of EnableDbsync in manual failover?
Signup and view all the answers
What is the default setting for EnableDbsync in manual failover?
What is the default setting for EnableDbsync in manual failover?
Signup and view all the answers
What happens when the DR service is restarted with ActivateManualFailover set to Yes?
What happens when the DR service is restarted with ActivateManualFailover set to Yes?
Signup and view all the answers
What occurs when a failover takes place in the Disaster Recovery Environment?
What occurs when a failover takes place in the Disaster Recovery Environment?
Signup and view all the answers
What is the default setting for the EnableDbsync parameter in the padr.ini file?
What is the default setting for the EnableDbsync parameter in the padr.ini file?
Signup and view all the answers
What determines the length of time between synchronizations of the Vault file system?
What determines the length of time between synchronizations of the Vault file system?
Signup and view all the answers
What is the primary purpose of the DR service in the Disaster Recovery Environment?
What is the primary purpose of the DR service in the Disaster Recovery Environment?
Signup and view all the answers
What is the default time interval for synchronizing the Vault file system?
What is the default time interval for synchronizing the Vault file system?
Signup and view all the answers
What is the purpose of the Primary Vault in the Disaster Recovery Environment?
What is the purpose of the Primary Vault in the Disaster Recovery Environment?
Signup and view all the answers
What is the primary function of the Server Key in the CyberArk PAM solution?
What is the primary function of the Server Key in the CyberArk PAM solution?
Signup and view all the answers
What type of encryption is used to protect the keys in the Vault?
What type of encryption is used to protect the keys in the Vault?
Signup and view all the answers
What is the purpose of the Recovery Private Key in the CyberArk PAM solution?
What is the purpose of the Recovery Private Key in the CyberArk PAM solution?
Signup and view all the answers
How are vault objects encrypted in the CyberArk PAM solution?
How are vault objects encrypted in the CyberArk PAM solution?
Signup and view all the answers
What is the purpose of encrypting the key in the Vault?
What is the purpose of encrypting the key in the Vault?
Signup and view all the answers
What is the primary function of the Recovery Public Key in the CyberArk PAM solution?
What is the primary function of the Recovery Public Key in the CyberArk PAM solution?
Signup and view all the answers
What is the purpose of the three files that form the cornerstone of the CyberArk PAM solution encryption methodology?
What is the purpose of the three files that form the cornerstone of the CyberArk PAM solution encryption methodology?
Signup and view all the answers
What is the benefit of using a secure platform in the Vault?
What is the benefit of using a secure platform in the Vault?
Signup and view all the answers
What is the purpose of access control in the Vault?
What is the purpose of access control in the Vault?
Signup and view all the answers
What is the benefit of using digital vault configuration?
What is the benefit of using digital vault configuration?
Signup and view all the answers
What is the purpose of encryption in the Vault?
What is the purpose of encryption in the Vault?
Signup and view all the answers
What is the benefit of using granular permissions in the Vault?
What is the benefit of using granular permissions in the Vault?
Signup and view all the answers
What is the purpose of the Vault's security controls?
What is the purpose of the Vault's security controls?
Signup and view all the answers
What is the benefit of using a hierarchical encryption model?
What is the benefit of using a hierarchical encryption model?
Signup and view all the answers
What is the purpose of the firewall in the Vault's security architecture?
What is the purpose of the firewall in the Vault's security architecture?
Signup and view all the answers
What is the benefit of using a Hierarchical Encryption Model in the Vault?
What is the benefit of using a Hierarchical Encryption Model in the Vault?
Signup and view all the answers
What is the primary purpose of Access Control in the Vault?
What is the primary purpose of Access Control in the Vault?
Signup and view all the answers
What is the role of the Proprietary Protocol in the Vault's security architecture?
What is the role of the Proprietary Protocol in the Vault's security architecture?
Signup and view all the answers
What is the primary benefit of using Granular Permissions in the Vault?
What is the primary benefit of using Granular Permissions in the Vault?
Signup and view all the answers
What is the purpose of Auditing in the Vault's security architecture?
What is the purpose of Auditing in the Vault's security architecture?
Signup and view all the answers
What is the primary function of the Firewall in the given diagram?
What is the primary function of the Firewall in the given diagram?
Signup and view all the answers
What type of encryption model is used in the Hierarchical Encryption Model?
What type of encryption model is used in the Hierarchical Encryption Model?
Signup and view all the answers
What is the primary benefit of using Granular Permissions in the Vault?
What is the primary benefit of using Granular Permissions in the Vault?
Signup and view all the answers
What is the primary purpose of Auditing in the given diagram?
What is the primary purpose of Auditing in the given diagram?
Signup and view all the answers
What is the recommended factor of authentication in the given diagram?
What is the recommended factor of authentication in the given diagram?
Signup and view all the answers
What is the primary purpose of the Proprietary Protocol in the Vault?
What is the primary purpose of the Proprietary Protocol in the Vault?
Signup and view all the answers
What is the purpose of the Server Key in CyberArk PAM?
What is the purpose of the Server Key in CyberArk PAM?
Signup and view all the answers
What type of encryption is used in the Vault Object Encryption mechanism?
What type of encryption is used in the Vault Object Encryption mechanism?
Signup and view all the answers
What is the role of the Recovery Public Key in CyberArk PAM?
What is the role of the Recovery Public Key in CyberArk PAM?
Signup and view all the answers
What is the purpose of the Recovery Private Key in CyberArk PAM?
What is the purpose of the Recovery Private Key in CyberArk PAM?
Signup and view all the answers
What are the three files required to install and operate CyberArk PAM?
What are the three files required to install and operate CyberArk PAM?
Signup and view all the answers
What is the primary purpose of the encryption methodology in CyberArk PAM?
What is the primary purpose of the encryption methodology in CyberArk PAM?
Signup and view all the answers
What is the primary goal of security controls protecting the Vault and encryption keys?
What is the primary goal of security controls protecting the Vault and encryption keys?
Signup and view all the answers
What is the primary benefit of using a hierarchical encryption model in the Vault?
What is the primary benefit of using a hierarchical encryption model in the Vault?
Signup and view all the answers
What is the role of permissions in the Vault's access control layer?
What is the role of permissions in the Vault's access control layer?
Signup and view all the answers
What is the primary purpose of encrypting the key with a 3rd-party tool in the Vault?
What is the primary purpose of encrypting the key with a 3rd-party tool in the Vault?
Signup and view all the answers
What is the primary risk associated with unmanaged target accounts and servers in the Vault?
What is the primary risk associated with unmanaged target accounts and servers in the Vault?
Signup and view all the answers
What is the primary benefit of using granular permissions in the Vault's access control layer?
What is the primary benefit of using granular permissions in the Vault's access control layer?
Signup and view all the answers
What is the primary purpose of the Vault in the context of Privileged Account Management?
What is the primary purpose of the Vault in the context of Privileged Account Management?
Signup and view all the answers
What is the primary goal of encryption mechanisms in the Vault?
What is the primary goal of encryption mechanisms in the Vault?
Signup and view all the answers
What are the methods used to monitor system health?
What are the methods used to monitor system health?
Signup and view all the answers
What administrative task is related to system maintenance?
What administrative task is related to system maintenance?
Signup and view all the answers
What is monitored in terms of replication and DR status?
What is monitored in terms of replication and DR status?
Signup and view all the answers
What is the primary goal of monitoring system health?
What is the primary goal of monitoring system health?
Signup and view all the answers
What are the different ways to monitor components?
What are the different ways to monitor components?
Signup and view all the answers
What is the benefit of monitoring system health?
What is the benefit of monitoring system health?
Signup and view all the answers
What is the purpose of the Remote Control Agent?
What is the purpose of the Remote Control Agent?
Signup and view all the answers
What information can be received through the Remote Monitoring feature?
What information can be received through the Remote Monitoring feature?
Signup and view all the answers
What is required to be installed on the same computer as the Remote Control Agent?
What is required to be installed on the same computer as the Remote Control Agent?
Signup and view all the answers
What is the purpose of the MIB files provided by CyberArk?
What is the purpose of the MIB files provided by CyberArk?
Signup and view all the answers
What is the function of the Remote Control feature in the Vault?
What is the function of the Remote Control feature in the Vault?
Signup and view all the answers
What is the benefit of using the Remote Monitoring feature?
What is the benefit of using the Remote Monitoring feature?
Signup and view all the answers
What is the ID of the email template that can be customized for component monitoring?
What is the ID of the email template that can be customized for component monitoring?
Signup and view all the answers
Where can you configure the monitoring interval for a component?
Where can you configure the monitoring interval for a component?
Signup and view all the answers
What is the purpose of the ComponentMonitoringInterval parameter?
What is the purpose of the ComponentMonitoringInterval parameter?
Signup and view all the answers
What determines the actions taken when a component is disconnected?
What determines the actions taken when a component is disconnected?
Signup and view all the answers
What is the result of enabling email notifications for a component?
What is the result of enabling email notifications for a component?
Signup and view all the answers
What is used to monitor components via SNMP?
What is used to monitor components via SNMP?
Signup and view all the answers
Where can you enable monitoring of a specific CyberArk component user account?
Where can you enable monitoring of a specific CyberArk component user account?
Signup and view all the answers
What is the purpose of the General tab in the PrivateArk Client?
What is the purpose of the General tab in the PrivateArk Client?
Signup and view all the answers
What is the purpose of creating a shadow user?
What is the purpose of creating a shadow user?
Signup and view all the answers
What is the primary function of AppLocker in PSM?
What is the primary function of AppLocker in PSM?
Signup and view all the answers
What should you do to isolate problems related to shadow users?
What should you do to isolate problems related to shadow users?
Signup and view all the answers
How do you disable AppLocker entirely?
How do you disable AppLocker entirely?
Signup and view all the answers
What is the recommended approach when adding a new component in PSM?
What is the recommended approach when adding a new component in PSM?
Signup and view all the answers
What should you do to the PSMConfigureApplocker.ps1 script?
What should you do to the PSMConfigureApplocker.ps1 script?
Signup and view all the answers
What happens to a user who fails to log in 5 times?
What happens to a user who fails to log in 5 times?
Signup and view all the answers
How can a user be unsuspended after being locked out?
How can a user be unsuspended after being locked out?
Signup and view all the answers
What is the purpose of the UserLockoutPeriodInMinutes parameter?
What is the purpose of the UserLockoutPeriodInMinutes parameter?
Signup and view all the answers
Why did the user's login attempt fail?
Why did the user's login attempt fail?
Signup and view all the answers
What can the Vault administrator see in the ITAlog?
What can the Vault administrator see in the ITAlog?
Signup and view all the answers
What happens when a user's account is suspended?
What happens when a user's account is suspended?
Signup and view all the answers
Who can see the ITAlog?
Who can see the ITAlog?
Signup and view all the answers
What is the result of a user's failed login attempt?
What is the result of a user's failed login attempt?
Signup and view all the answers
Where is the CreateCredFile.exe command located?
Where is the CreateCredFile.exe command located?
Signup and view all the answers
What can cause interference with the CPM?
What can cause interference with the CPM?
Signup and view all the answers
What is the purpose of the VaultPermissionsValidation.sh script?
What is the purpose of the VaultPermissionsValidation.sh script?
Signup and view all the answers
What is the command to run to resynch the credentials for the PTA Vault users?
What is the command to run to resynch the credentials for the PTA Vault users?
Signup and view all the answers
What is the alias to navigate to the utility folder on the PTA server?
What is the alias to navigate to the utility folder on the PTA server?
Signup and view all the answers
What can be done to resolve PTA connectivity issues?
What can be done to resolve PTA connectivity issues?
Signup and view all the answers
What is the primary reason for disabling Network Level Authentication (NLA) in a PSM-RDP connection?
What is the primary reason for disabling Network Level Authentication (NLA) in a PSM-RDP connection?
Signup and view all the answers
How can you manually test the PSMConnect user in a PSM-RDP connection?
How can you manually test the PSMConnect user in a PSM-RDP connection?
Signup and view all the answers
Where can you disable Network Level Authentication (NLA) in a Target Windows Account?
Where can you disable Network Level Authentication (NLA) in a Target Windows Account?
Signup and view all the answers
What is the recommended approach to resolve issues with overloaded environments in a PSM connection?
What is the recommended approach to resolve issues with overloaded environments in a PSM connection?
Signup and view all the answers
What is the primary purpose of checking the PSM Protocol version in a PSM connection?
What is the primary purpose of checking the PSM Protocol version in a PSM connection?
Signup and view all the answers
Why is it recommended to compare safe permissions with other safes in a PSM connection?
Why is it recommended to compare safe permissions with other safes in a PSM connection?
Signup and view all the answers
What is the purpose of shadow users in PSM?
What is the purpose of shadow users in PSM?
Signup and view all the answers
What is the recommended approach to troubleshoot issues with PSM-RDP connections?
What is the recommended approach to troubleshoot issues with PSM-RDP connections?
Signup and view all the answers
How can AppLocker be adjusted to allow a new component to run on the PSM machine?
How can AppLocker be adjusted to allow a new component to run on the PSM machine?
Signup and view all the answers
What is the purpose of the AppLocker feature in Windows?
What is the purpose of the AppLocker feature in Windows?
Signup and view all the answers
What is the result of deleting a shadow user on the PSM machine?
What is the result of deleting a shadow user on the PSM machine?
Signup and view all the answers
How can AppLocker be disabled on the PSM machine?
How can AppLocker be disabled on the PSM machine?
Signup and view all the answers
What is the purpose of running the component manually as the shadow user?
What is the purpose of running the component manually as the shadow user?
Signup and view all the answers
Why would you adjust AppLocker rules on the PSM machine?
Why would you adjust AppLocker rules on the PSM machine?
Signup and view all the answers
When troubleshooting Target Windows Accounts, what command can be used to verify the connection?
When troubleshooting Target Windows Accounts, what command can be used to verify the connection?
Signup and view all the answers
In PSM-RDP Connection troubleshooting, what is an important aspect to consider?
In PSM-RDP Connection troubleshooting, what is an important aspect to consider?
Signup and view all the answers
What can be checked in the Local Security Settings when troubleshooting Target Windows Accounts?
What can be checked in the Local Security Settings when troubleshooting Target Windows Accounts?
Signup and view all the answers
What is a suggested troubleshooting step for Target Unix Accounts?
What is a suggested troubleshooting step for Target Unix Accounts?
Signup and view all the answers
What is a common issue related to PSM?
What is a common issue related to PSM?
Signup and view all the answers
When troubleshooting Target Windows Accounts, what can be added to the CPM server?
When troubleshooting Target Windows Accounts, what can be added to the CPM server?
Signup and view all the answers
What is the primary requirement for the basic troubleshooting methodology in the CyberArk environment?
What is the primary requirement for the basic troubleshooting methodology in the CyberArk environment?
Signup and view all the answers
What is the recommended practice when troubleshooting issues in the CyberArk environment?
What is the recommended practice when troubleshooting issues in the CyberArk environment?
Signup and view all the answers
What is the purpose of managing log files in the CyberArk environment?
What is the purpose of managing log files in the CyberArk environment?
Signup and view all the answers
What is the xRay agent used for in the CyberArk environment?
What is the xRay agent used for in the CyberArk environment?
Signup and view all the answers
What is the primary goal of the troubleshooting methodology in the CyberArk environment?
What is the primary goal of the troubleshooting methodology in the CyberArk environment?
Signup and view all the answers
What is the importance of understanding the system implementation in the CyberArk environment?
What is the importance of understanding the system implementation in the CyberArk environment?
Signup and view all the answers
Where are CPM exceptions written to by default?
Where are CPM exceptions written to by default?
Signup and view all the answers
Where can you configure the Debug Level for CPM troubleshooting?
Where can you configure the Debug Level for CPM troubleshooting?
Signup and view all the answers
What file would you check for CPM CASOS errors?
What file would you check for CPM CASOS errors?
Signup and view all the answers
Where can you configure the logging level for PVWA troubleshooting?
Where can you configure the logging level for PVWA troubleshooting?
Signup and view all the answers
What type of log files are stored in the \Program Files\CyberArk\PasswordManager\Logs\ThirdParty directory?
What type of log files are stored in the \Program Files\CyberArk\PasswordManager\Logs\ThirdParty directory?
Signup and view all the answers
Where can you find CyberArk Web application logs?
Where can you find CyberArk Web application logs?
Signup and view all the answers
What is the purpose of the Debug Level setting in the web.config file?
What is the purpose of the Debug Level setting in the web.config file?
Signup and view all the answers
Where can the configuration file for the Central Password Manager be found?
Where can the configuration file for the Central Password Manager be found?
Signup and view all the answers
What is the default debug level for the Central Password Manager?
What is the default debug level for the Central Password Manager?
Signup and view all the answers
Where can the logs for the Privileged Session Manager be found?
Where can the logs for the Privileged Session Manager be found?
Signup and view all the answers
Where can the server settings for the Privileged Session Manager be configured?
Where can the server settings for the Privileged Session Manager be configured?
Signup and view all the answers
What is the purpose of the TraceLevels setting in the Privileged Session Manager?
What is the purpose of the TraceLevels setting in the Privileged Session Manager?
Signup and view all the answers
Where can the General Settings for the Privileged Session Manager be configured?
Where can the General Settings for the Privileged Session Manager be configured?
Signup and view all the answers
What is the primary function of Privileged Threat Analytics (PTA)?
What is the primary function of Privileged Threat Analytics (PTA)?
Signup and view all the answers
What is the benefit of using On-Demand Privileges Manager?
What is the benefit of using On-Demand Privileges Manager?
Signup and view all the answers
What is the primary responsibility of the Central Policy Manager (CPM)?
What is the primary responsibility of the Central Policy Manager (CPM)?
Signup and view all the answers
What is the primary security feature of the Digital Vault?
What is the primary security feature of the Digital Vault?
Signup and view all the answers
What is the primary function of the 'Discover' feature in the Central Policy Manager?
What is the primary function of the 'Discover' feature in the Central Policy Manager?
Signup and view all the answers
What is the purpose of the Privileged Session Manager?
What is the purpose of the Privileged Session Manager?
Signup and view all the answers
What is the primary benefit of using a Password Vault in the context of the Vault?
What is the primary benefit of using a Password Vault in the context of the Vault?
Signup and view all the answers
Which operating system has an administrator account with the password 'tops3cr3t'?
Which operating system has an administrator account with the password 'tops3cr3t'?
Signup and view all the answers
What is the primary function of the Central Policy Manager?
What is the primary function of the Central Policy Manager?
Signup and view all the answers
What is the primary purpose of the PVWA interface?
What is the primary purpose of the PVWA interface?
Signup and view all the answers
What is the primary purpose of the Digital Vault Security?
What is the primary purpose of the Digital Vault Security?
Signup and view all the answers
Which of the following is NOT a type of user account in the diagram?
Which of the following is NOT a type of user account in the diagram?
Signup and view all the answers
What is the primary purpose of Privileged Account Discovery?
What is the primary purpose of Privileged Account Discovery?
Signup and view all the answers
What is the purpose of the security policy in the diagram?
What is the purpose of the security policy in the diagram?
Signup and view all the answers
What is the primary purpose of the IT department in the diagram?
What is the primary purpose of the IT department in the diagram?
Signup and view all the answers
Study Notes
CyberArk PAM Key Features
- CyberArk PAM provides a comprehensive solution for discovering, isolating, recording, monitoring, and remediating privileged credentials and sessions.
Discover and Manage Credentials
- Automated processes for account discovery
- Policies for managing credentials, including:
- Password complexity
- Rotation frequency
- Others
The Vault
- A secure storage for credentials
- Clients of the Vault include:
- End users (IT staff, auditors, etc.)
- Custom applications
- Reporting tools
- The Vault provides a centralized policy management system
The Vault: End-to-End Security
- Secure storage of credentials
- Discretionary and mandatory access control
- Encryption of sessions and files
- Proprietary protocol and hardened built-in firewall
- Single or two-factor authentication
- Granular permissions and role-based access control
- Subnet-based access control and time limits
- Event-based alerts and tamper-proof audit trail
- Hierarchical encryption model, with every object having a unique key
User Management in PVWA
- User management module introduced in PAM version 13, accessible through PVWA
- Create and edit CyberArk users
- Create groups and assign users to them
- View all users (LDAP and CyberArk)
- Disable or activate a suspended user
- Reset a user's password
Managing Users
- Create new CyberArk users manually through PVWA
- Edit CyberArk users through PVWA
- Create groups and assign users to them through PVWA
- Disable or activate a suspended user through PVWA
- Reset a user's password through PVWA
Changing Master Password
- Change the Master user password by logging in as Master user and clicking User → Set Password
User Management in PrivateArk Client
- Manage users and groups via PrivateArk Client
- Adding users: authorized interfaces, authentication, vault authorizations, group membership, and general tabs
- Users stored in Vault database
- Recommended to manage users with an external LDAP directory, such as Active Directory
- Can manually create users via PrivateArk Client
General Tab
- Manually add new users through PrivateArk Client interface
Authorized Interfaces
- Select which interfaces a user can log in from
Authentication
- Select the authentication method for a user
Vault Authorizations
- Configure Vault authorizations for a user
Group Membership
- Select which groups a user is a member of
User Management Overview
- Users vs. Accounts: understand the differences between the two
- Internal Users and Groups vs. Transparent Users and Groups: understand the differences between the two
Platform Management
- Platforms have three main functions: defining technical settings, pointing to relevant plug-ins and connection components, and basis for exceptions to the Master Policy.
Platform Functions
- Define password policy settings such as minimum length, forbidden characters, and more.
- Manage how you log in and change a password on different target systems (e.g., Unix, Windows).
Creating and Managing Platforms
- Platforms are located under the Administration tab.
- Platforms are grouped by target system type.
- There are several dozen baseline platforms that function out of the box with little or no configuration.
Duplicating Platforms
- Duplicating a Platform is required when accounts of the same system type require different policies.
- Example: Unix accounts in different regions need to be rotated on a different basis.
Platform Naming Convention
- Use a logical naming convention based on business rules (e.g., LIN SSH 30 indicates Linux accounts via SSH connections with 30-day password rotation).
Editing Platform Settings
- Select Edit to modify Platform settings (e.g., password policy settings).
- Platforms are divided into two broad sections: UI & Workflows, and Automatic Password Management.
Password Complexity
- The Generate Password section controls password creation policy, including length, complexity, forbidden characters, and more.
Activating/Deactivating Platforms
- The Vault administrator can deactivate Platforms that are not currently relevant to your implementation, providing better administration and performance.
Policy By Platform
- The Platform Management page displays password management policies applied to different platforms.
Summary
- The general workflow when working with CyberArk PAM involves configuring key parameters in the Master Policy and Platforms.
- Key parameters include password policy settings, plug-ins, and connection components.
Granular Safe Permissions
- In the Safe Members tab, users and groups with access to the Safe are displayed.
- Members can be added and permissions assigned, managing access to accounts and passwords.
Permissions
- Permissions are organized into groups: Access, Account management, Safe management and monitoring, Workflow, and Advanced.
Safe Naming
- Safe names are limited to 28 characters and do not support double-byte characters.
- A naming convention is recommended, such as P-BOS-SRV-WIN-LAD-HR for local admin accounts on HR production servers.
Safe Constraints
- The number of objects stored in a Safe should be limited to 20,000, including versions of passwords.
- The recommended number of accounts or files stored in a Safe is between 3,000 and 5,000.
Access Control
- The principle of “least privilege” should be followed, storing objects in Safes according to need-to-know access.
- Separate Safes are recommended for Windows Desktop Accounts, Windows Local Administrators, and Windows Domain Accounts.
- Object-level access control is not recommended.
Adding Safe Members
- A new wizard streamlines the process of creating Safes and adding initial members.
- Permission presets and user/group searching are available.
Platforms and Safes
- The AllowedSafes parameter can limit the scope of a platform to specific Safes using a regular expression pattern.
- This helps improve CPM performance and simplifies administrative tasks.
Accounts
- Accounts store privileged account IDs and passwords in Safes
- Examples of accounts include:
- Domain administrators
- Local administrators
- Root accounts
- Service accounts
- Every account resides in a single Safe
- Every account is associated with a single Target Account Platform
Adding a Linux Account
- To add a new Linux account, provide the following information:
- Platform: LIN SSH 30
- Safe: Lin-Fin-US
- Master Policy:_Exception: Change password every 30 days
- Username: logon01
- Password: ****** (hidden for security)
- Address: target-lin.acme.corp
Account Management Operations
- Central Policy Manager (CPM) manages passwords and SSH keys on devices based on policies set by Vault Administrators
- CPM performs three actions:
- Password Verification: Confirms passwords in Vault match target system
- Password Change: Changes passwords automatically based on expiration period or user intervention
- Reconciliation of unknown or lost passwords: Process used when Vault password doesn't match target system
Password Management Overview
- CPM manages privileged accounts through three actions: Verification, Change, and Reconciliation
- Verification confirms passwords in Vault match target system
- Change updates passwords automatically or through user intervention
- Reconciliation resolves unknown or lost passwords
Verification Process
- Scan Vault for Account
- Login using current credentials
- Notify Vault of success or failure
Change Process
- Scan Vault for Account
- Login using current credentials
- Generate new password
- Connect and run change password
- Store new credentials
Push Private Keys to Application Servers
- CyberArk PAM allows pushing private keys to application servers for SSH key authentication.
Linked Accounts
- There are two types of linked accounts commonly used and supported by default for most platforms:
- Logon account
- Reconcile account
Logon Account
- No additional information provided about logon accounts.
Root Account Best Practices
- Using a username "root" is not recommended as it compromises all systems that trust it if it is compromised.
- SSH keys are more difficult to change than passwords.
SSH Key Manager
- Creates unique key-pairs for each target system.
- Private keys are stored in the Vault, not on user workstations.
- The CPM (Central Policy Manager) changes key-pairs often and automatically disseminates public keys to target systems.
- End users retrieve the private key from the Vault to authenticate to the target system.
Agenda and Objectives
- By the end of this session, you will be able to:
- Describe and configure linked accounts (logon accounts and reconcile accounts)
- Describe and configure SSH key management
Configuration File Management
- Certain applications retrieve credentials from configuration files, which can be managed by the CPM.
- Supported file types include plain text, INI files, XML files, and web configuration files.
Config File Usage
- Applications use configuration files to retrieve passwords for authentication.
- When the CPM changes a password, it must also update the corresponding configuration file.
Adding Config File Usage
- To add a configuration file usage, the relevant usage must be added manually to the target account platform.
- The parameter SearchForUsages must be enabled.
Dependent Platforms
- Dependent Platforms are used for managing Usages.
- A usage refers to an instance where an account is used to perform a task somewhere else.
Usages
- The CPM can synchronize an account password with all other occurrences of the same password on the same server or anywhere in the network.
- This is done through Usages, which are registered in CyberArk PAM.
Scheduled Task Example
- A scheduled task can be used to run a task with a specific account.
- In this example, a local Windows user – sendmail01 – is used to run a scheduled task – SchedTask01.
Adding Config File Usage (2)
- The specific INI config file usage must be added to the relevant account.
- The usage specifies the server address, full path to the INI file, and where in the file the password can be found.
Configuration Files
- When the CPM changes a password, it will also change the password in the corresponding configuration file.
- The password can be encrypted using an external command.
Logon Account
- An extra account may be required to log onto the remote machine where the usage exists.
- A logon account can be associated with the usage.
Encrypting the Password in Config Files
- Passwords stored in configuration files can be encrypted using an external command.
- The encryption command and encryption regex parameters are used to handle the encryption process.
Advanced Settings
- End users can connect transparently using privileged accounts and are allowed by default to view passwords.
- Users can specify a reason for access, which forces them to provide a reason why they are using a particular account.
Privileged Account Request
- The list of options for the drop-down is defined at the Platform level, so it can have a different set of reasons on a platform-by-platform basis.
- Predefined Reasons can be added to create a list of choices for users when accessing a password in the PVWA.
Dual Control
- Dual control requires end users to get authorization before accessing privileged accounts.
- Authorization must be given by one or more managers or peers, depending on the configuration.
- Dual Control is controlled through Safe membership, where Requesters are the people who want to use the privileged accounts.
- At least one person from each group with approver permissions must approve the request before the requester can use the password.
Multi-Group Approval Process
- If more than one group with approver permissions is set up, at least one person from each group must approve the request before the requester can use the password.
- In advanced settings, a multi-level approval process can be enabled, where a request must first be approved by one group before it is forwarded for approval to another group.
- Direct manager approval can be enabled, determined by the Manager attribute on the requester's AD user object.
Exclusive Access
- Exclusive access allows multiple users to access the password simultaneously.
- The password is changed automatically upon manual release, and the system will release it automatically based on the Minimum validity period.
- In later versions, the password can be auto-released by the PSM.
Summary
- The session covered five workflows: Allow transparent connections, Require users to specify reason for access, Dual Control, Exclusive Passwords, and One-time Passwords.
PAM Web Services API
- PAM Web Services API is a set of REST-based services running on the PVWA.
- It allows scripts and applications to communicate with the Vault.
- Used by CyberArk applications as well as third-party applications.
- Enables organizations to develop custom interactions with the Vault to automate business processes.
Discovery and Onboarding Methods
- Discovery and Onboarding Methods include:
- Add a single account
- Add multiple accounts from file
- Discovery and Audit (DNA)
- Continuous Accounts Discovery
- Accounts Discovery & Onboarding Rules
- Rest API
Onboarding Accounts
- Onboarding accounts can be done using three main REST methods:
- Add account
- Add discovered accounts
- Create bulk upload of accounts
Add Account Method
- Used when the target Safe and Platform are known to the onboarding utility.
Add Discovered Accounts Method
- Used by CyberArk discovery and upload mechanisms, as well as third-party discovery mechanisms.
- Uploads discovered accounts (and dependencies) to the Pending Safe or onboards the accounts directly via automatic onboarding rules.
PAM Administration
- Involves Discovery and Onboarding.
PSM Flow
- PSM provides complete isolation of target systems, ensuring privileged credentials never reach users or their devices.
- Connections can be made from Unix, Linux, Mac, or Windows end-user machines.
- The PSM flow involves:
- Logging on through PVWA
- Connecting to PSM using RDP/TLS
- Fetching credentials from Vault
- Connecting using native protocols
- Forwarding logs to SIEM and PTA
- Storing session recordings
PSM for Windows
- The PSM for Windows flow involves:
- Connecting to PSM using RDP/TLS
- Fetching credentials from Vault
- Connecting using native protocols
- Forwarding logs to SIEM and PTA
- Storing session recordings
PSM for SSH
- The PSM for SSH flow involves:
- Opening an SSH session to the PSM server
- Retrieving a privileged account password from the Vault
- Opening an SSH session to the target using the privileged account
- Forwarding logs to SIEM and PTA
- Storing SSH session audits
Summary
- The Privileged Session Manager (PSM) features include:
- PSM Connection Components
- PSM Ad-Hoc Connections
- PSM via HTML5 Gateway
- PSM for Windows
- PSM for SSH
Active Session Monitoring (PSM)
- PSM enables authorized users to monitor active sessions, take part in controlling these sessions, and suspend or terminate them.
- PSM can automatically suspend or terminate sessions when notified by PTA or a third-party threat analytics tool.
Active Session Monitoring (PSM for SSH)
- It is not possible to monitor or control live PSM for SSH sessions, but it is possible to view the live session audit.
- Recordings created by PSM for SSH are displayed in the classic interface.
Monitor Active Sessions
- Users can monitor active sessions using PVWA, HTTP/S, Unix, Administrator, RDP, and SSH (using putty).
Sizing Calculations for the PSM Server
- The required storage on the PSM Server (SPSM) is calculated using the formula: SPSM = Csession * tsession * Rsession recording + 20GB.
- The average bit rate of recorded video for different sessions is:
- 100 KB/min for average SSH session
- 200 KB/min for average low activity RDP session
- 300 KB/min for average high activity RDP session with rich wallpaper
Sizing Calculations for the Vault Server
- The required storage on the Vault Server (SVault) is calculated using the formula: SVault = tretention * Nsession * tsession * Rsession recording + 20GB.
- The retention history requirement (tretention) is a factor in calculating the required storage.
PAM Administration
- The goal of this section is to enable participants to monitor and manage privileged session recordings, audits, and active sessions.
- The participant will be able to monitor and manage privileged session recordings, audits, and active sessions upon completion of this session.
Recordings
- PSM and PSM for SSH create video and text recordings for privileged sessions and store them in the Vault.
- Authorized users can view these recordings at any time.
- Recordings can be stored in an external storage device.
Configuring Rules
- Rules are defined by category, pattern, session response, threat score, and scope
- Categories include SSH, Universal Keystrokes, SCP, SQL, and Windows title
- Patterns are regular expressions to be monitored
- Session responses include Suspend, Terminate, and None
- Threat score ranges from 1-100
- Scope determines who or what the rule will apply to
Session Analysis and Response Life Cycle
- The life cycle includes analytics, define risks, alerts, automatic response, manual response, and risk review
- The security team is involved in the manual response and risk review stage
Privileged Threat Analytics
- It quickly gathers and analyzes critical data
- Enables speedy response and automated containment
- Detects suspicious activities
- Alerts security teams with detailed event information
- Collects data from a wide variety of sources
- Part of CyberArk's PAM administration
Agenda
- Describe the main functionality of Privileged Threat Analytics (PTA)
- Describe the different data sources used by the PTA
- Describe the different attacks and risks detected by the PTA
- Describe the alert flow by the PTA
- Configure and test PTA automatic responses
- Describe the session analysis and response flow
Report Categories
- There are two categories of reports: Operational reports and Audit/Compliance reports.
Filter Options
- Each type of report has differing filtering criteria.
Scheduling Reports
- Reports can be run immediately, saved, or scheduled to run on a regular basis.
- Subscribers can be added to receive notifications by email when the report is generated, containing a link to the report.
Report Status
- The Refresh button can be used to check if a report has been generated.
Finished Reports
- Reports can be downloaded in Excel or CSV formats.
Report Types
- PrivateArk Reports are of interest to Vault Admins and include:
- License capacity of the system
- Lists of Users
- Active/Non-active Users
- Safes List
- Active/Non-active Safes
- PVWA Reports are of interest to Auditors and include:
- Privileged Accounts Inventory
- Applications Inventory
- Privileged Accounts Compliance Status
- Entitlement Report
- Activity Log
Report Generation
- Reports can be generated using the PVWA and the PrivateArk Client.
- The Export Vault Data (EVD) Utility can be used to extract data for reports.
Permissions
- Different reports require different permissions to run.
CyberArk's Scalable Architecture
- The architecture consists of auditors, PVWA, CPM, PSM, and a Vault (HA Cluster) in the main data center, with replicated environments in London and Hong Kong.
- The IT environment is integrated with the Vault and other components.
PAM Self-Hosted Components
- PAM Self-Hosted is a Privileged Access Manager solution where all components are owned and operated by the customer.
- It can be deployed on-premises, in the cloud, or in a hybrid environment.
- The components include:
- Secure Digital Vault: a secure server for storing privileged account information.
- Password Vault Web Access (PVWA): a web interface for users to access privileged account information.
- Central Policy Manager (CPM): performs password changes on devices and configures policies.
- Privileged Session Manager (PSM): isolates and monitors privileged account activity, recording sessions.
- Privilege Threat Analytics (PTA): monitors and detects malicious privileged account behavior.
CyberArk PAM Offerings
- PAM Self-Hosted is an entirely on-premises or cloud-based deployment.
- CyberArk Privilege Cloud is a PAM solution delivered as Software as a Service (SaaS).
Before Installing
- Enable the Backup user
- Set the password on the Primary Vault
Install the Utility
- Install the Replicator module and specify a path to a backup folder for the replicated data
Configure Vault.ini
- Edit the Vault.ini to give the Replicator utility the network address of the Vault server
Create Cred File
- The Credential File is used by the utility to authenticate to the Vault
- The password for the Backup user is changed in the Vault and the Credential File is updated after every successful login
Performing a Backup
- The backup is launched at a command line using the PAReplicate.exe executable file
- The syntax of the command specifies the vault.ini file and uses the logonfromfile and fullbackup switches
Overview
- The CyberArk Vault enables you to backup and restore a single Safe to a Vault, as well as a complete Vault’s data and metadata
- The Data and Metadata folders are extremely important and it is imperative to back them up regularly
Backup Considerations
- Vault backup can be implemented in two ways: Direct Backup (Not Recommended) and Indirect Backup (Recommended)
- Direct Backup introduces an external application to the Vault and potentially reduces the level of security
- Indirect Backup uses the PrivateArk Replicate Utility to pull Vault data as encrypted files to a server, and then enterprise backup software can backup these files
Installation and Setup
- Before installing the Replicator utility, ensure the backup server has at least the same disk space as the Vault database on an NTFS volume, accessibility by your enterprise backup system, and physical security that only permits authorized users to access it
Enhanced DR Replication
- Database synchronization occurs between the Primary Vault and Disaster Recovery Environment
- The DR Service is responsible for synchronization
- Data and metadata synchronization can be enabled in the padr.ini configuration file with the default setting EnableDbsync=Yes
Data Replication Interval
- The ReplicateInterval parameter determines the length of time between synchronizations of the Vault file system
- The default interval is 3,600 seconds (or one hour)
PVWA Failover Setup
- PVWA servers can be configured for automatic failover to allow users to access passwords without interruption
- Audit data should be saved via the activity log before re-enabling replication
- SIEM integration can mitigate the issue of saving audit data
DNS Load Balancing
- A DNS Alias can be used to control which Vault is used by the components (CPMs, PSMs, PVWAs)
- The DNS Alias is set in the Vault.ini file
- DNS Alias updates are a manual process and will extend the outage
Failover
- Automatic failover can be enabled with the parameter EnableFailover=Yes
- The CheckInterval indicates the DR Vault will contact the Primary Vault every 60 seconds, and if it fails, it will try again 4 times, once every 30 seconds
- After which, the DR Vault considers that the Primary is down and it goes into DR mode
Manual Failover
- To configure the DR Vault for manual failover, padr.ini should be configured as follows: EnableFailover to No, EnableDbsync to Yes, and ActivateManualFailover to No
- To perform a proper manual failover, set the parameter ActivateManualFailover to Yes and restart the DR service
The Failover Process
- The failover process involves connection failure, retry attempts, failover started, data synchronization, starting PrivateArk, stopping the Server, and disaster recovery service
CyberArk PAM Solution Encryption
- Three files form the cornerstone of the CyberArk PAM solution encryption methodology: Server Key, Recovery Public Key, and Recovery Private Key.
- These files are required to install and operate CyberArk PAM.
Vault Object Encryption - Day-to-Day Operations
- Vault objects are encrypted using AES-256.
- Server Key is used to encrypt vault objects.
- Safe objects are encrypted using AES-256.
- Safe Key is used to encrypt safe objects.
- Password files are encrypted using AES-256.
- File Key is used to encrypt password files.
The Vault: End-to-End Security
- The Vault provides end-to-end security with features like:
- Discretionary and Mandatory Access Control
- Session Encryption
- Firewall Authentication
- Granular Permissions
- Subnet-Based Access Control
- Tamperproof Audit Trail
- Hierarchical Encryption Model
- The Vault uses a proprietary protocol and hardened built-in Windows firewall.
- OpenSSL encryption is used.
- Role-Based Access Control and Time Limits are available.
- Every object in the Vault has a unique key.
Vault Encryption and Key Management
- Keys are encrypted using a 3rd-party tool.
- Keys are not stored in RAM.
- Keys are always available, even when the Vault is restarted.
- Inserting a medium is required to encrypt the key.
Summary
- The session covered security controls protecting the Vault and encryption keys.
- It also covered encryption mechanisms protecting Vault data.
CyberArk PAM Solution Encryption
- Three files form the cornerstone of the CyberArk PAM solution encryption methodology: Server Key, Recovery Public Key, and Recovery Private Key.
- These files are required to install and operate CyberArk PAM.
Vault Object Encryption - Day-to-Day Operations
- Vault objects are encrypted using AES-256.
- Server Key is used to encrypt vault objects.
- Safe objects are encrypted using AES-256.
- Safe Key is used to encrypt safe objects.
- Password files are encrypted using AES-256.
- File Key is used to encrypt password files.
The Vault: End-to-End Security
- The Vault provides end-to-end security with features like:
- Discretionary and Mandatory Access Control
- Session Encryption
- Firewall Authentication
- Granular Permissions
- Subnet-Based Access Control
- Tamperproof Audit Trail
- Hierarchical Encryption Model
- The Vault uses a proprietary protocol and hardened built-in Windows firewall.
- OpenSSL encryption is used.
- Role-Based Access Control and Time Limits are available.
- Every object in the Vault has a unique key.
Vault Encryption and Key Management
- Keys are encrypted using a 3rd-party tool.
- Keys are not stored in RAM.
- Keys are always available, even when the Vault is restarted.
- Inserting a medium is required to encrypt the key.
Summary
- The session covered security controls protecting the Vault and encryption keys.
- It also covered encryption mechanisms protecting Vault data.
Remote Control
- Enables users to perform remote operations on Vault, DR Vault, and ENE components.
- Consists of Remote Control Agent (Windows service) and Remote Control Client (command-line interface utility).
- Remote Control Agent runs on Vault components, while the Client can run on any computer without requiring other Vault components.
Remote Monitoring
- Enables users to receive Operating System and Vault information, including CPU, memory, and disk usage, event log notifications, and service status.
- Uses SNMP to send Vault traps to a remote terminal.
- CyberArk provides two MIB files for SNMP v1 and v2 that describe SNMP notifications sent by the Vault.
System Monitoring and Administrative Tasks
- Can monitor system health via REST, email, SIEM, and SNMP.
- Can monitor replications and DR status.
- Perform common administrative tasks related to system maintenance.
Monitoring Components
- Can monitor components via REST, email, SIEM, and SNMP.
- Examples of components that can be monitored include PVWAAppUser, PasswordManager, DR, and Backup.
Enabling Component Monitoring
- Can customize email notifications by editing the body parameter in the Component is inactive template (ID: 206).
- Can enable monitoring of a specific CyberArk component user account using the PrivateArk Client.
- Can add the ComponentMonitoringInterval parameter to dbparm.ini to set the monitoring interval.
- Can define the actions taken when the Vault detects a disconnected component using the ComponentNotificationThreshold parameter.
Troubleshooting PSM-RDP
- Same troubleshooting recommendations as for PSM-RDP
- Run component manually using shadow user
- Delete Shadow users (from PSM computer management)
- Adjust AppLocker (or remove it manually in Windows for isolation)
Shadow Users
- Created by the PSM upon first connection
- Used to run connection components and store user preferences
- Can isolate problems related to shadow users by:
- Running the component manually as the shadow user (after password reset)
- Deleting the user (this will allow the PSM to create the user again)
Adjust AppLocker
- PSM uses Windows AppLocker feature to define rules for allowing or denying applications
- When adding a new component, adjust AppLocker by:
- Uncommenting the line relating to the new component in PSMConfigureApplocker.xml
- Running the PSMConfigureApplocker.ps1 script
Disable AppLocker
- Can disable AppLocker entirely for isolating the problem only
- Steps to disable AppLocker:
- Open secpol.msc or gpedit.msc
- Go to Computer Configuration → Windows Settings → Security Settings → Application Control Policies → AppLocker
- Click on Configure rule enforcement and set Executable Rules to Audit Only
- Turn Enforce rules back on after testing
CPM Services
- Restart the CPM Services to troubleshoot issues
Resynch PTA Credentials
- Run the VaultPermissionsValidation.sh script in the utility folder on the PTA server to resynch credentials for PTA Vault users and PTA_PAS_Gateway account
Common Issues Related to CPM
- Local Computer Policy conflicts with password policy on target device
- Platform and Master Policy settings must not conflict with password policy on target device
User Authentication Issues
- User Receives an Authentication Failure due to:
- Trying to log in to PVWA with old password after changing network password
- Identifying the Error in the ITA log on the Vault
- Unsuspend the User or use Automatic Unsuspend feature
Automatic Unsuspend
- Configure the Vault to unsuspend users automatically after a predefined time period using the UserLockoutPeriodInMinutes parameter in dbparm.ini
Troubleshooting PSM Server Issues
- To troubleshoot PSM server issues, disable NLA (Network Level Authentication) on the PSM machine or target machine by going to Control Panel → System and Security → System → Remote Settings
- Manually connect with PSMConnect by disabling the Start Program in the Environment tab, getting the PSMConnect account password, and connecting to the PSM with PSMConnect and running MSTSC to the target
Increasing Timeouts
- Timeout parameters determine how long the PSM will wait for certain components to work before considering them as ‘failed’ and ending the session
- In overloaded environments, it is recommended to double the timeout values, e.g., ConnectionComponentTimeout: 20000
PSM Component Issues
- Verify if PSM users (PSMConnect / Shadow users) are supported and if Mapping drives is enabled
Target Windows Accounts
- Verify / Change / Reconcile API and “net use” command
- Use alternative plugins: WMI plugin / PowerShell plugin
- Suggested troubleshooting:
- Check Windows Event Viewer
- Check for unusual Local Security Settings
- Run “net use” manually from the CPM server to verify the connection
Target Unix Accounts
- Verify / Change / Reconcile operations are affected
- Suggested troubleshooting:
- Run plink manually
- Disable DEP / add exceptions for DEP on the CPM server
- Prompts and Process files – add a basic prompt
PSM-RDP Connection Troubleshooting
- Understanding the problem:
- At what stage does the problem occur?
- One account? Multiple accounts? Same type?
- Is the PSM hardened? Is the PSM in a domain?
- Which connection type is being used? RDP file / RemoteApp
- Suggested troubleshooting:
- Check the PSM service – is it off/hanging?
- Run component manually using shadow user
- Delete Shadow users (from PSM computer management)
- Adjust AppLocker (or remove it manually in Windows for isolation)
Shadow Users
- Shadow users are created by the PSM upon first connection
- Shadow users are used to run connection components and store user preferences
- Isolate problems related to shadow users by:
- Running the component manually as the shadow user (after password reset)
- Deleting the user (this will allow the PSM to create the user again)
Adjusting AppLocker
- The PSM uses the Windows AppLocker feature which defines a set of rules that allow or deny applications from running on the PSM machine
- When adding a new component, adjust AppLocker by:
- Adding an exception to PSMConfigureApplocker.xml
- Running the PSMConfigureApplocker.ps1 script
Disabling AppLocker
- Disable AppLocker entirely (for isolating the problem only) using the MMC snap-ins
- Set Executable Rules to Audit Only and turn Enforce rules back on after testing
PSM Configuration
- PSM configuration file is located at
C:\Program Files\CyberArk\PSM\Basic_psm.ini
- Debug settings can be found at
PVWA > Administration Tab > Options > Privileged Session Management
CPM Configuration
- CPM configuration file is located at
Vault > Safe "Password Manager" > root\policies\.ini
- Debug settings can be found at
PVWA > Administration Tab > CPM settings
Debugging and Troubleshooting
- Debug levels can be set to 0 (no messages), 1, 2, 3, 4, 5, 6, or 7
- Trace levels can be set to 1, 2, 3, 4, 5, 6, or 7
- Log files can be found at
\Logs
and subfolders, or according to theLogsFolder
parameter inBasic_psm.ini
file - CPM debug levels can be set to 1 (exceptions), 2 (trace messages), 3 (CASOS activities), 4 (CASOS debug activities), 5 (CASOS errors), or 6 (all CASOS activities and errors)
Log Files
- PSM logs can be found at
\Logs
and subfolders - CPM logs can be found at
\Program Files\CyberArk\PasswordManager\Logs\pm.log
,\pm-error.log
,\PMConsole.log
, and\PMTrace.log
- Plug-in logs can be found at
\Program Files\CyberArk\PasswordManager\Logs\ThirdParty\*.log
- PVWA logs can be found at
%windir%\temp\
Troubleshooting Flow
- The basic troubleshooting methodology involves understanding the system implementation, component communication, and current behavior compared to expected behavior
- It is important to write down any information gathered during the troubleshooting process and any tests performed, as this information will be required when opening a case with CyberArk support
Privileged Threat Analytics (PTA)
- Detects malicious activity caused by privileged accounts and contains in-progress attacks.
On-Demand Privileges Manager
- Empowers IT and enables complete visibility and control of super users and privileged accounts across the enterprise.
Digital Vault
- A hardened and secured digital vault used to store privileged account information.
- Implemented in compliance with the CyberArk Digital Vault Server security standard, resulting in a highly secure repository for privileged account passwords.
Central Policy Manager (CPM)
- Performs password changes and SSH key rotations on devices based on policies set by Vault Administrators.
- Responsible for Accounts Feed operations, including:
- Discover: Automates privileged account discovery.
- Analyze: Provides an easy view of all discovered accounts.
- Provision: Provisions the scope of accounts to manage in the Vault in a simple and intuitive way.
Policy Management
- Manages password policies for various systems, including Unix, Oracle, Windows, z/OS, and Cisco.
PVWA - Password Vault Web Access
- A web interface used by Administrators to perform administrative tasks and by end users to gain access to privileged account information.
PSM – Privileged Session Manager
- Isolates desktops from sensitive target machines to prevent cyber attacks.
- Creates accountability and control over privileged session access with policies, workflows, and single sign-on.
- Delivers continuous monitoring and compliance with session recording with zero footprint on target machines.
Enterprise Password Vault Solution Overview
- Master/exception policy definition.
- Initial load and reset accounts discovery through REST API or manual loading.
- Auditor access and policy management.
- Request access to privileged accounts through PVWA and PSM.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
This quiz covers the key features of CyberArk's Privileged Access Management (PAM) solution, including credential management, session isolation, and risk remediation. Test your knowledge of CyberArk PAM's capabilities.