Thycotic Privilege Manager Basic Policies

Privilege Manager’s toolset is two-fold. First, Local Security discovers all accounts that exist on endpoints and allows Privilege Manager Administrators to control the exact membership of every local group. This will ensure the correct admin and root accounts are permanently set. Additionally, credentials will be controlled by enforcing password rotation on those accounts.

Second, Application Control allows Privilege Manager administrators to manage application activity on endpoint machines. Applications that require admin rights or root access can be automatically elevated, allowed applications are allow listed, and malicious applications are blocked.

Every implementation looks different when configuring Privilege Manager to work best for your organization. This post is to summarize some of examples to set up right policies in Privilege Manager application. 

Related Post:

Best Practices

The following topics are available:

Notes:

Privilege Manager local accounts should be managed by Thycotic Secret Server.

License expired, the existing policies and new created policies will still wor, but not events.

Catch All Policy 

1. Monitoring policy

2. Priority set to 1000
3. Application Targeted : Interactive Users
4. Exclusion:
    LocalSystem and Service applications
    Present in Signed Security Catalog
5. Audit Policy Events : Enabled

Custom Filter for Allowed Folder / Applications

To allow any application in certain folder to run, it requires to create a custom filter:

Enter folder location:

Then create an Allow policy:

  • Setting up priority
  • Change it to active
  • Enable Auditing.

Set up Target Groups for your Policy

References

版权声明:
作者:Alex
链接:https://www.techfm.club/p/2389.html
来源:TechFM
文章版权归作者所有,未经允许请勿转载。

THE END
分享
二维码
< <上一篇
下一篇>>