




版权说明:本文档由用户提供并上传,收益归属内容提供方,若内容存在侵权,请进行举报或认领
文档简介
EPMFundamentals
ApplicationDiscoveryCyberArkUniversityPrivilegedManagementImplementationWorkflowServerInstallationAgentDeploymentSilentApplicationDiscoveryPolicyCreationExceptionManagementReportingAUDITINGPOLICIESDISCOVERYDEPLOYMENTINSTALLATIONObjectivesThissessionwillenableyoutodiscoverapplicationsandprivilegedactionsusing:PrivilegeManagementandApplicationControlInboxesEnd-UserMessagingAgentConfigurationApplicationCatalogThreatIntelligenceNotethattheapplicationcatalogandthreatintelligencefunctionalityarenotavailableintheGPOeditionofEPM.PrivilegeManagementInboxPrivilegeManagementInboxEventCollectioncapturesactionsrequiringelevatedprivilegesfromend-usercomputersanddisplaystheminthePrivilegeManagementInboxIncludesOSactionsandapplicationsthatrequireelevatedcredentialsBasedonthecollectedevents,policiescanthenbecreatedtoallowelevationofuserprivilegesforspecificactionsorapplications.HowAreActionsDetected?Threemethodstodetectwhenelevationisrequired UACtriggeredDefault,mostreliable,somecustomersmayneedtoswitchUAConfordiscoveryInternalmanifestChecksXMLfileembeddedinEXE,looksforflagthattriggersUAC<requestedExecutionLevellevel="highestAvailable“>NotallapplicationsthatrequireelevationcontaincorrectlyconfiguredmanifestApplicationexitswithreturncodeshowingthataccesswasdeniedHowAreActionsDetected?UACneedstobeactivatedonendpoints
BewareofGPOoverridinglocalsettingsorpolicyComputerConfiguration=>WindowsSettings=>SecuritySettings=>LocalPolicies=>SecurityOptionsStartingEventCollectionTostartEventCollectionclickonPrivilegeManagementInbox
thenEventCollectionThisopensadialogforEventCollectionconfigurationStartingEventCollectionThepolicysectiondeterminestheelevationpolicyduringthediscovery:CollectPolicyAutomationEventsDefaultDeny:allelevationrequestsfromnon-adminuserswillfailElevateanyApplicationifnecessaryDefaultAllow:allelevationrequestswillbeallowedNote:TheselectionchangestheoptionsinthefollowingwizardEvents(CollectOption)CollecteventstriggeredbyEnd-useractionsonlyUseheuristicstocatchunsuccessfullaunchesIfunchecking“CollecteventstriggeredbyEnd-useractionsonly”,makesuretocheck“Useheuristicstocatchunsuccessfullaunches”NotifyAdministratorbyEmailDonotusethisoptionduringinitialdiscovery!Events(CollectOption)CollectEnd-usermanualrequestAllowsuserstocreateamanualapprovalrequestinEPMControlPanelRequeststhenappearinPrivilegeMgmtInboxUserTypes(CollectOption)SetwhethereventswillbecollectedforstandardoradminusersComputersinSet(BothOptions)LimitwhichcomputersinsetwillbeusedfordiscoveryADComputerGroups(BothOptions)UsingADGroups,limitwhichcomputerswillbeusedfordiscoveryOSUsers(BothOptions)LimitwhichADusersorgroupswillbeusedfordiscovery
Ifnouserorgroupisselected,eventsfromallusersloggingontomonitoredsystemswillbediscoveredEnd-UserUI(ElevateOption)Setwhetherelevationwilloccurforstandardand/oradminusers
Choosewhetherdialogorballoonwillbedisplayedorifmessagewillbesuppressed
ElevationbehaviorcanbedefinedforShowBalloon,notShowDialogManualElevation(ElevateOption)Allowsuserstoright-clickonanexecutableandchoosetheoptionRunwithElevatedPrivilegesEventisdisplayedinPrivilegeManagementInboxEventsCollectedintheInboxOnceEventCollectionhasstarted,InboxwillbepopulatedwithapplicationsandoperationsthatrequireAdminPrivileges.TheInboxpresentsanaggregated,filterabledisplayofalleventscollected.PoliciesfortheEventscanbecreatedfromtheInboxortheycanbeassignedtoanApplicationGrouporAdvancedPolicy.ClickonsymbolornumberinEventscolumnformoredetailTimelineHelpsdecideifapplicationismaliciousornotShowsinformationon:ApplicationFamilyTreeReputationAppliedPoliciesAccessedObjectsAssociatedComputersandEventsCreatepoliciesbyclickingonActionsSeemoredetailonassociatedeventsbyclickingonApplicationControlorPrivilegeManagementEvents.EventSummarySummaryofelevationrequestsorapplicationlaunchesonallmachinesClickonsymboltoseeinformationonindividualeventsApplicationControlInboxApplicationControlInboxApplicationControlcapturesapplicationinstallationsandlaunchesonEPMEndpoints.Unhandled,orgrey-listed,applicationsappearaseventsintheInboxBasedonthecollectedevents,policiescanthenbecreatedtoblack-listorwhite-listthedetectedapplications.WhatisanUnhandledApplication?Agrey-ListedorunhandledApplicationisnotyethandledbyapolicyAssoonasapolicyortrustedsourceiscreatedforanapp,oritisassignedtoanapplicationgroup,alleventsforthatapplicationwilldisappearfromtheinboxApplicationControlInbox–DefaultActionOff:Unhandledappslaunch,eventsarenotcapturedMonitor:Unhandledappslaunch(norestrictions),eventsappearininboxRestrictaccess:UnhandledappslaunchwithrestrictionsonresourceaccessDefaultDeny:UnhandledappswillnotlaunchandeventsmaynotappearintheinboxMonitorWizard-LaunchesFirsttabdetermineswhetherthelaunchofanunhandledapplicationwillgenerateanevent.Defaultisoff,putaticknextto
StartofUnhandledApplicationstocaptureevents
SelectdesiredEnd-userUI
behaviourMonitorWizard-InstallationsofnewUnhandledApplications
SelectwhetherInstallationsofnewUnhandledApplications
willgenerateeventsintheApplicationControlinboxornotNote:Aninstallationtypicallyrequiresadminprivilegestorun,soitismorelikelytoappearintheprivilegemanagementinboxthanintheApplicationControlinbox!MonitorAccesstoNetworkandLocalResourcesbyUnhandledApplicationsPuttingticknexttoAccesstonetworkandlocalresourcesactivatesadditionaltabstoactivatemonitoringofapplicationaccessto:Internet/IntranetNetworkSharesLocalResourcesMemoryMonitorAccesstoNetworkandLocalResourcesbyUnhandledApplicationsThiswizardwillonlyactivatemonitoringofthedifferenttypesofresourcesaccessedbyunhandledapplications
TheonlyoptionsareMonitorandDoNotMonitor,thereisnooptioninthiswizardtorestrictaccesstoresources.LimitScopeofPolicyThepolicycanberestrictedto:ComputersinSetADComputerGroupsOSUsers(includingADGroups)OldApplicationOldapplicationsareapplicationfilesthatwerepresentonthesystembeforetheEPMagentwasinstalledThisboxistickedbydefaultmeaningoldapplicationsthatarenothandledbyapolicywillbemonitored.RestrictAccessActivatingtheRestrictAccesspolicyallowsapplicationstolaunchbutwithrestrictionsontheiraccesstoparticularresourcesRestrictAccessWizardWizardallowsgranularcontrolofaccessandloggingforunhandledapplication’saccesstodifferentresourcetypesIdenticaloptionstotheMonitoroption,exceptthatitispossibletochoosetorestrictaccessinsteadofmonitoring.Formonitoring,setAccesstoAllowandFullLogtoLocalFailedaccessgeneratesaneventintheinbox.DefaultDenyAnyunhandledapplicationwillnotbeallowedtorun,blockingallapplicationsnotcoveredbyapolicy.Notmendedfordiscovery,asaneffectivepolicysetwillnotyethavebeendefined.EventsforunhandledapplicationswillnotbegeneratedifDefaultDenyisenabledDefaultDenyWizardOptions-MonitorSetwhatwillbedisplayedtoend-userwhenappisblockedShowDialogShowBalloonShowNothingSetwhetherattemptstostartblockedapplicationswillgenerateaneventintheinbox.RansomwareProtection
and
AppsInstalledfrom
RemovableMediaorInternetRansomwareRansomwareisagrowingrisk,withenterprisesfacingextortiontorecoverdataencryptedbymalware.ClickontheRansomwareicontoactivatetheprotectionpolicyCanbesettomonitororrestrictappaccesstodataRansomware-AccessSelectfiletypesforwhichaccesswillberestrictedSpecifywhichfolderswillbemonitoredoraddnewfiletypesusingwildcardsbyclickingonAddFolderorAddFilerespectivelyRansomware-TrustedSelectwhichapplicationsareallowedtoaccessdocumentfiles.DefaultsareexecutablesfromMicrosoft,Google,AdobeandCyberArk,alongwithMicrosoftWindowsStoreAppsExceptionscanbeaddedusingNewRansomware-MonitorIfRansomwareprotectionisactivatedwhilethedefaultpolicyisMonitor,Ransomwarepolicywillonlymonitor,notprotectRansomwareprotectionwillonlyrestrictmalwareaccesstoprotectedresourcesifdefaultpolicyissettoRestrictInternetandRemovableMediaSetseparatepolicyforappsinstalledfromInternetorfromremovablemediaOverridesdefaultpolicyofMonitor,RestrictAccessorDefaultDenyClickonInternetorRemovableMediatoactivateInternetandRemovableMedia-ActionFirstwizardscreenofwizardallowstochoosedefaultactionOverridesdefaultpolicyofMonitor,RestrictAccessorDefaultDenyOtherscreensaresameasfordefaultpolicies.ApplicationCatalogApplicationCatalogTheApplicationCatalogdisplaysalistofdiscoveredapplicationsEvenifthecatalogisdeactivated,appsdisplayedinApplicationControl&PrivilegeManagementinboxesarealsoshownhereScanscanalsobelaunchedtodiscoverapplicationsinuseintheenterprise.ApplicationCatalogResultofscansaredisplayedincatalog
Re-scanAllComputersbestrunaspartofdiscoveryprocessScanninganIndividualMachineOpentheMyComputerspageSelectdesiredmachinefromlistClickonComputer
then
Re-scanApplicationFilesEndUserMessagingEndUserCustomMessagesEPMallowsorganizationstoextensivelycustomizethemessagesthataredisplayedtoendusersrelatedtopolicyexecutionandpolicyautomationEndUserCustomMessagesTheEPMApplicationrequiresadministrativeprivilegesmessagereplacesthestandardWindowsUACmessage
Usingtags,canincludehyperlinktosendemailtohelpdeskEndUserCustomMessagesEnd-userexperience:Clickingonherewillcreateaprepopulatedemailwhichincludesapplicationanduserinformation.ShowNotificationAreaIconAdvanced>AgentConfiguration>End-UserUI
Thissettingcanbeusedtochangetheiconorswitchitoffcompletely
NotethatEPMAgentballoonmessageswillnotbedisplayedifthisoptionisturnedoffHideCyberArkEPMAgentfromInstalledProgramsAdvanced>AgentConfiguration>End-UserUI
RemovestheEPMAgentfromlistofinstalledprograms("UninstallorChangePrograms","AddorRemovePrograms".)Eventhisoptionisnotactivated,Agentself-protectionwillpreventusersuninstallingtheagentProtectAdministratorsGroupAdvanced>AgentConfiguration>PoliciesWhenturnedon,administrativeUserGroups(localAdministrators,etc.)cannotbemodified.Note:MaylimitfunctionalityofsomeApplications,e.g."LocalUserandGroup"AdministrativeTask.
DefaultvalueisOffThreatIntelligenceUsingThreatIntelligenceServicesEPMcanintegratewithseveraldifferentservicestocheckwhetheraparticularapplicationismaliciousornot
Somearedeliveredout-of-the-box,othersrequireaseparatelicenceThreatIntelligenc
温馨提示
- 1. 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。图纸软件为CAD,CAXA,PROE,UG,SolidWorks等.压缩文件请下载最新的WinRAR软件解压。
- 2. 本站的文档不包含任何第三方提供的附件图纸等,如果需要附件,请联系上传者。文件的所有权益归上传用户所有。
- 3. 本站RAR压缩包中若带图纸,网页内容里面会有图纸预览,若没有图纸预览就没有图纸。
- 4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
- 5. 人人文库网仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对用户上传分享的文档内容本身不做任何修改或编辑,并不能对任何下载内容负责。
- 6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
- 7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。
最新文档
- 原物料采购合同6篇
- 皮带超市企业县域市场拓展与下沉战略研究报告
- 金属框架沙发床企业数字化转型与智慧升级战略研究报告
- 兽用抗菌素药品批发企业数字化转型与智慧升级战略研究报告
- 果味型果冻企业ESG实践与创新战略研究报告
- 硫酸(折100%)企业县域市场拓展与下沉战略研究报告
- 铅笔刀批发企业ESG实践与创新战略研究报告
- 银行零售企业数字化转型与智慧升级战略研究报告
- 代收代付服务企业县域市场拓展与下沉战略研究报告
- 空调安装劳务合同8篇
- 农村建房清包工合同协议书
- 镍矿石购销合同
- (新版)电工三级-职业技能等级认定考试题库(学生用)
- 煤矿掘进探放水专项安全风险辨识评估标准
- 《高性能树脂》课件
- NB-T31052-2014风力发电场高处作业安全规程
- 中央2024年中央宣传部直属单位招聘106人笔试历年典型考题及考点附答案解析
- 《教育向美而生-》读书分享课件
- 拒绝校园欺凌从我做起完整版课件
- 幼儿园《认识医生和护士》课件
- 技术进口合同登记证
评论
0/150
提交评论