SlideShare a Scribd company logo
1 of 41
TPAM
Quest One Privileged Password Management
 Privileged Password Manager automates, controls
and secures the entire process of granting
administrators the credentials necessary to perform
their duties. Privileged Password Manager is deployed
on a secure, hardened appliance.
Introduction
 Privileged Password Manager ensures that when
administrators require elevated access (typically
through shared credentials, such as the Unix root
password), that access is granted according to
established policy, with appropriate approvals; that
all actions are fully audited and tracked; and that the
password is changed immediately upon its return.
 The Privileged Appliance and Modules (TPAM) suite from Dell
Software delivers privileged identity management and
privileged access control. The TPAM suite includes two
integrated modules:
 Privileged Password Manager (PPM)
 Enables secure storage, release control and change control of
privileged passwords across a heterogeneous deployment of systems
and applications, including passwords that are hardcoded in scripts,
procedures and programs.
 Privileged Session Manager (PSM)
 Enables you to issue privileged access for a specific period or session
to administrators, remote vendors and high-risk users, with full
recording and replay for auditing and compliance.
 Release control
 Manages password requests from authorized users,
programs and scripts for the accounts they are entitled to
access, via a secure Web browser connection with support for
mobile devices. A password request can be automatically
approved or require any level of manual approvals.
 Change control
 Supports configurable, granular change control of shared
credentials, including time-based, last-use-based, and manual
or forced change
Features
 Auto discovery of:
 Accounts and systems – Instantly discovers new
accounts and systems, and then either sends
notifications about them to specified users or
automatically enrolls them in management.
 Users – Automatically provisions users and maps
permissions using your organization’s existing LDAP or
Active Directory environment.
 Application password support
 Replaces hardcoded passwords in scripts, procedures and other programs.
 Application password management capabilities include:
 Programmatic access – Includes both a command-line interface (CLI) and an application programming
interface (API) with access for C++, Java, .NET and Perl. Connectivity is via SSH with DSS key exchange.
 Role-based access – Supports role-based access for the CLI and API. You add a “programmatic” user
with either “basic” access or “admin” access. Basic access enables the CLI or API to request account
passwords and be granted access for authorized targets or accounts; this is appropriate, for example,
for a “Requestor.” Admin access enables the CLI or API to perform administrative tasks.
 Optimal performance – Natively executes approximately 100 call requests per minute. For applications
requiring higher performance, the appliance supports an optional cache that supports more than 1,000
password requests a second, satisfying the requirements of your most demanding applications.
 Extensive command set – Includes a comprehensive set of commands that can be executed via the CLI
or API. Beyond simple “Get Password” commands, the solution supports extensive admin-level
commands to provide tight integration with existing enterprise tools and workflows.
 Enterprise-ready integration
 Integrates with existing directories, ticketing systems and user
authentication sources, including Active Directory and LDAP. It also fully
supports two-factor authentication through Defender® or other third-
party two-factor authentication products. A robust CLI/API supports end-
to-end integration with existing workflows and tools, including reviewer
notification and escalation workflows.
 Secure appliance
 Lacks a console port or console-level interface – the appliance can only
be accessed via a secure, role-based Web interface that provides
protection from host admin attacks, as well as OS, database or other
system-level modifications. The appliance also has an internal firewall
that protects against external network-based attacks and provides
additional auditing capabilities.
 Scalable appliance
 Provides secure, enterprise-ready access and management of shared
credentials for more than 250,000 accounts at once.
 Secure password storage
 Encrypts all passwords stored in Privileged Password Management using
AES 256 encryption. In addition, the appliance itself also includes full disk
encryption using BitLocker™ Drive Encryption.
 Robust target support
 Manages shared credentials on the widest range of target servers,
network devices and applications.
 Handheld device support
 Supports password request, approval and retrieval via handheld devices,
which is configurable on a per-user basis.
 Automated privileged governance
 Take the hassle out of governing privileged users by
automating the process for certifying and approving
that only users that need access can request and gain
access to privileged credentials. Users can request,
provision and attest to privileged and general user
access within the same console when you integrate
Identity Manager(D1IM) with Privileged Password
Manager.
 You have the option to purchase Distributed Processing Appliances
(DPAs) to increase the number of concurrent PSM sessions that can
be run.
 Each additional DPA supports up to 150 additional concurrent
sessions.
 PSM performs simplistic load balancing by sending the next session
record or replay request to the active DPA with the most available
sessions remaining.
 With DPA v3.0+ you can now assign a DPA to a system to optimize
password checking and changing. At the system level (on the
Affinity tab) you can assign the DPA that should perform password
checking and changing for all the accounts on that system.
Distributed Processing Appliances
(DPAs)
 High availability clustering is an option for customers to support
TPAM with a minimum of down time and eliminate a single point
of failure. Each appliance is configured with a cluster role.
 The cluster role choices are:
 Primary - Acts as the information source for the cluster. Only one
primary allowed per cluster.
 Replica - redundant appliance that is kept in synch with the
primary. Can be configured to automatically fail over if it loses
contact with the primary.
 Standalone - this role only applies to DPAs enrolled in the cluster
and cannot be changed.
High Availability Cluster
 Archive servers provide an external storage location
for logs and offline backup files from TPAM.
Archive Servers
 The Logs menu lets the System Administrator view many logs with critical
information about the appliance. All logs can be exported to an excel or csv
file.
 Logs available
 Sys-Admin Activity Log
 Security Log
 Firewall Log
 Database Log
 Alerts Log
 Proc Log
 Archive Log
 SysLog
Logs
 Reason codes can be configured for requestors and
ISAs to use when making a file, password or session
request. To enable reason codes make sure that the
reason code global settings have been set to Optional
or Required.
Reason Codes
 Global settings are used to maintain many key
controls and parameters in TPAM. The number
displayed in the Setting column represents the value
set for the Option Name.
Global Settings
 Password construction rules for managed systems are
system and account specific. Two managed accounts
on the same system can have different password
rules assigned. If a system and account have different
password rules the password rule assigned at the
account level takes precedence.
Password Rules
 TPAM uses mail (SMTP) to provide notifications to
approvers, requestors, reviewers, system contacts,
account contacts, as well as providing error alerting
for defined administrators.
Email Configuration
 The server time of the appliance is based on
coordinated universal time (UTC). The UTC time zone
never undergoes transitions between Standard and
Daylight Savings time.
Date and Time Configuration
 The SSH Private Key is stored on TPAM, and is used to
make secure connections to remote managed
systems. The remote systems have the public key of
the key pair. Dell Software provides an initial key pair
for these connections when TPAM is shipped. It is
common (and recommended) that these keys
eventually be replaced. This ensures that no one, not
even Dell Software, has the private key.
Keys and Certificates
 The automation engine is the heart of TPAM. This
portion of the TPAM architecture is where password
management on remote systems is configured and
scheduled. Once the automation engine is running,
several different agents can be enabled on the engine
to perform privileged password management
functions. Logs provide a record of agent activities
and messages of success or failure.
Automation Engine
 The agents in TPAM execute scheduled tasks for
different functions on a regular basis.
 Agents
 Daily Maintenance Agent
 Auto Discovery Agent
 Post-Session Processing Agent
 SSH Daemon
Agents
 Considering the value of the information stored in
TPAM the backup engine is an integral part of TPAM.
Backups can be configured to run on automatically
and moved securely to offline storage.
 The backup is always encrypted, so the backup can be
maintained without the risk of exposing sensitive
data.
Backups
 The alerts in TPAM allow you to receive notification
via email or SNMP, for over eighty different errors or
status notifications.
Alerts
 TPAM supports several different methods of external
authentication.
 Certificate Based Authentication
 SafeWord
 RSA SecurID
 LDAP
 Windows Active Directory
 RADIUS
 Quest Defender
External Authentication
 Ticket Systems are configured so that TPAM will validate ticket numbers and other
information about the request that are entered at the time the password, file, or
session request is submitted. If a password, file, or session is requested that requires a
Ticket Number, the number is passed to the indicated ticket system for a “yes/no”
answer. The validation may be as simple as “they entered a number and that’s all we
need” or as involved as “not only must the ticket number exist in the ticket system but
the data returned must match the user’s name, request, requested account, system,
dates, and so on.” More than one ticket system can be configured.
 If a password, file, or session request fails the validation rules that have been
configured the request is immediately canceled and the requestor has the option to
try again.
 To set up ticket systems you must complete the following steps:
 Configure the ticket system in the /admin interface.
 Assign the ticket system to systems, accounts and files in the /tpam interface
Ticket Systems
 Customers have the ability to upload a custom logo, that
will be displayed in the header of the TPAM web interface.
 In order to be uploaded as a custom logo the file must
meet the following requirements:
 JPEG, PNG, GIF or BMP file format
 GIF files must be static, no animation allowed
 Maximum size of 30KB
 Image dimensions must be between 10H x 10W and 47H x
120W pixels
Custom Logo
 When initially configuring your TPAM appliance you
need to update the license quantities that were
purchased. This is also needed if additional licenses
are purchased at a later date.
License Management
 The login banner and message of the day are two ways
that TPAM system administrators can post information for
users that log on to TPAM.
 They can be customized to display any text, such as a
company policy or legal warning message.
 Message of the day is a brief text message that will appear
on the home page of the /tpam, /admin, and /config
interfaces.
 The message of the day can also be added as an optional
message body tag in the email notifications sent by TPAM.
Login Banner and Message of the
Day
 To assist the TPAM System Administrator with troubleshooting
common network related problems, TPAM contains network
tools that are accessible from the configuration interface. In
addition, some specialized configurations can be made to add or
manage static routes.
 Net Tools
 The Ping Utility
 Nslookup Utility
 TraceRoute Utility
 Telnet Test Utility
 Route Table Management
Net Tools
 The O/S patch status page and the system status page
provide important information about the patch level
of the TPAM appliance.
System Status Page and O/S Patch
Status Page
 Product patches are not always cumulative. This means that some product
patches must be applied to the system in order and none can be skipped.
The release notes for each product update list the prerequisite version of
TPAM required before the update can be applied to the appliance.
 To apply a patch to TPAM perform the following steps:
 Check the current version of TPAM
 Take a backup.
 On Demand BackUp
 Download the patch from the Customer Portal
 Stop any applicable agents
 Apply the Patch
 Check the Patch Log for errors
 Restart any applicable agents
Software Updates
 Types of Software Updates
 Hotfix
 - a hotfix is a single, cumulative package that includes one or more files that are used to
address a problem in the product that cannot wait until the next scheduled upgrade. A
hotfix does not increment the software version number.
 Feature Pack
 - a feature pack is new product functionality that is distributed outside the context of a
product release and is typically included in the next scheduled upgrade. The software
version number is changed after an upgrade.
 Upgrade
 - an upgrade is a software package that replaces an installed version of TPAM with a newer
version of the product. The software version number is changed after an upgrade.
 OS Patches
 - patches for the specific purpose of upgrading the underlying TPAM OS. These patches
bear the distinct naming convention beginning with TPAM_OS.
 Documentation Patch
 - these patches update the online documentation available under the Help menu in TPAM.
 If the need arises to shutdown or restart your
appliance this can be done from the /config or /admin
interface.
Shut Down/Restart the Appliance
 In the event of a catastrophic failure a System Administrator can restore the
data using an offline backup to another appliance.
 Another use for restore is for test environments where customers may be
testing an upgrade to a new version of TPAM.
 Applying a restore will stop the automation engine, mail agent, and auto
discovery agents. These will not automatically restart when the restore is
complete, even if the auto start check boxes were selected prior to the
restore.
 Applying the restore will set any non-primary cluster members (replicas,
DPAs) to inactive. Once the restore is complete these will have to manually
be set to active on the cluster management page.
Restore and Revert
 Remote access to the /config interface is enabled by
default. When enabled, TPAM will allow access to the
/config interface through port 8443. To access the
/config interface remotely enter https://[IP
address]:8443/config.
Remote Access
 The TPAM command line interface (CLI) provides a method
for authorized system administrators or automated
processes to retrieve information from the TPAM system.
 Commands must be passed to TPAM via SSH (secure shell)
using an identity key file provided by TPAM.
 A specific CLI system administrator user ID is also required.
 SSH software must be installed on any system before it can
be used for TPAM CLI access.
CLI Commands for the System
Administrator
 Commands accept parameters in the style of --OptionName
option value (two dashes precede the option name) with the
exception of the GetStatus command.
 Existing commands prior to TPAM v2.2.754 still also accept the
comma-separated syntax, so existing scripts do not need to be
modified unless you wish to take advantage of new parameters
that have been added to the command in later versions of
TPAM.
 All commands recognize an option of --Help. This expanded help
syntax will show all valid options for each command, whether
the option is required or optional, and a description of the
option and allowed values.
 If it becomes necessary to relocate and readdress a
TPAM primary or replica
 Change a Primary’s IP Address
 Change a Replica’s IP Address
Relocating/Readdressing an
Appliance
 The kiosk should ONLY be accessed if recommended
by Technical support. You will not be able to perform
any of these functions without technical support
providing you the keys needed.
 The functions available on the kiosk are to be used as
a last resort before having to return the appliance if
an issue cannot be fixed over the phone with
technical support.
Kiosk Access
TPAM
Quest One Privileged Password Management

More Related Content

What's hot

Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Vinayak Hegde
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsPresentologics
 
3 windowssecurity
3 windowssecurity3 windowssecurity
3 windowssecurityricharddxd
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsJohn Rhoton
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin PrivilegesBeyondTrust
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)cnokia
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-dataKevin Mayo
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementDsunte Wilson
 
Desktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 PresentationDesktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 Presentationdesktopalert
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7Symantec
 
Deployment websese
Deployment webseseDeployment websese
Deployment websesethanglx
 
Operating System Security
Operating System SecurityOperating System Security
Operating System SecurityRamesh Upadhaya
 
Technology
TechnologyTechnology
Technologysam ran
 
Module 17 (novell hacking)
Module 17 (novell hacking)Module 17 (novell hacking)
Module 17 (novell hacking)Wail Hassan
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating systemBhagyashree Barde
 

What's hot (20)

Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)Microsoft (Data Protection Solutions)
Microsoft (Data Protection Solutions)
 
Windows Server 2008 Security Enhancements
Windows Server 2008 Security EnhancementsWindows Server 2008 Security Enhancements
Windows Server 2008 Security Enhancements
 
3 windowssecurity
3 windowssecurity3 windowssecurity
3 windowssecurity
 
A Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection SolutionsA Critical Analysis of Microsoft Data Protection Solutions
A Critical Analysis of Microsoft Data Protection Solutions
 
8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges8-step Guide to Administering Windows without Domain Admin Privileges
8-step Guide to Administering Windows without Domain Admin Privileges
 
Operating system security (a brief)
Operating system security (a brief)Operating system security (a brief)
Operating system security (a brief)
 
Secure nets-and-data
Secure nets-and-dataSecure nets-and-data
Secure nets-and-data
 
Ikon Managed Services
Ikon Managed ServicesIkon Managed Services
Ikon Managed Services
 
Ikon Managed Services
Ikon Managed ServicesIkon Managed Services
Ikon Managed Services
 
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database ManagementSYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
SYMANTEC ENDPOINT PROTECTION Performing Server and Database Management
 
Desktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 PresentationDesktop Alert Lite 4.0 Presentation
Desktop Alert Lite 4.0 Presentation
 
Altiris IT Management Suite 7
Altiris IT Management Suite 7Altiris IT Management Suite 7
Altiris IT Management Suite 7
 
Enea Element Datasheet
Enea Element DatasheetEnea Element Datasheet
Enea Element Datasheet
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
Privileged Access Manager POC Guidelines
Privileged Access Manager  POC GuidelinesPrivileged Access Manager  POC Guidelines
Privileged Access Manager POC Guidelines
 
Operating System Security
Operating System SecurityOperating System Security
Operating System Security
 
Windows server hardening 1
Windows server hardening 1Windows server hardening 1
Windows server hardening 1
 
Technology
TechnologyTechnology
Technology
 
Module 17 (novell hacking)
Module 17 (novell hacking)Module 17 (novell hacking)
Module 17 (novell hacking)
 
Design for security in operating system
Design for security in operating systemDesign for security in operating system
Design for security in operating system
 

Similar to Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online

Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlAidy Tificate
 
Amarjeet_Updated_Resume
Amarjeet_Updated_ResumeAmarjeet_Updated_Resume
Amarjeet_Updated_ResumeAmarjeet Kumar
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramBeyondTrust
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're InfectedTripwire
 
Chapter 09
Chapter 09Chapter 09
Chapter 09cclay3
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer Englishcynapspro GmbH
 
PSU Security Conference 2015 - LAPS Presentation
PSU Security Conference 2015 - LAPS PresentationPSU Security Conference 2015 - LAPS Presentation
PSU Security Conference 2015 - LAPS PresentationDan Barr
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager IntroductionAidy Tificate
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxssuser20fcbe
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3jemtallon
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyAmazon Web Services
 
Haloteq Presentation
Haloteq PresentationHaloteq Presentation
Haloteq Presentationmhaynes2010
 
FreeBSD System Administration Using SysAdm
FreeBSD System Administration Using SysAdmFreeBSD System Administration Using SysAdm
FreeBSD System Administration Using SysAdmDru Lavigne
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathanaminpathan11
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?BeyondTrust
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdfDeepakAC3
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsBeyondTrust
 

Similar to Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online (20)

Dell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access ControlDell Quest TPAM Privileged Access Control
Dell Quest TPAM Privileged Access Control
 
Amarjeet_Updated_Resume
Amarjeet_Updated_ResumeAmarjeet_Updated_Resume
Amarjeet_Updated_Resume
 
Tips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management ProgramTips to Remediate your Vulnerability Management Program
Tips to Remediate your Vulnerability Management Program
 
"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected"Backoff" Malware: How to Know If You're Infected
"Backoff" Malware: How to Know If You're Infected
 
Chapter 09
Chapter 09Chapter 09
Chapter 09
 
CryptionPro Hdd Flyer English
CryptionPro Hdd Flyer EnglishCryptionPro Hdd Flyer English
CryptionPro Hdd Flyer English
 
PSU Security Conference 2015 - LAPS Presentation
PSU Security Conference 2015 - LAPS PresentationPSU Security Conference 2015 - LAPS Presentation
PSU Security Conference 2015 - LAPS Presentation
 
Dell Password Manager Introduction
Dell Password Manager IntroductionDell Password Manager Introduction
Dell Password Manager Introduction
 
FOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptxFOISDBA-Ver1.1.pptx
FOISDBA-Ver1.1.pptx
 
Operations: Security
Operations: SecurityOperations: Security
Operations: Security
 
access-control-week-3
access-control-week-3access-control-week-3
access-control-week-3
 
Operations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your CompanyOperations: Security Crash Course — Best Practices for Securing your Company
Operations: Security Crash Course — Best Practices for Securing your Company
 
Haloteq Presentation
Haloteq PresentationHaloteq Presentation
Haloteq Presentation
 
FreeBSD System Administration Using SysAdm
FreeBSD System Administration Using SysAdmFreeBSD System Administration Using SysAdm
FreeBSD System Administration Using SysAdm
 
System security by Amin Pathan
System security by Amin PathanSystem security by Amin Pathan
System security by Amin Pathan
 
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
Eyes Wide Shut: What Do Your Passwords Do When No One is Watching?
 
59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf59264945-Websphere-Security.pdf
59264945-Websphere-Security.pdf
 
APPM_English_v1
APPM_English_v1APPM_English_v1
APPM_English_v1
 
Null Meet Ppt
Null Meet PptNull Meet Ppt
Null Meet Ppt
 
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing WindowsAvoiding the 10 Deadliest and Most Common Sins for Securing Windows
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
 

More from wardell henley

RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfwardell henley
 
Landscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdfLandscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdfwardell henley
 
Facets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdfFacets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdfwardell henley
 
self_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdfself_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdfwardell henley
 
Itil a guide to cab meetings pdf
Itil a guide to cab meetings pdfItil a guide to cab meetings pdf
Itil a guide to cab meetings pdfwardell henley
 
9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmp9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmpwardell henley
 
15466 mba technology_white_paper
15466 mba technology_white_paper15466 mba technology_white_paper
15466 mba technology_white_paperwardell henley
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingwardell henley
 
213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmen213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmenwardell henley
 
Cissp chapter-05ppt178
Cissp chapter-05ppt178Cissp chapter-05ppt178
Cissp chapter-05ppt178wardell henley
 
Enterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securitywardell henley
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01wardell henley
 
Splunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandardsSplunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandardswardell henley
 
Ms app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguideMs app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguidewardell henley
 
IBM enterprise Content Management
IBM enterprise Content ManagementIBM enterprise Content Management
IBM enterprise Content Managementwardell henley
 

More from wardell henley (20)

RP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdfRP_Patch_Management_S508C.pdf
RP_Patch_Management_S508C.pdf
 
mita_overview.pdf
mita_overview.pdfmita_overview.pdf
mita_overview.pdf
 
Landscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdfLandscape_Medicaid_Healthcare_Information_Technology.pdf
Landscape_Medicaid_Healthcare_Information_Technology.pdf
 
Facets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdfFacets Overview and Navigation User Guide.pdf
Facets Overview and Navigation User Guide.pdf
 
self_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdfself_inspect_handbook_nisp.pdf
self_inspect_handbook_nisp.pdf
 
Itil a guide to cab meetings pdf
Itil a guide to cab meetings pdfItil a guide to cab meetings pdf
Itil a guide to cab meetings pdf
 
Mn bfdsprivacy
Mn bfdsprivacyMn bfdsprivacy
Mn bfdsprivacy
 
9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmp9 150928065812-lva1-app6892 gmp
9 150928065812-lva1-app6892 gmp
 
It security cert_508
It security cert_508It security cert_508
It security cert_508
 
15466 mba technology_white_paper
15466 mba technology_white_paper15466 mba technology_white_paper
15466 mba technology_white_paper
 
Best practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_trainingBest practices for_implementing_security_awareness_training
Best practices for_implementing_security_awareness_training
 
213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmen213946 dmarc-architecture-identifier-alignmen
213946 dmarc-architecture-identifier-alignmen
 
Soa security2
Soa security2Soa security2
Soa security2
 
Cissp chapter-05ppt178
Cissp chapter-05ppt178Cissp chapter-05ppt178
Cissp chapter-05ppt178
 
Enterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20securityEnterprise%20 security%20architecture%20 %20business%20driven%20security
Enterprise%20 security%20architecture%20 %20business%20driven%20security
 
3 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp013 securityarchitectureandmodels-120331064706-phpapp01
3 securityarchitectureandmodels-120331064706-phpapp01
 
Splunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandardsSplunk 7.2.3-security-hardeningstandards
Splunk 7.2.3-security-hardeningstandards
 
Ms app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguideMs app 1.5.1-msinfra-bestpracticesguide
Ms app 1.5.1-msinfra-bestpracticesguide
 
IBM enterprise Content Management
IBM enterprise Content ManagementIBM enterprise Content Management
IBM enterprise Content Management
 
oracle EBS
oracle EBSoracle EBS
oracle EBS
 

Recently uploaded

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?XfilesPro
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAndikSusilo4
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 

Recently uploaded (20)

Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?How to Remove Document Management Hurdles with X-Docs?
How to Remove Document Management Hurdles with X-Docs?
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Azure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & ApplicationAzure Monitor & Application Insight to monitor Infrastructure & Application
Azure Monitor & Application Insight to monitor Infrastructure & Application
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 

Asecurity-guidelines_and_best_practices_for_retail_online_and_business_online

  • 1. TPAM Quest One Privileged Password Management
  • 2.  Privileged Password Manager automates, controls and secures the entire process of granting administrators the credentials necessary to perform their duties. Privileged Password Manager is deployed on a secure, hardened appliance. Introduction
  • 3.  Privileged Password Manager ensures that when administrators require elevated access (typically through shared credentials, such as the Unix root password), that access is granted according to established policy, with appropriate approvals; that all actions are fully audited and tracked; and that the password is changed immediately upon its return.
  • 4.  The Privileged Appliance and Modules (TPAM) suite from Dell Software delivers privileged identity management and privileged access control. The TPAM suite includes two integrated modules:  Privileged Password Manager (PPM)  Enables secure storage, release control and change control of privileged passwords across a heterogeneous deployment of systems and applications, including passwords that are hardcoded in scripts, procedures and programs.  Privileged Session Manager (PSM)  Enables you to issue privileged access for a specific period or session to administrators, remote vendors and high-risk users, with full recording and replay for auditing and compliance.
  • 5.  Release control  Manages password requests from authorized users, programs and scripts for the accounts they are entitled to access, via a secure Web browser connection with support for mobile devices. A password request can be automatically approved or require any level of manual approvals.  Change control  Supports configurable, granular change control of shared credentials, including time-based, last-use-based, and manual or forced change Features
  • 6.  Auto discovery of:  Accounts and systems – Instantly discovers new accounts and systems, and then either sends notifications about them to specified users or automatically enrolls them in management.  Users – Automatically provisions users and maps permissions using your organization’s existing LDAP or Active Directory environment.
  • 7.  Application password support  Replaces hardcoded passwords in scripts, procedures and other programs.  Application password management capabilities include:  Programmatic access – Includes both a command-line interface (CLI) and an application programming interface (API) with access for C++, Java, .NET and Perl. Connectivity is via SSH with DSS key exchange.  Role-based access – Supports role-based access for the CLI and API. You add a “programmatic” user with either “basic” access or “admin” access. Basic access enables the CLI or API to request account passwords and be granted access for authorized targets or accounts; this is appropriate, for example, for a “Requestor.” Admin access enables the CLI or API to perform administrative tasks.  Optimal performance – Natively executes approximately 100 call requests per minute. For applications requiring higher performance, the appliance supports an optional cache that supports more than 1,000 password requests a second, satisfying the requirements of your most demanding applications.  Extensive command set – Includes a comprehensive set of commands that can be executed via the CLI or API. Beyond simple “Get Password” commands, the solution supports extensive admin-level commands to provide tight integration with existing enterprise tools and workflows.
  • 8.  Enterprise-ready integration  Integrates with existing directories, ticketing systems and user authentication sources, including Active Directory and LDAP. It also fully supports two-factor authentication through Defender® or other third- party two-factor authentication products. A robust CLI/API supports end- to-end integration with existing workflows and tools, including reviewer notification and escalation workflows.  Secure appliance  Lacks a console port or console-level interface – the appliance can only be accessed via a secure, role-based Web interface that provides protection from host admin attacks, as well as OS, database or other system-level modifications. The appliance also has an internal firewall that protects against external network-based attacks and provides additional auditing capabilities.
  • 9.  Scalable appliance  Provides secure, enterprise-ready access and management of shared credentials for more than 250,000 accounts at once.  Secure password storage  Encrypts all passwords stored in Privileged Password Management using AES 256 encryption. In addition, the appliance itself also includes full disk encryption using BitLocker™ Drive Encryption.  Robust target support  Manages shared credentials on the widest range of target servers, network devices and applications.  Handheld device support  Supports password request, approval and retrieval via handheld devices, which is configurable on a per-user basis.
  • 10.  Automated privileged governance  Take the hassle out of governing privileged users by automating the process for certifying and approving that only users that need access can request and gain access to privileged credentials. Users can request, provision and attest to privileged and general user access within the same console when you integrate Identity Manager(D1IM) with Privileged Password Manager.
  • 11.  You have the option to purchase Distributed Processing Appliances (DPAs) to increase the number of concurrent PSM sessions that can be run.  Each additional DPA supports up to 150 additional concurrent sessions.  PSM performs simplistic load balancing by sending the next session record or replay request to the active DPA with the most available sessions remaining.  With DPA v3.0+ you can now assign a DPA to a system to optimize password checking and changing. At the system level (on the Affinity tab) you can assign the DPA that should perform password checking and changing for all the accounts on that system. Distributed Processing Appliances (DPAs)
  • 12.  High availability clustering is an option for customers to support TPAM with a minimum of down time and eliminate a single point of failure. Each appliance is configured with a cluster role.  The cluster role choices are:  Primary - Acts as the information source for the cluster. Only one primary allowed per cluster.  Replica - redundant appliance that is kept in synch with the primary. Can be configured to automatically fail over if it loses contact with the primary.  Standalone - this role only applies to DPAs enrolled in the cluster and cannot be changed. High Availability Cluster
  • 13.  Archive servers provide an external storage location for logs and offline backup files from TPAM. Archive Servers
  • 14.  The Logs menu lets the System Administrator view many logs with critical information about the appliance. All logs can be exported to an excel or csv file.  Logs available  Sys-Admin Activity Log  Security Log  Firewall Log  Database Log  Alerts Log  Proc Log  Archive Log  SysLog Logs
  • 15.  Reason codes can be configured for requestors and ISAs to use when making a file, password or session request. To enable reason codes make sure that the reason code global settings have been set to Optional or Required. Reason Codes
  • 16.  Global settings are used to maintain many key controls and parameters in TPAM. The number displayed in the Setting column represents the value set for the Option Name. Global Settings
  • 17.  Password construction rules for managed systems are system and account specific. Two managed accounts on the same system can have different password rules assigned. If a system and account have different password rules the password rule assigned at the account level takes precedence. Password Rules
  • 18.  TPAM uses mail (SMTP) to provide notifications to approvers, requestors, reviewers, system contacts, account contacts, as well as providing error alerting for defined administrators. Email Configuration
  • 19.  The server time of the appliance is based on coordinated universal time (UTC). The UTC time zone never undergoes transitions between Standard and Daylight Savings time. Date and Time Configuration
  • 20.  The SSH Private Key is stored on TPAM, and is used to make secure connections to remote managed systems. The remote systems have the public key of the key pair. Dell Software provides an initial key pair for these connections when TPAM is shipped. It is common (and recommended) that these keys eventually be replaced. This ensures that no one, not even Dell Software, has the private key. Keys and Certificates
  • 21.  The automation engine is the heart of TPAM. This portion of the TPAM architecture is where password management on remote systems is configured and scheduled. Once the automation engine is running, several different agents can be enabled on the engine to perform privileged password management functions. Logs provide a record of agent activities and messages of success or failure. Automation Engine
  • 22.  The agents in TPAM execute scheduled tasks for different functions on a regular basis.  Agents  Daily Maintenance Agent  Auto Discovery Agent  Post-Session Processing Agent  SSH Daemon Agents
  • 23.  Considering the value of the information stored in TPAM the backup engine is an integral part of TPAM. Backups can be configured to run on automatically and moved securely to offline storage.  The backup is always encrypted, so the backup can be maintained without the risk of exposing sensitive data. Backups
  • 24.  The alerts in TPAM allow you to receive notification via email or SNMP, for over eighty different errors or status notifications. Alerts
  • 25.  TPAM supports several different methods of external authentication.  Certificate Based Authentication  SafeWord  RSA SecurID  LDAP  Windows Active Directory  RADIUS  Quest Defender External Authentication
  • 26.  Ticket Systems are configured so that TPAM will validate ticket numbers and other information about the request that are entered at the time the password, file, or session request is submitted. If a password, file, or session is requested that requires a Ticket Number, the number is passed to the indicated ticket system for a “yes/no” answer. The validation may be as simple as “they entered a number and that’s all we need” or as involved as “not only must the ticket number exist in the ticket system but the data returned must match the user’s name, request, requested account, system, dates, and so on.” More than one ticket system can be configured.  If a password, file, or session request fails the validation rules that have been configured the request is immediately canceled and the requestor has the option to try again.  To set up ticket systems you must complete the following steps:  Configure the ticket system in the /admin interface.  Assign the ticket system to systems, accounts and files in the /tpam interface Ticket Systems
  • 27.  Customers have the ability to upload a custom logo, that will be displayed in the header of the TPAM web interface.  In order to be uploaded as a custom logo the file must meet the following requirements:  JPEG, PNG, GIF or BMP file format  GIF files must be static, no animation allowed  Maximum size of 30KB  Image dimensions must be between 10H x 10W and 47H x 120W pixels Custom Logo
  • 28.  When initially configuring your TPAM appliance you need to update the license quantities that were purchased. This is also needed if additional licenses are purchased at a later date. License Management
  • 29.  The login banner and message of the day are two ways that TPAM system administrators can post information for users that log on to TPAM.  They can be customized to display any text, such as a company policy or legal warning message.  Message of the day is a brief text message that will appear on the home page of the /tpam, /admin, and /config interfaces.  The message of the day can also be added as an optional message body tag in the email notifications sent by TPAM. Login Banner and Message of the Day
  • 30.  To assist the TPAM System Administrator with troubleshooting common network related problems, TPAM contains network tools that are accessible from the configuration interface. In addition, some specialized configurations can be made to add or manage static routes.  Net Tools  The Ping Utility  Nslookup Utility  TraceRoute Utility  Telnet Test Utility  Route Table Management Net Tools
  • 31.  The O/S patch status page and the system status page provide important information about the patch level of the TPAM appliance. System Status Page and O/S Patch Status Page
  • 32.  Product patches are not always cumulative. This means that some product patches must be applied to the system in order and none can be skipped. The release notes for each product update list the prerequisite version of TPAM required before the update can be applied to the appliance.  To apply a patch to TPAM perform the following steps:  Check the current version of TPAM  Take a backup.  On Demand BackUp  Download the patch from the Customer Portal  Stop any applicable agents  Apply the Patch  Check the Patch Log for errors  Restart any applicable agents Software Updates
  • 33.  Types of Software Updates  Hotfix  - a hotfix is a single, cumulative package that includes one or more files that are used to address a problem in the product that cannot wait until the next scheduled upgrade. A hotfix does not increment the software version number.  Feature Pack  - a feature pack is new product functionality that is distributed outside the context of a product release and is typically included in the next scheduled upgrade. The software version number is changed after an upgrade.  Upgrade  - an upgrade is a software package that replaces an installed version of TPAM with a newer version of the product. The software version number is changed after an upgrade.  OS Patches  - patches for the specific purpose of upgrading the underlying TPAM OS. These patches bear the distinct naming convention beginning with TPAM_OS.  Documentation Patch  - these patches update the online documentation available under the Help menu in TPAM.
  • 34.  If the need arises to shutdown or restart your appliance this can be done from the /config or /admin interface. Shut Down/Restart the Appliance
  • 35.  In the event of a catastrophic failure a System Administrator can restore the data using an offline backup to another appliance.  Another use for restore is for test environments where customers may be testing an upgrade to a new version of TPAM.  Applying a restore will stop the automation engine, mail agent, and auto discovery agents. These will not automatically restart when the restore is complete, even if the auto start check boxes were selected prior to the restore.  Applying the restore will set any non-primary cluster members (replicas, DPAs) to inactive. Once the restore is complete these will have to manually be set to active on the cluster management page. Restore and Revert
  • 36.  Remote access to the /config interface is enabled by default. When enabled, TPAM will allow access to the /config interface through port 8443. To access the /config interface remotely enter https://[IP address]:8443/config. Remote Access
  • 37.  The TPAM command line interface (CLI) provides a method for authorized system administrators or automated processes to retrieve information from the TPAM system.  Commands must be passed to TPAM via SSH (secure shell) using an identity key file provided by TPAM.  A specific CLI system administrator user ID is also required.  SSH software must be installed on any system before it can be used for TPAM CLI access. CLI Commands for the System Administrator
  • 38.  Commands accept parameters in the style of --OptionName option value (two dashes precede the option name) with the exception of the GetStatus command.  Existing commands prior to TPAM v2.2.754 still also accept the comma-separated syntax, so existing scripts do not need to be modified unless you wish to take advantage of new parameters that have been added to the command in later versions of TPAM.  All commands recognize an option of --Help. This expanded help syntax will show all valid options for each command, whether the option is required or optional, and a description of the option and allowed values.
  • 39.  If it becomes necessary to relocate and readdress a TPAM primary or replica  Change a Primary’s IP Address  Change a Replica’s IP Address Relocating/Readdressing an Appliance
  • 40.  The kiosk should ONLY be accessed if recommended by Technical support. You will not be able to perform any of these functions without technical support providing you the keys needed.  The functions available on the kiosk are to be used as a last resort before having to return the appliance if an issue cannot be fixed over the phone with technical support. Kiosk Access
  • 41. TPAM Quest One Privileged Password Management