chapter 14 Flashcards

1
Q

(blank) is a PAM solution when all the components are owned and operated by the customer

an entirely on-premises installation of the vault and all the different components

an entirely cloud-based deployment where the vault and components are deployed to one of the supported cloud platforms, ie. aws, azure

a hybrid deployment in chich some components are in the cloud and others, very often the vault, are installed on-premises

cyberark privilege cloud - PAM as SaaS
the privileged access manager is delivered as software as a service

A

PAM self hosted

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

PAM self-hosted components

(blank) - a secure server used to store privileged account information, based on a hardened windows server platform

(blank) - the web interface for users to gain access to privileged account information, used by vault admins to configure policies

(blank) - performs the password changes on devices, scan the network for privileged accounts

(blank) - isolates and monitors privileged account activity

(blank) - monitors and detects malicious privileged account behaviour

A

secure digital vault

password vault web access (PVWA)

central policy manager (CPM)

privileged session manager (PSM)

privileged threat analytics (PTA)

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

installation of the vault adds 6 new services.

  • cyberark event notification engine
  • cyberark hardened windows firewall
  • (blank)
  • private ark database
  • private ark remote control agent
  • (blank)

it also decreases the total number of running services

A

cyberark logic container

private ark server

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

vault installation changes the firewall by (blank) all of the firewall rules that do not relate to cyberark both inbound and outbound

A

deleting

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

there are 4 vault configuration files

(blank) - main configuration file of the vault, any change requires a restart of the vault service

(blank) - configure password policy for users of the vault

(blank) - configure remote control agent in the vault, SNMP configuration

(blank) - configure the physical disks used to store vault data

A

dbparm.ini

passpartm.ini

PARagent.ini

tsparm.ini

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

the dbparm.ini contains the current vault configuration file, contains parameters for log level, server key, syslog, timeouts, recovery key, etc

(blank) - contains all the possible configurations options, full info on these parameters is contained in the PAM documentation

(blank) - contains the last known working configuration of the dbparm.ini file. created automatically when the vault server starts up

A

dbparm.sample.ini

dbparm.ini.good

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what are the vault log files

(blank) - main log file of the vault server

(blank) - trace file of the vault, it is detailed according to the debug level configured in the dbparm.ini file

A

italog.log

trace.d0
.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

the PVWA is a web application running on IIS, you can control it through the IIS manager interface or use the command line by running

(blank)

or iisreset /status

to check status of website

A

iisreset /restart

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

PVWA directories IIS folder

PVWA application files are located in (blank)

webpage: IIS virtual folder - passwordvault

A

c:\cyberark\password vault web access\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

the PVWA log location is (blank)

can be changed by going to the passwordvault folder under IIS, opening the file web.config and modifying the logfolder parameter

A

%windir%\temp\PVWA\

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

the cpm has 2 main services

(blank) - is the scanner for the accounts feed workflow

(blank) is a batch processor that connects to the vault looking for work to do and kicks off the necessary processes to complete that work

A

cyberark central policy manager scanner

cyberark password manager service

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

3 main cpm directories

(blank) - contains all the files required to run the cpm and change password processes on target machines

(blank) - contains cpm activity log files

(blank) - contains files that are used the cpm for internal processing

(blank) - contains the configuration that tells the cpm where to find the vault and how to connect

A

bin

logs

tmp

vault

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

the cpm has 3 main log folders

activity logs (logs folder):

(blank) - contains all the log messages, including general and informative messages, errors and warnings

(blank) - contains only warning and error messages

third party log files (logs\thirdparty folder)

generated by the CPM’s password generation plug-ins when an error occurs

name of log file: <type>-<Safe>-<folder>-<name>.log</name></folder></Safe></type>

E.g., Operating System-UnixSSH-1.1.1.250-Root.log

history log files (logs\history folder) - after a log file has been uploaded into the safe, it is renamed and moved into the history subfolder

the file is marked with a time stamp and renamed as follows: <filename> (<date>-<time>).log</time></date></filename>

A

pm.log

pm_error.log

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

in the (blank) directory, you’ll find all the configuration files, logs, and connectors that allow end users to connect to target systems

A

psm

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

all activities that are carried out by the psm are written to log files and stored in the log subfolder of the psm installation folder

the (blank).log file contains informational messages and errors that refer to psm function

(blank).recorder.log contains error and trace messages related to the psm recorder that can be used for troubleshooting with session video recordings. the types of messages that are included depend on the debug levels specified in the recorder settings of the psm configuration

<Sessionid>.(blank).log contains errors and trace messages related to the connection client that can be used for troubleshooting
</Sessionid>

A

PSMConsole

<SessionID>

<Connection>
</Connection></SessionID>

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

there are 2 local users on the PSM servers

(blank) - is used by auditors when connecting via RDP to the PSM to monitor other users’ RDP connections

(blank) - is used when an end user launches a connection to a target system via PSM

A

PSMAdminConnect

PSMConnect

17
Q

the credentials for the psmconnect and psmadminconnect users are stored as accounts in the (blank) and should be managed in the same way as any other account

18
Q

when a vault user launches a session via the PSM for non-rdp connection (e.g. SSH) for the first time, a shadow user is created for the user on the (blank) server

this shadow users launches the application needed for the connection (putty in the case of an SSH connection)

the credentials for these users are reset with every connection

19
Q

there are 3 internal safes created during the vault installation

(blank) - used by the ENE service

(blank) - contains the file links for dbparm.ini, etc

(blank) - contains configuration data for cyberark LDAP integration

A

notification engine

system

VaultInternal

20
Q

the vault’s main configuration files and logs can be accessed in the system safe from remote stations using the (blank)

a new (blank) file can be copied into this safe to update the license without the need to restart the vault service

A

PrivateArk client

license.xml

21
Q

CPM internal safes

The installation of the first CPM will create 8 Safes:
* PasswordManager
* PasswordManager_Accounts
* PasswordManager_ADInternal
* PasswordManager_info
* PasswordManager_Pending
* PasswordManager_workspace
* PasswordManagerShared
* PasswordManagerTemp

Additional CPMs will share some
Safes and create some additional
new ones.

22
Q

tools > administrative tools > users and groups

by default, the first CPM user’s name is (blank)

when creating a new safe through the PVWA, the CPM user is automatically added to the Safe

A

PasswordManager

23
Q

PVWA Safes

PVWAConfig - configuration settings for PVWA

PVWAPrivateUserPrefs - user preference settings

Note: the above two safes should not be accessed directly

(blank) - contains the help documents that can be accessed in the PVWA

PVWAReports - completed reports

PVWATaskDefinitions - report definitions

(blank) - information on integrations with third-party ticketing systems

PVWAUserPrefs - changes to individual user preferences

A

PVWAPublicData

PVWATicketingSytem

24
Q

PSM Safes

PSM - contains the password objects for PSMConnect and PSMAdminConnect

PSMLiveSessions - allows users to monitor live sessions

PSMNotifications - allows users to terminate, suspend or resume sessions

(blank) - default safe for storing recordings

PSM Sessions - allows users to launch sessions via PSM

(blank) - used in auto deployment for PSM connectors to multiple PSMs

PSMUnmanagedSessions - allows users to monitor live ad-hoc sessions

A

PSMRecordings

PSMUniversalConnectors

25
PSM Vault Users (blank)_ - used by the PSM for internal processing, the credential file for this user is stored on the PSM server in a file named psmapp.cred, this user is automatically added to the PSMAppUsers grou (blank)_ - this is the gateway user through which the PSM will access the vault to retrieve the target machine password, the credential file for this user is stored on the PSM server in a file named psmgw.cred, this user is added automatically to PVWAGWAccounts group. Being a member of this group enables this user to access all password safes
PSMApp PSMGW
26
PSM Vault groups (blank) - the group is used to retreive configuration data from the vault, create recording safes, upload recording, and perform other PSM activities (blank) - members of this group can terminate, suspend, and resume live sessions (blank) - the group manages the safes where recordings are stored. it is added to the recordings safes with all authorizations
PSMAppUsers PSMLive Session Terminators PSMMaster
27
Connecting to the vault components communicate with the vault using the cyberark propriety protocol on port (blank) components must first authenticate to the vault each time they are started each component has a user id and password stored in a credential file
1858
28
CPM example vault address and credentials components communicate with the using the following configuration files (blank) - contains the vault address and port (blank) - contains the user name and a hash of the password used to authenticate to the vault
vault.ini cred file
29
CPM example vault credential files when the (blank) authenticates to the (blank), it uses the credentials stored in the file (blank) which contains the CPM username and a hash of the password after the cpm successfully authenticates, the password in the vault and cred file are rotated
CPM Vault user.ini (the cred file)
30
component internal communication historically, components communicated directly with the vault using the cyberark proprietary protocol over port 1858 now, new functionalities use (blank) instead of the cyberark proprietary protocol components communicate with the PVWA (blank) and the PVWA performs the actions on the vault
REST REST
31
API Address and keys When using REST to communicate with the vault, components use the following configuration files the (blank) - which contains the API address (PVWA) and the (blank) file which contains the private key used to authenticate to the vault via REST
vault.ini ApiKey
32
CPM example API keys an (blank) key pair is used to provide a secure way for automated API calls and scripts, as well as cyberark clients, to communicate with the vault the private key is stored locally for use by the script or cyberark client, while the public key is stored in the vault both keys are associated with a username that was previously created in the vault and used for API authentication
asymmetric