chapter 9 Flashcards

1
Q

Discovery and
Onboarding Methods

(blank)

  • Add multiple accounts from file
  • Accounts Discovery & Onboarding Rules

(blank)

  • Discovery and Audit (DNA)
  • Rest API
A

Add a single account

Continuous Accounts Discovery

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

what are the steps to add a single account?

A

select system type

assign to platform

store in safe

define properties

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Frequently there is a need to upload many known accounts from an existing repository
* This is especially valuable during the early stages of implementing CyberArk PAM,
migrating from another solution, or when onboarding a new department into the
PAM solution

You can download a sample CSV file
* Once you have provided the data on the accounts to create, you can then upload the file to the system for processing,
either by browsing to the file or using drag & drop

Account parameters to be uploaded to the Vault are entered into a text file as Comma Separated Values (CSV)
* Each row represents an
account and contains the
properties for that account

what are some of the limitations of using a file to create accounts?

Linked accounts and dependencies are not supported

(blank)

(blank)
* The upload process cannot be cancelled once started
* You must wait for the current file to finish uploading before
you can upload another file
* Multiple users cannot upload files at the same time

A
  • All accounts must be uploaded into existing
    Safes and groups
  • Each file can contain a maximum of 10,000 accounts
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Accounts Discovery Workflow processes

(blank) - continually scan the windows and linux environments to detect privileged credentials and accounts

onboard - add all discovered privileged accounts to the pending list to validate privilege

(blank) - automatically add privileged accounts to be managed and rotated in the digital vault

onboarding rules - minimize the time to onboards accounts and prevents human errors that may occur during manual onboarding

A

discover

manage

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

Windows Discovery steps

(blank) creates the
Discovery

  • CPM Scanner connects to the Vault and collects the task
  • CPM scans the Directory
  • CPM authenticates to the targets and scan for Accounts
  • Accounts are filtered by the Automatic Onboarding Rules
  • Accounts which fit a rule are onboarded in the appropriate Safe
  • Accounts which do not fit a rule are stored in the <blank> for manual onboarding</blank>
A

vault admin

pending safe

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

what are the steps for Running a New Windows Discovery

go to (blank) tab.
Under Accounts Feed,
click on Pending & Discovery and then
Discovery Management.
* Available to members of the Vault Admins group

then click new windows discovery

A

accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

what information is needed to run a new windows discovery

1
2
3
4
5
6

A

domain name

choose if a secure connection will be used to connect to active directory

scan account name - Be a domain account
* Have the following
permissions:
⎼ Read permissions on the
Active Directory
⎼ Local administrative rights on discovered Windows servers and workstations

OU of Servers / Workstations in AD

  • CPM to perform the scan
  • Whether to run a recurring or one-time discovery
How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

once the discovery is created, what happens?

the new discovery will be listed on the (blank) page

the status will be listed as (blank) until the processes starts

the status will change to running when the process starts

you have buttons to stop or delete the discovery

A

discovery managment

pending

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

Multiple discoveries from
different (blank) can run
simultaneously
* Accounts found will be
categorized as Privileged /Non-Privileged:
⎼ The categorization is based on the group membership
⎼ If the account is a member of any Local Administrators group, the account is privileged
⎼ The account will remain privileged until removed from all machines it
was discovered on

A

CPM Scanners

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
10
Q

Accounts that do not match any Onboarding Rule will be listed in (blank)

A

Pending Accounts

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
11
Q

you can click on any pending account to see further details in the (blank) pane

A

account preview

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
12
Q

For Windows accounts, the (blank) column shows you if any account is used anywhere else
(a usage), such as for a Windows service or scheduled task.

A

Dependencies

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
13
Q

Select one or more accounts from the list of Pending accounts and click Onboard Accounts

Information needed for onboarding accounts:
1
2

A

the safe in chich these accounts should be stored, you can either choose an existing safe or create a new one

the platform - what type of account are these?

do they require a separate platform?

is reconciliation available?

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
14
Q

Once onboarded, the new accounts can be found in the (blank)

A

accounts view

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
15
Q

(blank) - minimize the time it takes to onboard and to manage accounts securely, reduce the time spent reviewing pending accounts, and prevent human errors from occurring during manual onboarding

A

automatic onboarding rules

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
16
Q

the onboarding wizard walks you through each stage of the rule creation process and ensures that each rule is unique

1
2
3
4
5
6

A

select system type - windows or *nix

select scope - * Machine type
* Account type
* Account Category
* Privileged account type
* Optionally, a user or
machine name string to
match

assign to platform - Select the target Platform
that will be associated with accounts that match this rule

store in safe - Select the Safe in which the accounts will be stored

define properties -
* Name
* Description
* Initial password settings

NOTE
if a reconcile account is associated with the Platform and the parameter Auto Verify on Add is set to Yes, you can completely automate the
onboarding process by having the passwords for these accounts changed immediately and
automatically by CyberArk PAM

17
Q
  • (blank) apply to both Accounts Discovery and using the Add discovered
    accounts feature of the REST API
  • Discovered accounts are automatically processed by the onboarding rules and provisioned
    in the Vault
  • Accounts that cannot be processed by any of the rules are added to the Pending Accounts list and can be reviewed and onboarded manually
  • Automatic Onboarding Rules only apply to accounts without dependencies.
  • A new rule takes precedence over an existing rule
A

Onboarding Rules

18
Q

Information needed for
running a (blank) Discovery

  • CSV file containing IP
    addresses of Unix/Linux
    machines
  • Unix user to perform the scan
    and get the accounts
  • A default password
  • CPM Scanner
  • Whether or not to scan for SSH Keys
  • reoccurring or one-time
19
Q

Continuous accounts
discovery via log-in events for:
1
2
3
4
5
6

A

windows
unix-like
oracle
aws
azure
other

20
Q

CyberArk (blank) detects unmanaged
privileged access events
* The PTA can detect when a connection to a machine or a cloud service is made with a
privileged account that is not stored in the Vault and automatically onboard the account
* This detection is supported out of
the box for Windows, UNIX, AWS, and Azure accounts
* Other platforms can be supported by building custom plug-ins for PTA

A

Privileged Threat
Analytics

21
Q

The PTA continuously
monitors (blank) groups
* Faster response time
* Automatic response

A

windows local administrator

22
Q
  • The (blank) is a set of REST- based services running on the PVWA that allow scripts and applications to communicate with the Vault.
  • It is used by CyberArk applications as well as third party applications, allowing organizations to develop custom interactions with the Vault to automate
    business processes.

EXAMPLE:
Integrating the process of adding a new Windows
machine to the company’s network with automatic provisioning of the target server local
Administrator account in the Vault

A

PAM Web Services API

23
Q

There are three main REST methods that are relevant for the
process of onboarding accounts:
1
2
3

A
  1. Add account - The Add Account method will
    be used when the target Safe and Platform are known to the
    onboarding utility
  2. Add discovered accounts
    - CyberArk discovery and upload mechanisms, as well as third-party discovery mechanisms, will use the Add
    Discovered Accounts method in order to upload discovered accounts (and dependencies) to the Pending Safe or onboard the accounts directly via automatic onboarding rules.
  3. Create bulk upload of
    accounts
    - The Create bulk upload of accounts method is used to upload multiple accounts to existing Safes
    * It is also used when adding multiple accounts from a file via the PVWA Web UI