PTA Implementation Guide
PTA Implementation Guide
Implementation Guide
3.95
Table of Contents
Since privileged accounts are most often compromised as part of an attack, CyberArk
Privileged Threat Analytics (PTA) continuously monitors the use of privileged accounts
that are managed in the CyberArk Privileged Account Security (PAS) platform, as well as
accounts that are not yet managed by CyberArk, and looks for indications of abuse or
misuse of the CyberArk platform. PTA also looks for attackers who compromise
privileged accounts by running sophisticated attacks, such as Golden Ticket.
PTA is part of the CyberArk Privileged Account Security solution and provides an
additional security layer, which detects malicious activity caused by privileged accounts
and proactively contains in-progress attacks. PTA supports detection of malicious
activities in privileged accounts when authenticated either by passwords, or by SSH
Keys.
Using proprietary profiling algorithms, PTA distinguishes in real time between normal
and abnormal behavior, and raises an alert when abnormal activity is detected. In this
way, it leverages the capabilities of the CISO to reduce the risk of inside-threats,
malwares, targeted attacks and APTs that utilize privileged users to carry out attacks.
This significantly reduces the ability of these threat factors to infiltrate the system and
eliminates one of the biggest risks to your organization.
Using DPI technology and tapping the organization network, PTA can deterministically
detect and raise alerts on Kerberos attacks in real time.
PTA also proactively monitors critical privileged account related risks in the IT
environment that can be abused by an attacker. PTA sends alerts to the security team to
handle these risks before attackers abuse them.
PTA processes the network traffic and receives raw events from your organization’s
Vault, UNIX machines, and Windows machines, and receives additional inputs by
querying Active Directory, then detects security events in real time and sends them as
alerts by email, to the PTA’s proprietary dashboard, or to the SIEM dashboard.
In general, PTA does the following:
■ Detects privileged accounts related anomalies: Detect anomalies in the usage
of privileged accounts, such as usage that does not occur during the regular hours of
use.
■ Detects privileged accounts related security incidents: Detects security
incidents by running deep packet inspection and finding deterministic characteristics
of Kerberos attacks, and additional known attacks such as Golden Ticket and
Malicious Retrieval of Domain Accounts (DC Sync).
■ Detects privileged accounts related risks: Detects risks by monitoring and
alerting on critical risks in privileged accounts.
■ Contains security incidents: Generates actionable insights to support rapid and
automatically reactive incident containment.
In order to pinpoint abnormal activities of privileged users, PTA employs various
statistical algorithms. These algorithms generate profiles of system activities, and
subsequent activities are searched for deviations from these profiles. Deviations that are
suspicious and pose a potential risk are classified as security incidents.
For Example: A user who connects to a remote machine during hours which are deemed
irregular (when compared to the specific user’s connectivity profile as learned by PTA),
or from an unfamiliar IP.
In addition, PTA can detect Kerberos attacks in real-time. These Kerberos attacks can be
used by an attacker for privilege escalation, and to achieve persistency within the
network.
For a complete list of PTA detections, indicators of compromise and their descriptions,
see What Detections Does PTA Report?, page 6.
All system activity and analysis is displayed in a dashboard that provides details about
current and past privileged accounts related incidents, latest privileged accounts related
risks, and a summary of system activity. The dashboard presents all this information in
multiple graphic analyses of system activity and security incidents that enable you to see
and understand system activity at a glance.
PTA detects different types of suspicious privileged account activity and ranks these
detections in terms of severity. It then classifies them in different risk levels. PTA also
correlates multiple security events that occur during a certain period and which are
related to each other, into one or more incidents, so that they tell a more comprehensive
story and enable initial investigation.
When PTA performs a real-time data analysis, colorful bubbles in the Incidents chart
display suspicious activities. The Risk Index is denoted by the color of the bubble and its
risk index. The higher the bubble appears in the chart, the more risk it reflects. For further
details, see Use and Understand the Dashboard, page 87.
PTA enables you to generate a high-level report of all incidents for a particular Vault user
during a specified period. The report gives you an immediate understanding of a user’s
profile (normal behavior), security events, and audit records over a given timeframe. For
further details, see Generate Reports, page 103.
Event
Detection / Required
Event Description Type
Event Name Sensor
ID
Event
Detection / Required
Event Description Type
Event Name Sensor
ID
Event
Detection / Required
Event Description Type
Event Name Sensor
ID
Event
Detection / Required
Event Description Type
Event Name Sensor
ID
As a first time PTA user, you must perform the following procedures to log on to PTA for
the first time, and to authenticate to PTA.
Users can log on to PTA using username and password authentication. After successful
authentication, all communication between the browser and PTA is encrypted using the
industry-standard Secure Socket Layer (SSL) encryption.
Log on to PTA for the First Time
Upload the License File
2. Click Upload to upload the file. When the license file is uploaded successfully, the
PTA dashboard is displayed.
Configure LDAP
Perform the following procedures to:
■ Enable LDAP authentication
■ Broaden and increase the accuracy of PTA detections
Note:
The default port if the LDAP server is configured to use LDAP over SSL is 3269. The
default port if the LDAP server is not configured to use LDAP over SSL is 3268.
6. If the LDAP server is configured to use LDAP over SSL, click Browse to navigate to
the dedicated security Base-64 encoded X.509 SSL certificate.
■ In the window that opens, select the certificate file, click Open, and then click OK
to make your selection.
7. In User Principal Name, enter the LDAP user created above, who will be used to
connect and query the Active Directory. Enter the user in a UPN format:
For Example: [email protected]
8. In Password, enter the password of the LDAP user created above, who will be used
to connect and query the Active Directory.
9. Click Save.
Note:
PTA supports only one domain forest when configuring LDAP authentication.
3. Enter the PVWA host name, in FQDN format, not the URL.
4. Select whether the connection is over HTTPS. We recommend using an HTTPS
connection.
5. Enter the PVWA port that PTA will use to access the PVWA.
6. Enter the PVWA application name that PTA will use to access the PVWA. The
default name is PasswordVault, but you can specify a different application name
when you install the PVWA.
7. (Optional) To automatically add unmanaged accounts to the PAS pending accounts
queue, select Automatic Adding to Pending Accounts.
Note:
Only perform this step if you have performed the appropriate steps shown in Configure
the PVWA for PTA Integration with PAS, page 55.
Note:
Only perform this step if you have performed the appropriate steps shown in Configure
the PVWA for PTA Integration with PAS, page 55.
9. Click Save.
Note:
For details on PSM Connectivity, refer to Configure PTA for PSM Integration, page 22.
epvIntegrationEnableAddPendingAccoun Determines
t whether PTA
will integrate
with PAS to
automatically
add
unmanaged
privileged
accounts to
the
PVWA pendin
g accounts
queue.
epv_integration_rotate_password Determines
whether PTA
will integrate
with PAS to
automatically
rotate
passwords to
accounts.
Save and close the systemparm.properties file using :wq!, and restart the PTA main
service using the service appmgr restart command.
8. PTA analyzes the PSM session related syslogs, and displays them as incidents in the
PTA Dashboard.
9. PTA sends the PSM session related data which was analyzed and found to contain
risky commands, to the PVWA.
10. PVWA displays the PTA analyzed session related data with scores in the PVWA
MONITORING tab.
3. To send a privileged session risk score to PSM to make the score available in PVWA,
select Send PSM session related data.
4. If PSM Connectivity is not configured or PTAUser is not a member of the
PSMPTAAppUsers Vault group, the Vault Admin user credentials section of the
PVWA Connection Details area appears. Enter the Username and Password of the
Vault Administrator.
5. Click Save.
Limitations
■ PTA only analyzes session data from the time of the integration with PSM. Older
sessions are not analyzed, do not trigger security incidents in PTA, and do not
display risk scores in PVWA.
■ Changing the configuration affects sessions from that point onward, and does not
affect older sessions.
■ PTA does not support session activities performed in environments with multibyte
languages.
The default rules shown represent a set of best practices that CyberArk recommends
for your use. Based on your analysis, you can add new rules or edit the default rules
to align with your security needs.
Note:
If you want to edit the default rules, we recommend creating a new rule and disabling
the default rule. The default rule will still exist if you need it in the future.
The default rules are enabled, and all new rules that you add are also enabled. You
can disable and enable each rule as needed.
3. Click Add.
4. Select a Category from the drop-down list.
The available categories are:
■ Universal keystrokes – For all platforms
■ SCP – Secure copy. For UNIX only
■ SQL – For Databases only
Note:
Regular expressions are case sensitive for all categories except SQL and Windows
titles.
6. Enter a Score between 1 - 100 that reflects the risk level of the suspicious session
activity.
7. (Optional) Enter a Description of the suspicious session activity.
8. Determine the Response, either None, Suspend, or Terminate, to the suspicious
session activity.
9. Click Update.
■ SSH
For unix platform only
■ Windows titles
For windows platform only
■ SQL
■ Universal keystrokes
For all platforms
3. Save and close the systemparm.properties file using :wq!, and restart the PTA main
service using the service appmgr restart command.
Example:
[{\"regex\":\"kill
(.*)\",\"score\":\"80\",\"description\":\"description\",\"catego
ry\":\"SSH\",\"response\":\"NONE\",\"active\":\"true\"},
{\"regex\":\"who\",\"score\":\"70\",\"description\":\"descriptio
n2\",\"category\":\"SSH\",\"response\":\"TERMINATE\",\"active\":
\"true\"}]
Note:
The configured groups are in addition to the PTA predefined privileged groups.
4. In the PRIVILEGED USERS LIST area, click Add to add users and patterns to the
list of privileged users.
Note:
There is a list of default users and patterns:
Unix - root
Windows - .*admin.*
Oracle - sys, sysman, system
Regular expressions, such as (.*)_A, are supported.
5. Click Save.
Parameter Description
privileged_ A list of users considered privileged in the organization, and who should be
users_list managed by CyberArk’s Privileged Account Security solution.
The default values are:
■ Unix - root
■ Windows - .*admin.*
■ Oracle - sys, sysman, system
Save and close the systemparm.properties file using :wq!, and restart the PTA main
service using the service appmgr restart command.
3. Add machines to the whitelist using the following format, where multiple names are
separated by commas.
dc_replication_whitelist=<IP1>,<IP2>,<FQDN1>,<FQDN2>…
4. Save and close the systemparm.properties file using :wq!, and restart the PTA main
service using the service appmgr restart command.
5. After a few weeks, review the results and edit again as necessary.
Note:
When PTA is configured with a Vault that is deployed in a Cluster environment, configure the
Virtual IP in the Vault Connection Configuration step.
When PTA is configured with a Vault that is deployed in a distributed environment, configure the
IP for the primary Vault in the Vault Connection Configuration step.
Note:
For sites where the original installation of PTA was from version 3.0 and above, this
procedure is not needed. Vault Disaster Recovery configuration is part of the
installation procedure.
■ At debug level:
The account (user: OUserForReset, ip: 10.1.8.20, host:
10.1.8.20, fqdn: 10.1.8.20) is managed by PAS
Event score calculated - score is '50.00'.
Event is security event. Begin reset pass logic...
Attempt to reset password by ip/host/fqdn <value> succeeded.
Note:
The numbers that appear in the diamond.log are reset each time the system reboots.
com.cyberark.diamond.plugins.impl.inbound.PSMCommandAuditCreator
| 49 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.UnixPamLogonAuditCreat
or | 4 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.VaultLogonAuditCreator
| 82 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.VaultRetrievePasswordA
uditCre | 27 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.VaultStorePasswordAudi
tCreato | 5 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.WefChangeOrResetPasswo
rdCreat | 10 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.WefCreator | 147188 |
| mesages_with_no_matching_plugin | 1035535 |
| resolve_not_in_cache | 12946 |
| resolve_request | 109713 |
| resolve_returned_from_failed_cache | 17465 |
| resolve_returned_from_success_cache | 79302 |
| risk_processing_sent_to_sampler | 221 |
| sensorType_NETWORK_SENSOR | 46692 |
| sensorType_PAM_UNIX | 4 |
| sensorType_SIEM | 759 |
| sensorType_VAULT | 166 |
| syslog_filtered_reason_non_human | 56 |
+---------------------------------------------------------------
-----------------------+------------+
+-- [2018-01-02 10:13:43.348 IST] ------------------------------
-----------------------+------------+
| Sampler Types | Amount |
+---------------------------------------------------------------
-----------------------+------------+
| anomaly_type_PSMRiskyCommand | 5 |
| anomaly_type_SuspectedCredentialsTheft | 2 |
| anomaly_type_SuspectedPasswordChange | 1 |
| anomaly_type_UnmanagedPrivilegedAccess | 8 |
| decrypt_uds_handler_success | 1056 |
| DomainAccountAttributesRetrieving_failure | 11 |
| DomainAccountAttributesRetrieving_success | 7 |
| NetRep_FromDomain_AL_LAB.AMPM.COM_failure_no_NetRepParameters
| 5 |
| NetRep_FromDomain_AMPMDEFAULT.AMPM.COM_failure_no_
NetRepParameters | 5 |
| NetRep_FromDomain_ARIEPM63.AMPM.COM_failure_no_
NetRepParameters | 4 |
| NetRep_FromDomain_ARIEPM64.AMPM.COM_failure_no_
NetRepParameters | 4 |
| NetRep_FromDomain_ARIEPMSAAS.ENV_failure_no_NetRepParameters |
4 |
| NetRep_FromDomain_DCDISTVAULTS.AMPM.COM_failure_no_
NetRepParameters | 1 |
| NetRep_FromDomain_ENIGMA.COM_failure_no_NetRepParameters | 5 |
| NetRep_FromDomain_EXTDOMAIN.COM_failure_no_NetRepParameters |
5 |
| NetRep_FromDomain_HRDC.AMPM.COM_failure_no_NetRepParameters |
1 |
| NetRep_FromDomain_HR_DOM.AMPM.COM_failure_no_NetRepParameters
| 1 |
| NetRep_FromDomain_IL.ENIGMA.COM_failure_no_NetRepParameters |
5 |
| NetRep_FromDomain_IL.PTA.COM_success_ | 5 |
| NetRep_FromDomain_LAB.SUPPORT.COM_failure_no_NetRepParameters
| 5 |
| NetRep_FromDomain_LYDC.AMPM.COM_failure_no_NetRepParameters |
2 |
| NetRep_FromDomain_NINIO.COM_failure_no_NetRepParameters | 2 |
| NetRep_FromDomain_PRINCESSES.COM_success_ | 3 |
| NetRep_FromDomain_PTA.COM_success_ | 5 |
| NetRep_FromDomain_RANDY.LOCAL_failure_no_NetRepParameters | 2
|
| NetRep_FromDomain_SPECFLOWDOMAIN.AMPM.COM_failure_no_
NetRepParameters | 1 |
| NetRep_FromDomain_US.PTA.COM_success_ | 5 |
| NetRep_FromDomain_WIN2KDC1.AMPM.COM_failure_no_
NetRepParameters | 3 |
| psm_score_update_success | 3 |
| resolve_not_in_cache | 45 |
| resolve_request | 748 |
| resolve_returned_from_failed_cache | 101 |
| resolve_returned_from_success_cache | 602 |
| risk_event_handler_aggregation_counter | 386 |
| risk_event_handler_create_risk_counter | 5 |
| risk_event_handler_in | 401 |
| risk_event_handler_in_typed_cleartext_protocol | 374 |
| risk_event_handler_in_typed_interactive_service_account | 2 |
| risk_event_handler_in_typed_risky_spn | 10 |
| risk_event_handler_in_typed_unconstrained_delegation | 5 |
| risk_manager_out_event | 2 |
| risk_queue_consumer_in_count | 800 |
| risk_raw_handler_in_json | 399 |
| risk_raw_handler_out_event | 389 |
| suspend_session_PSM_RISKY_COMMAND_success | 1 |
| terminate_session_PSM_RISKY_COMMAND_success | 1 |
| tkt_data_failure | 2726 |
| tkt_data_success | 166 |
| unmanage_onboard_failure | 4 |
+---------------------------------------------------------------
-----------------------+------------+
+-- [2018-01-02 10:13:32.550 IST] ------------------------------
-----------------------+------------+
| Background Scheduler Types | Amount |
+---------------------------------------------------------------
-----------------------+------------+
| ActiveDormantUserAnomaly_success | 5 |
| AggregativeIce_success | 5 |
| CasosServicesReActivateTask_success | 5 |
| ChangePTAVaultPasswordTask_success | 5 |
| DCAServerReActivateTask_success | 5 |
| DomainAccountsAttributesQueryTask_success | 6 |
| ExcessiveAccess_success | 5 |
| GenerateJwtAuthSecretTask_success | 5 |
| GetVaultVersionTask_success | 6 |
| IrregularDayUser_success | 5 |
| IrregularHoursAsset_success | 5 |
| IrregularHoursUser_success | 5 |
| NormalActivityCountingTask_success | 6 |
| PrivilegedAccountQueryTask_success | 5 |
| RemoveInactiveProcessedAssetsTask_success | 5 |
| RiskySPNAccountsAttributesQueryTask_success | 5 |
| UnconstrainedDelegationAccountsAttributesQueryTask_success | 5
|
| VaultAccountsReloadTask_success | 5 |
| VaultViaIrregularIp_success | 5 |
+---------------------------------------------------------------
-----------------------+------------+
+-- [2018-01-02 10:13:59.066 IST] ------------------------------
-----------------------+------------+
| Services Types | Amount |
+---------------------------------------------------------------
-----------------------+------------+
| PTA_SERVICE_EPV.checkAccountIsManagedByCPM.fail | 0 |
| PTA_SERVICE_
EPV.checkAccountIsManagedByCPM.requestAccount.SuspectedPasswordC
hange.su | 1 |
| PTA_SERVICE_
EPV.checkAccountIsManagedByCPM.requestPlatform.SuspectedPassword
Change.s | 1 |
| PTA_SERVICE_EPV.checkAccountIsManagedByCPM.success | 1 |
| PTA_SERVICE_EPV.requestAddPendingAccount.fail | 4 |
| PTA_SERVICE_
EPV.requestAddPendingAccount.requestAddPendingAccount.error.Unma
nagedPri | 4 |
| PTA_SERVICE_EPV.requestAddPendingAccount.success | 0 |
| PTA_SERVICE_EPV.requestChangePasswordAsync.fail | 2 |
| PTA_SERVICE_
EPV.requestChangePasswordAsync.requestChangePassword.error.Suspe
ctedCred | 2 |
| PTA_SERVICE_EPV.requestChangePasswordAsync.success | 0 |
| PTA_SERVICE_EPV.requestPsmResumeSession.fail | 0 |
| PTA_SERVICE_EPV.requestPsmResumeSession.mitigationAction.PSM_
RISKY_COMMAND.success | 1 |
| PTA_SERVICE_EPV.requestPsmResumeSession.success | 1 |
| PTA_SERVICE_EPV.requestPsmSuspendSession.fail | 0 |
| PTA_SERVICE_EPV.requestPsmSuspendSession.mitigationAction.PSM_
RISKY_COMMAND.success | 1 |
| PTA_SERVICE_EPV.requestPsmSuspendSession.success | 1 |
| PTA_SERVICE_EPV.requestPsmTerminateSession.fail | 0 |
| PTA_SERVICE_
EPV.requestPsmTerminateSession.mitigationAction.PSM_RISKY_
COMMAND.succes | 1 |
| PTA_SERVICE_EPV.requestPsmTerminateSession.success | 1 |
| PTA_SERVICE_EPV.submitCommandScores.fail | 0 |
| PTA_SERVICE_
EPV.submitCommandScores.submitCommandScores.PSMRiskyCommand.succ
ess | 3 |
| PTA_SERVICE_EPV.submitCommandScores.success | 3 |
| PTA_SERVICE_VAULT.writeAuditLog.fail | 0 |
| PTA_SERVICE_VAULT.writeAuditLog.success | 8 |
+---------------------------------------------------------------
-----------------------+------------+
+-- [2018-01-02 10:13:58.379 IST] ------------------------------
-----------------------+------------+
| DCA Server Types | Amount |
+---------------------------------------------------------------
-----------------------+------------+
| control_agent_Server_to_Agent_ACK_success | 581533 |
| data_clear_text_create_success | 153 |
| data_dcerpc_event_create_success | 6122 |
| data_formatter_clear_text_events_match_cleartextformatter_
success | 153 |
| data_formatter_dcerpc_event_events_match_dcerpcformatter_
success | 6122 |
| data_formatter_kerberos_events_match_kerberosformatter_success
| 10317 |
| data_formatter_windows_events_events_match_rawdataformatter_
success | 147208 |
| data_incoming_event_CLEAR_TEXT_success | 153 |
| data_incoming_event_DCERPC_EVENT_success | 6122 |
| data_incoming_event_KERBEROS_success | 10317 |
| data_incoming_event_WINDOWS_EVENTS_success | 147208 |
| data_in_sensor_create_success | 163647 |
| data_kerberos_as-req-rep_create_success | 6629 |
| data_kerberos_tgs-req-rep_create_success | 3688 |
| data_raw_risks_create_success | 153 |
| data_windows_events_create_success | 147208 |
+---------------------------------------------------------------
-----------------------+------------+
Log file can be found at '/opt/tomcat/logs/PTA_Tool_Log_
20180102101359.log'.
■ Search for auditType_<audit type>. This the number of audits created per
type.
In the Example above: {"auditType_WINDOWS_KERBEROS_TGS":14628}
Aliases
Aliases are predefined commands that allow easier troubleshooting of the PTA server.
The aliases are only available for the root user, and must be written in capital letters.
Alias Command
LOGSDIR cd /opt/tomcat/logs
LOCALPARM vi /opt/tomcat/diamond-
resources/local/systemparm.properties
VAULTSERVICESDIR cd /opt/tomcat/VaultServices/
CASOSSERVICESDIR cd /opt/tomcat/CasosServices
RUN_DIAGNOSTICS /opt/pta/diag-tool/pta_tool.sh
Alias Command
AGENTSHELL /opt/agentshell/run.sh
EXPORT_UTILITY /opt/tomcat/utility/exportTool.sh
UTILITYDIR cd /opt/tomcat/utility
PREPWIZDIR cd /opt/tomcat/prepwiz
2. Specify 1 to view the list of machines which PTA identifies as Domain Controllers,
for each domain.
For Example:
1- Get list of domains and list of DC's per each domain
2- Clear domains collection cache in the Database: 1
4. You should see succeeded with the Network Sensor version number.
SSH access to device 'Probe1'(1) at '10.0.10.10'... Succeeded.
Version 5.1 Build 10
SSH access to device 'Probe2'(2) at '10.0.11.11'... Succeeded.
Version 5.1 Build 10
SSH access to device 'Probe3'(3) at '10.0.12.12'... Succeeded.
Version 5.1 Build 10
5. To reset the connection, you must reset the password of the PTA Network Sensor
broker user. For details, see Reset PTA Network Sensor Connection with the PTA
Server, page 47.
To Reset the PTA Network Sensor Connection with the PTA Server:
1. Log on to the PTA Network Sensor machine using the admin username and
password:
■ Username: admin
■ Password: The admin password you created.
Note:
The PTA Network Sensor machine is hardened for security reasons. As such, you can
only log on to it using the admin user.
2. You are then able to modify the following PTA Network Sensor configurations:
PTA Network Sensor
You can…
configuration
Note:
Reset the broker user password if you
need to add a Network Sensor to a PTA
machine. See Reset PTA Network Sensor
Connection with the PTA Server, page 47.
Date, Time and Timezone Set the Date, Time and Timezone of the Network
Sensor.
3. In addition, you are able to restore PTA Network Sensor to the default settings.
Error 500 Failed to log on to PAS There might be multiple binds for the same
port in the IIS configuration. Fix the IIS
configuration to have only one bind per port.
Log
Problem Suggested Resolution
Message
Note:
By default, CasosServices are configured to request a restart five times.
To Reactivate CasosServices:
1. Using the PrivateArk client, reactivate the suspended PTAAppUser.
2. Run one of the following commands:
■ Using the SEutility, enter task_executer then select the following:
CasosServicesReActivateTask
Integrate PTA
To enable PTA to work correctly, the PTA machine must have access to data such as the
real-time activities of the Vault and the UNIX machines in your organization. The
following tasks describe how to configure PTA, CyberArk components, SIEM vendors
and the inspected UNIX machines to send their logging data to the PTA machine.
In this section:
Integrate PTA with PAS
Forward Log Data to PTA
Send PTA Data
Integrate the Vault with SIEM and PTA CyberArk Vault version
7.2.5 or higher
Note:
Privileged
Session
Management
integration
works with
lower
versions of
CyberArk
Vault, but
without the
ability to
report
Privileged
Session
Analysis
results to
PVWA.
Note:
When PTA is configured with Vaults deployed in a distributed environment, configure
the primary and satellite Vaults.
SyslogServerPort The port number through which the syslog will be sent.
Specify 514 to send syslogs to the default PTA port.
SyslogMessageCodeFilter Defines which message codes will be sent from the Vault
Machine to PTA through Syslog protocol.
You can specify message numbers, separated by
commas. You can also specify range of numbers using ‘-‘.
Message codes are sent for the following events:
Code Activity
7 Logon
361 SSH Command
359 SQL Command
436 SCP Command
SyslogTranslatorFile Specifies the XSL file used to parse Vault records data
into Syslog protocol.
3. To forward Vault syslogs to multiple machines (for instance to your SIEM solution
as well as to PTA), you can specify multiple values for the following parameters and
separate each value with a comma.
■ This requires a CyberArk Vault version 7.2.5 or higher.
■ All destinations must use the same port and protocol, which are specified in the
SyslogServerPort and SyslogServerProtocol fields.
■ The specified values will apply to all destinations configured in SyslogServerIP,
using the translator files specified in SysLogTranslatorFile.
Parameter Name Comments
SyslogServerIP
SyslogTranslatorFile
UseLegacySyslogFormat
The following example shows how to send different syslog messages to multiple
syslog servers.
[SYSLOG]
SysLogTranslatorFile=Syslog\Arcsight.sample.xsl,Syslog\QRadar.xs
l,Syslog\PTA.xsl
SyslogServerPort=<port number>
SysLogServerIP=1.1.1.1,1.1.2.2,1.1.3.3
SyslogServerProtocol=UDP
UseLegacySyslogFormat=Yes,Yes,No
SyslogMessageCodeFilter=7,8,295|295-
296|295,308,7,24,31,428,361,372,373,359,436,412,411,300,302,294,
427
2. Navigate to Policies > Access Control (Safes), select the Safe where you want to
automatically initiate password rotation, and click Edit to display the Safe Details
page.
3. Make sure that the Assigned to CPM setting is enabled.
4. Click Save.
5. Click Members.
6. Click Add Member.
7. Search for PTAUser.
8. Leave the default permissions (List accounts, Retrieve accounts, and View Safe
Members).
9. Expand Account Management and select Initiate CPM account management
operations.
10.Click Add.
11.Search for PTAAppUser and perform steps 8 -10 above.
12.Click Close. The PTAUser’s authorizations in the Safe are updated and the Safe
Details page is displayed again.
13.Repeat this procedure for each safe where you want to automatically initiate
password rotation.
Note:
In order for PTA to monitor activity of privileged accounts in Windows machines,
Windows security events 4624, 4723, and 4724 from each monitored Windows
machine must be forwarded to the SIEM and from the SIEM to PTA.
■ Unix: When collecting syslogs directly from Unix machines, PAM Unix is supported.
PAM Unix is supported by multiple Unix flavors, such as Red Hat Linux, HP-UX, and
Solaris.
Supported PAM Unix events include accepted public key, accepted password, and
session open.
■ Database: Oracle logon events are supported.
■ Network Sensor: Traffic is received from domain controllers in the environment.
■ Vault: Specific events are accepted. Supported device types are operating system
and database.
Note:
It is strongly recommended to limit the allowed sources of syslog messages using the
organization's firewall. PTA should only be allowed to receive syslog messages from
allowed sources such as ArcSight, Splunk, QRadar, and any other server that reports to
PTA.
Note:
To forward only the relevant raw data from the HP ArcSight ESM Forwarding Connector,
it is recommended to load the dedicated ArcSight_to_PTA_Filter.arb filter file. This filter
guarantees that the ESM only forwards login activities to the platforms mentioned
above. For more information about this filter file, contact your CyberArk representative.
indexAndForward=true
type=<udp|tcp>
timestampformat = %s
In the above example, the syslog type is udp. The IP of the PTA server is
192.168.0.1 and the PTA listening port is 514.
For more information about configuring the Splunk outputs.conf file, see
http://docs.splunk.com/Documentation/Splunk/latest/Admin/Outputsconf.
3. Save the outputs.conf file and close it.
4. In the same folder, open the props.conf file. If this file does not exist, create it.
5. Add the following section:
[source::WinEventLog:Security]
TRANSFORMS-pta = pta_syslog_filter
3. Specify the sourcetype name of the UNIX forwarder installed in your organization
that is associated with the type of data that will be forwarded to Splunk.
4. Save the outputs.conf file and close it.
5. In the same folder, open the props.conf file. If this file does not exist, create it.
6. Add the following row:
[source::/var/log/secure]
Parameter
Define or Select
Name
Name The name of the new routing rule. For example, Security information for
PTA.
Forwarding The event collector that is used to collect the security information. If
Event multiple event collectors are used, create multiple rules for every event
Collector collector.
Data The data source for this routing rule. Select Events.
Source
Event Set the EventID to 4624, 4723, or 4724. See the following instructions for
Filters details.
Routing Select Forward and specify the forwarding destination that you entered in
Options step 2.
6. In the Event Filters section, set EventID (custom) equals any of 4624, 4723, or
4724, and click the plus sign.
Properties button.
2. Click the Event Forwarding tab, then click the Add button. The Edit Event
Forwarding Destination window opens.
Format Select Syslog (Standard Event Form) from the drop-down list.
Time Zone Select GMT+ and the PTA Server time zone
4. Click the Event Filters button. The Event Filters window opens.
6. Select the relevant devices, then click OK. The devices you selected appear in the
Device field.
7. In Normalized ID area, click the filter icon to select the types of messages that
will appear. The Filter Variables window opens.
13.Click the Settings button. The Event Forwarding Settings window opens.
14.In the Maximum combined events forwarded per second field, set the value to 1.
15.Then, click OK.
16.Click OK again to save your settings, and to close the System Properties window.
Custom ports ü
UDP forwarding ü
TCP forwarding ü
b. In the configuration file, add the authpriv keyword, which limits the syslog
messages sent to security and authorization messages:
authpriv.*<tab><protocol><server IP>:<port number>
Note: Make sure authpriv.* and <protocol><server IP> are separated by tabs and not
spaces.
c. Specify the following information:
■ Protocol – Replace <protocol> with @ for UDP or @@ for TCP.
■ ServerIP – Replace <server IP> with the IP of the PTA machine.
■ Port number - Replace <port number> with the port number to which the
syslog will be sent. Specify port 514, which is the default PTA listener port for
TCP and UDP.
Note:
In Linux, you cannot use custom ports and can only specify the following:
authpriv.*<tab>@<server IP>
or,
/etc/init.d/rsyslog restart
Prefix fields
Extension fields
Note:
suser, shost, src, duser, dhost and dst fields may contain a single value or a list of values. If
the field contains a list of values, these values will be separated by a comma, and if they are larger
than 1024, data will be omitted and “etc..” will be added to the end.
dhost and dst fields could be a single host or a database instance. If it is a database instance, the
dhost destination will be in the format <machine:instance>.
When the src, dst, duser, suser or cs1 field has no value, the field is sent with the value None.
cs3=https://1.1.1.1/incidents/52b06812ec3500ed864c461e
cs4Label=ExternalLink cs4=None
Prefix fields
Extension fields
Note:
suser, shost, src, duser, dhost and dst fields may contain a single value or a list of values. If
the field contains a list of values, these values will be separated by a comma, and if they are larger
than 1024, data will be omitted and “etc..” will be added to the end.
dhost and dst fields could be a single host or a database instance. If it is a database instance, the
dhost destination will be in the format <machine:instance>.
When the src, dst, duser, suser or cs1 field has no value, the field is sent with the value None.
LinkLabel=PTALink
PTALink=https://1.1.1.1/incidents/52b06812ec3500ed864c461e
suserLabel=SourceUserName suser=mike2
ExternalLinkLabel=ExternalLink ExternalLink=None
Note:
If you already configured PTA to send emails during the PTA installation, you do not
need to perform this procedure.
1. On the system console, log in as the root user user using the password you specified
during installation.
2. Start the PTA utility by running the following command:
/opt/tomcat/utility/emailConfiguration.sh
3. Enter the IP address of the email server in your organization, then press Enter.
Specify the email server IP address:
a. Enter the port of the SMTP server, then press Enter. The following prompt
appears.
Specify the sender’s email address (in the following format:
[email protected]):
b. Specify the email address, in lowercase characters, of the user whose name will
be included as the sender in notifications, then press Enter. The following prompt
appears.
Specify the recipient’s email address (in the following
format: [email protected]). Separate multiple addresses with
‘;’ (semi-colon):
notifications.
Username:
Password:
Retype password:
e. Enter the user name and password of the user in the email system who will send
notifications, then press Enter. After the sender’s credentials are saved
successfully, the following confirmation is displayed.
The sender's credentials saved successfully.
Use PTA
The PTA dashboard displays an overview of general system status for a selected period
of time, enabling you to view system activity and analysis, as well as details about current
and past incidents and a summary of system activity.
This section describes how to access PTA, introduces you to the PTA dashboard and
explains how to generate reports.
In this section:
Access and Use PTA
Use and Understand the Dashboard
Generate Reports
Log on to PTA
In your browser, navigate to the following URL: https://ptaserver
The PTA Sign In window is displayed.
2. In Current Password, specify the password that you used to log on to PTA.
3. In New Password, specify a new password that meets all of the following criteria:
■ A minimum of twelve characters
3. Specify y to continue the reset password procedure. The Password prompt appears.
Password:
4. Specify the new password, then press Enter. The Retype password prompt
appears.
Retype password:
5. Specify the new password again, then press Enter; the process resets the password
and the following confirmation is displayed.
PTA Administrator’s password has been reset successfully
When you log on to PTA for the first time after resetting your password, the Change
Password window is displayed and you are required to change your password. For more
information, see Change your Password, page 82.
To Manage your Administrator Password (for PAS 10.1 and PVWA 10.1 and
higher):
Note:
This procedure is only for users whose PAS and PVWA versions are 10.1 or higher.
See the next procedure for older versions of PAS and PVWA.
To Manage your Administrator Password (for PAS and PVWA version less than
10.1):
Note:
This procedure is only for users whose PAS and PVWA versions are less than 10.1. See the
previous procedure for newer versions of PAS and PVWA.
If you are using a previous version of the PTAPlugin.zip file, that creates a PTA Dashboard
platform, you must import the new PTAPlugin.zip file, and move the account to the new platform.
1. Import the PTAPlugin.zip file included in the PTA installation package to the PVWA.
See the Importing New Platforms section in the Privileged Account Security
Implementation Guide.
2. In the PVWA, create a new account.
■ Click and select About to view information about the current release of PTA.
In this section:
Select a Time Frame , page 88
View Current Incidents, page 88
View System Activities, page 90
View the Incident Summary , page 91
Close an Incident, page 93
View Privileged Related Risks, page 95
Note:
You can display suspicious activities in individual bubbles, using the
numberOfIncidentsToGroupBy system parameter. For details, see Section: UI, page 151.
■ Severity score: Each bubble contains a score which denotes the severity attributed
to the incident. Although the bubbles are placed at different levels on the chart, this
score give a precise indication of severity.
■ Frame: The frame around each bubble indicates the management status of the
incident.
■ A heavy outline indicates that the incident has not yet been viewed.
■ A light outline indicates that the incident has been viewed.
or,
■ Select an incident to display a summary of details in the Details pane. The summary
includes the name, risk index and status of the incident, as well as a description. For
more information, see View the Incident Summary , page 91.
The incident details for suspicious activities detected in a privileged session are shown as
a table. Click the suspicious activities incident to view details:
The incident details are displayed in order according to the Risk Index. You can sort them
by Start Date. A summary of details for the first incident is displayed in the Details pane.
Select an incident to show its summary of details. The summary includes the name, risk
index and status of the incident, as well as a description. For more information, see View
the Incident Summary , page 91.
To view a summary of these activities for a specific day, move your mouse over any bar.
You can click on any of the activity types at the bottom. When the activity type is gray, its
events are not shown.
The activity types are received from Vault, SIEM, Unix, Network Sensor, AD, and EPM.
If there is no activity from one of these sources during the selected period of time, the type
is not shown. Activities for the time period before this version was installed are shown as
type of All.
The Incident Summary indicates whether the incident has been handled, using the
following stages:
Status Indicates
Active This incident has been viewed and is currently being handled.
In the Incidents graph, this type of incident is marked with a light
frame.
■ Click Details to display the Incident Details page, which contains more information
about each incident. See View Incident Details, page 92.
Status Indicates...
User The name of the Vault user whose account was used.
Target user The name of the target user whose account was used.
Target The target address of the machine where the event occurred.
address
Source The source address of the machine on which the event occurred.
address
Detection The time when the security event was detected. This enables you to
time see how much time has passed since the event occurred and security
may have been compromised.
Close an Incident
After you have handled an incident successfully, you can close it and it is removed from
the Dashboard’s Incident chart. Its risk index will not be used to calculate the system risk
index any more.
1. In the Incident Summary, click Close; the Close incident window is displayed.
2. From the Reason drop-down list, select the reason for closing the incident:
■ Incident was handled – The user investigated the reason for the incident, took
care of the relevant issues, and it is no longer a threat.
■ It is not a real incident – Although an anomaly was detected, human
observation determined that it was not a real anomaly.
3. Click OK to save your changes.
The
recommendati
ons in this
section are
the
Customer's
responsibility.
CyberArk
does not bear
any
responsibility
for the
procedures
below which
are performed
at the
Customer
site.
Caution:
This procedure is by recommendation only.
The recommendations in this section are the Customer's responsibility.
CyberArk does not bear any responsibility for the procedures below which are
performed at the Customer site.
1. In the Dashboard, click on the risk, Unconstrained Delegation in the left pane.
Caution:
This procedure is by recommendation only.
The recommendations in this section are the Customer's responsibility.
CyberArk does not bear any responsibility for the procedures below which are
performed at the Customer site.
1. In the Dashboard, click on the risk, Risky SPN(s) in the left pane.
The events connected to that Risk appear in the Risky SPN(s) window, with details
of each event.
■ The Risky SPN(s) window displays the following details: Score, Account
name, Event type, and Status.
■ If the risk appears in an aggregated summary, in the Account column
Multiple will appear instead of the account name, and in the risk details, a list of
detected compromised accounts appears.
2. Review each event.
3. Consider increasing the encryption level to use AES256.
4. Reduce the privileges of accounts associated with SPNs to the minimum possible.
5. Periodically clean SPNs that are no longer necessary.
6. Ensure that accounts associated with SPNs are configured with complex, rotated
and random generated passwords.
7. Store and manage the privileged account in the Vault.
8. Repeat for every machine where the potential risk is identified.
9. Continue with To Close and Filter Risky Events, page 102.
Caution:
This procedure is by recommendation only.
The recommendations in this section are the Customer's responsibility.
CyberArk does not bear any responsibility for the procedures below which are
performed at the Customer site.
1. In the Dashboard, click on the risk, Exposed Credentials in the left pane.
The events connected to that Risk appear in the Exposed Credentials window, with
details of each event.
5. Consider changing the method LDAP is using for authentication to a more secure
method, or use LDAPS.
6. Repeat for every machine where the potential risk is identified.
7. Continue with To Close and Filter Risky Events, page 102.
Caution:
This procedure is by recommendation only.
The recommendations in this section are the Customer's responsibility.
CyberArk does not bear any responsibility for the procedures below which are
performed at the Customer site.
1. In the Dashboard, click on the risk, Dual Usage in the left pane.
The events connected to that Risk appear in the Service Account logged on
interactively window, with details of each event.
■ To close an event, click the square to select the event, then click the Close
button.
2. To filter the events while reviewing them, do the following:
■ To do this, click the top square to select all the events, then click the Close
button.
Generate Reports
For a general description on generating and using PTA reports, see Generate a PTA
Report, page 103.
In the Reports page, you are able to generate the following PTA reports:
■ User Activities Report – This report describes the User Profile of a Vault user,
and displays their regular activities and anomalies during a specified period.
See Understanding the User Activities Report, page 105.
■ Privileged Threat Assessment Report – This report presents a thorough visual
summary of PTA analysis of privileged account activity in your organizational
environment.
See Understanding the Privileged Threat Assessment Report, page 106.
The following diagram displays the definitions for the Privileged Threat
Assessment Report:
3. Click Generate to generate the report for the selected time period.
Note:
If the user has a default profile, “default” is displayed. If no profile exists for this user,
“N/A” is displayed.
■ Events table – Displays all events that occurred for this user in the given time
frame. The table includes the following fields:
■ Serial number – The anomaly’s serial number in the table.
■ ID – The anomaly’s ID in the PTA database.
■ Score – The risk index of the event.
■ Target user – The target user affected by the event.
■ Target address – The target address of the machineaffected by the event.
■ Source address – The source address of the machine on which the event
occurred.
■ Event type - The type of event that occurred.
■ Detection time - The time when the event was detected.
Low 0 – 70
Medium 70 – 90
High 90 – 100
Note:
Time range selection does not impact the value of this field.
Column Description
Target The machine the user used to log on and/or to retrieve the
password.
Number of The number of incidents that the user or account was involved in.
incidents
Column Description
Name The fully qualified domain name (FQDN) of the machine where the
incident took place.
Number of The number of incidents that the user or account was involved in.
incidents
Column Description
Target The fully qualified domain name (FQDN) of the machine where the user
logged on and/or retrieved the password.
Times The number of times that the account was involved in security events.
observed
Last observed The date and time of the last security event.
Column Description
Column Description
Index The sequence of listed incidents, from the most severe to the least
severe.
User The type of user who used the account during each incident. Possible
values are:
■ Vault user
■ User name
Column Description
■ None
Affected asset The name of the asset that was affected by each incident. Possible
values are:
■ Target machine
■ Database
■ Source IP
■ Source machine
■ None
Detection time The date and time when each incident was detected.
Manage PTA
When the number of monitored targets and Domain Controllers exceeds your license
limits, a red exclamation mark appears and the number of monitored targets and Domain
Controllers is displayed along with its percentage of the total number of targets and
Domain Controllers allowed under your license terms. For information about expanding
your license, contact your CyberArk support representative.
Upload a License
To upgrade or renew your license, upload a valid license file as follows:
1. Click Uploading License to display the license upload area.
When the license file is uploaded successfully, the PTA dashboard is displayed.
Upload the license file provided by your CyberArk support representative as follows:
■ Click Browse and select the license file, then click Upload to upload the file. When
the license file is uploaded successfully, the PTA dashboard is displayed.
■ In the Inclusion List, specify the targets and Domain Controllers that PTA will be
monitoring. For example, to monitor all the production machines in your
organization, add them to this list. If no targets and Domain Controllers are specified
in the Inclusion List, PTA will assume that all targets and Domain Controllers in your
organization must be monitored.
■ In the Exclusion List, specify the targets and Domain Controllers that you want
PTA to disregard. For example, to exclude all machines that are used for testing or
debugging, add them to this list. If no targets and Domain Controllers are specified in
this list, PTA will assume that no machine must be excluded.
The targets and Domain Controllers you specify in the Exclusion List will be subtracted
from the targets and Domain Controllers you specified in the Inclusion List to form the
group of targets and Domain Controllers that PTA will monitor. If a particular target or
Domain Controller exists in both the Inclusion and the Exclusion List, the target or
Domain Controller will be excluded from PTA monitoring.
Targets and Domain Controllers can be added to the lists in the following formats:
■ IP/CIDR
■ Policy ID
■ Policy ID – Unix_test
1. Create baseline for 'Privileged Creates a baseline for the ‘Privileged access
access during irregular hours' during irregular hours’ algorithm from the Vault
algorithm log data.
2. Create baseline for 'Excessive Creates a baseline for the ‘Excessive access to
access to privileged accounts' privileged accounts’ algorithm from the Vault log
algorithm data.
5. Stop Tomcat Web Server Stops the PTA Web Server.
6. Start Tomcat Web Server Starts the PTA Web Server.
10. Clear analysis data Deletes all the analysis data from the database.
11. Clear database Clears all the data from the database.
12. Create baseline for 'Accessing the Creates a baseline for the 'Accessing the Vault
Vault from irregular IP' algorithm from irregular IP' algorithm from the Vault log
data.
13. Delete all events, incidents and Clears all the data of events’ incidents and
profiles profiles from the database
Option Description
Request (CSR)
Note:
The CSR requires a Base-64
encoded X.509 SSL certificate
16. Installing SSL Client Certificate Installs an SSL Client Certificate Issuer Chain
Issuer Chain (Root, Intermediate(s))
Note:
The SSL Certificate Issuer Chain
requires a Base-64 encoded X.509
SSL certificate
Note:
The ChangeLogLevel.sh, changeComponentResource.sh, and shortcuts.sh utilities are
found in the /opt/pta/utility/ folder.
Note:
By default, every change restarts
the affected component. To
disable the restart, add -norestart .
Logging
Logging enables you to track all the activities carried out by PTA or by PTA Windows
Agent and to identify problems, if they occur.
PTA Logging
The log files that are created by the system are stored on the PTA machine in the
locations specified below. It is not recommended to change the locations of these files.
For your convenience, you can use the changeLogLevel.sh utility instead of manually
changing the log level in the system .
Note:
To view statistics that are generated in the diamond.log, see View Statistics in the
diamond.log, page 36.
2. Value the <component id> based on the Applications you want to change:
■ 1 - Listener
■ 2 - Sampler
■ 3 - Background
■ 4 - DiamondWebApp
■ 5 - Services
■ 6 - statistics
■ 7 - prepwiz
■ 8 - dcaserver
■ 9 - agentshell
■ all - all Applications
3. Set the new <debug level>:
■ info
■ debug
■ trace
For example:
Example 1:
Change all components to "info":
changeLogLevel.sh -c all
Example 2:
Change Listener and Sampler components to "debug":
changeLogLevel.sh -c 12 -l debug
Example 3:
Change all components to "trace" without restarting:
changeLogLevel.sh -c all -l trace -norestart
■ Listener application:
/opt/tomcat/listener/log4j2.xml
■ Sampler application:
/opt/sampler/log4j2.xml
■ CasosServices application:
/opt/tomcat/CasosServices/logconf.log4cxx
■ Background scheduler:
/opt/backgroundScheduler/log4j2.xml
■ Statistics:
/opt/tomcat/statistics/log4j2.xml
2. In each of the above files, in the order listed above, change info to trace:
Example 1:
Change:
<priority value ="info" />
to:
<priority value ="trace" />
Example2:
Change:
<Logger name="com.cyberark.diamond" level="info">
to:
<Logger name="com.cyberark.diamond" level="trace">
Default
Appender
For Name of log file Debug
Name
Level
Example 1:
<category name="DEBUG" >
<priority value ="info" />
<appender-ref ref="debug_Appender"/>
</category>
Example2:
<category name="KRB_DEBUG" >
<priority value ="info" />
<appender-ref ref="krb_debug_Appender"/>
</category>
Example3:
<category name="LDAP_DBG" >
<priority value ="info" />
<appender-ref ref="ldap_debug_Appender"/>
</category>
Example4:
<category name="EVENT_DEBUG" >
<priority value ="info" />
<appender-ref ref="events_debug_Appender"/>
</category>
Example5:
<category name="FORWARDER_DEBUG" >
<priority value ="info" />
<appender-ref ref="forwarder_debug_Appender"/>
</category>
Monitor PTA
You can monitor the PTA Server machine using Simple Network Management Protocol
(SNMP).
You can monitor the following processes:
■ activemq.service
■ mongod.service
■ monit.service
■ tomcat.service
■ loggersocket
■ ptalistenerd
■ ptasamplerd
■ ptabschedulerd
■ ptastatisticsd
■ ptaservicesd
■ ptadcaserverd (only if PTA Windows Agent is configured)
■ ptacasosservicesd (only if Golden Ticket Detection is configured)
To allow the monitoring agent to communicate, you must create a custom firewall.
5. Verify that the port and connection are open, reboot the machine, and test the
firewall.
Note:
We recommend adding the most specific firewall rule possible.
3. Press Enter to collect all records and logs files, or specify the number of days for
which to include records and log files.
The following prompt appears:
Would you like to export db files? (Type 'y' or 'n'):
5. Enter Y to also export dump files, or N to not export the dump files.
The data is collected by the PTA export utility, then a confirmation message is
displayed.
Note:
Both machines must have the same PTA version.
The migration script runs in the background. The script can run for up to a few hours. Refer to the
import PTA log (/tmp/import_PTA_data.log) for details on the progress of the script. Important
messages are also written to the screen.
The migration script begins. The script can run for up to a few hours.
Before running the migration, save a snapshot of the PTA image
on the new PTA machine.
While the migration script runs in the background, the
existing PTA machine will be down and you will not receive any
data.
After the migration process ends successfully, all PTA data will
be contained on the new PTA machine.
Note:
The new PTA instance must have the same PTA image as the existing PTA machine. If
the script cannot connect to the existing PTA machine after three attempts, contact your
administrator.
5. The tool opens SSH port 22 on the new PTA machine to migrate the data from the
existing PTA machine.
Opening port 22 on the new PTA machine for SSH communication
with the existing (<IP>) PTA machine.
7. If there is no NTP server configuration on the existing PTA machine, the following
prompt appears.
Note:
If there is an NTP server configuration on the existing PTA machine, the migration script
copies the NTP server configuration to the new PTA machine.
Note:
If you entered n , the migration script copies the date and time from the existing
PTA machine to the new PTA machine.
a. Enter the time zone, then press Enter. The date and time prompt appears.
Specify current date and time in 24h format “MM/DD/YYYY
hh:mm” (example: 11/21/2013 16:20):
b. Enter the current date and time using the format included in the prompt, then
press Enter. The following prompt appears, enabling you to synchronize the time
zone you are setting, with your NTP server.
Do you want to synchronize with NTP server (y/n)? [n]
10.If any error messages appear, navigate to the log and resolve the issue. When you
open the log, address the error by searching for the version number and the task in
which the error occurred.
Note:
If the data migration process does not complete successfully, revert the new PTA
machine using the snapshot that was saved in Step 1 and rerun the migration script.
11.The data migration process is now complete and the following confirmation is
displayed:
Data migration completed successfully.
12.The existing PTA machine is shut down and the PTA Server is started on the new
PTA machine.
a. If the IP of the existing PTA machine is configured as static, the migration script
shuts down the existing PTA machine, sets the new PTA machine with the
existing IP, and starts PTA on the new machine.
Changing machine IP...
Shutting down the existing PTA machine.
Restarting network service...If you are using a terminal,
connect to the new IP - <IP> - where PTA <IP> is up and
running.
Starting PTA service on the new machine...
The migration process completed successfully. PTA is up and
running.
Install VMWare Tools on the new machine.
b. If the IP of the existing PTA machine is configured using DHCP, perform the
following:
The IP address of the existing PTA machine is configured
using DHCP. Perform the following:
1. Save the IP address for later reference.
2. Shut down the existing PTA machine.
3. Assign the saved IP address to the new PTA machine in the
DHCP server configuration. You might need your IT team's
assistance.
4. Start the PTA Server on the new machine.
5. Install VMWare Tools on the new machine.
Appendices
Note:
All parameters must be specified without spaces.
systemparm.properties
Section: Data Loading
date_format
Description Date format of the organization. For example, for US users the
format is MM/dd/yyyy.
vault_log_records_csv
pvwa_privileged_accounts_report_csv
Description The full pathname of the PVWA Inventory Report .csv file.
Section: LDAP
ldap_connection_protocol
ldap_base
ldap_port
ldap_server
Acceptable Values IP
ldap_domain
Description The name of the domain where the LDAP server resides.
ldap_group_name
ldap_pre2000
Section: LDAP
Section: Syslog
syslog_outbound
Description Outbound configuration that enables PTA to integrate with your SIEM.
Acceptable A list of the following information: {siem, format, host, port, protocol}
Values Acceptable values are:
■ siem – HP ArcSight, McAfee, QRadar, RSA, Splunk
■ format – CEF or LEEF
■ host - Host/IP
■ port – number
■ protocol - UDP
Default None
Value
syslog_port_tcp
Description The port used for incoming syslog records sent from the Vault machine and
Unix machines on the TCP port.
Acceptable Number between 1 and 65535. The number must represent an unused port.
Values
Default 514
Value
syslog_port_udp
Description The port used for incoming syslog records sent from the Vault machine and
Unix machines on the UDP port.
Acceptable Number between 1 and 65535. The number must represent an unused port.
Values
Default 514
Value
vault_timezone
Acceptable NA
Values
syslog_non_human_filter
Description List of non-human usernames whose syslog messages PTA will ignore.
Section: Syslog
Values
Default passwordmanager,prov_,pvwaappuser,psmapp
Value
syslog_port_ssl_data_tcp
Acceptable Number between 1 and 65535. The number must represent an unused port.
Values
Default 6514
Value
syslog_port_ssl_control_tcp
Acceptable Number between 1 and 65535. The number must represent an unused port.
Values
Default 7514
Value
send_pta_events_to_pas_enabled
Description Enable or disable the option to send PTA events to the Vault.
Acceptable true/false
Values
Default true
Value
Section: Syslog
Sub-section: Syslog
custom_vault_device_types
Acceptable String
Values
Section: Syslog
Sub-section: Syslog format legacy
syslog_format_regex_legacy
Section: Syslog
Sub-section: Syslog format legacy
Values
Default (<\\d+>)?([\\d\\.]+)?\\s*([a-zA-Z]+\\s+\\d{1,2}\\s+\\d{1,2}:\\d{1,2}:\\d
Value {1,2})\\s+([^\\s]+)\\s+(.*)
syslog_field_index_date_legacy
Description The index that corresponds to the date field defined in the syslog_format_
regex_legacy property.
Default 3
Value
syslog_field_index_machine_legacy
Description The index that corresponds to the machine field defined in the syslog_
format_regex_legacy property.
Default 4
Value
syslog_field_index_body_legacy
Description The index that corresponds to the body field defined in the syslog_format_
regex_legacy property.
Default 5
Value
Section: Syslog
Sub-section: Syslog format 5424
syslog_format_regex_5424
Default <(\\d+)>([\\d\\.]+)\\s+(\\d{4}-\\d{2}-\\d{1,2}T\\d{1,2}:\\d{1,2}:\\d{1,2}Z)\\s+
Value ([^\\s]+)\\s+(.*)
syslog_field_index_date_5424
Description The index that corresponds to the date field defined in the syslog_format_
regex_5424 property.
Section: Syslog
Sub-section: Syslog format 5424
Default 3
Value
syslog_field_index_machine_5424
Description The index that corresponds to the machine field defined in the syslog_
format_regex_5424 property.
Default 4
Value
syslog_field_index_body_5424
Description The index that corresponds to the body field defined in the syslog_format_
regex_5424 property.
Default 5
Value
Section: Syslog
Sub-section: Audit creator for vault retrieve password
audit_creator_body_regex_vault_retrieve_password
Description A regular expression that defines the data format in a syslog string that the
audit creator detects.
body_field_index_vault_retrieve_password_user
Description The index that corresponds to the user who retrieved the password from the
Vault in the audit_creator_body_regex_vault_retrieve_password property.
Default 1
Value
body_field_index_vault_retrieve_password_date
Description The index that corresponds to the date when the password was retrieved
Section: Syslog
Sub-section: Audit creator for vault retrieve password
Default 2
Value
body_field_index_vault_retrieve_password_account_user
Description The index that corresponds to the user specified in the account that was
retrieved from the Vault in the audit_creator_body_regex_vault_retrieve_
password property.
Default 4
Value
body_field_index_vault_retrieve_password_account_address
Description The index that corresponds to the address specified in the account that was
retrieved from the Vault in the audit_creator_body_regex_vault_retrieve_
password property.
Default 5
Value
Section: Syslog
Sub-section: Audit creator for unix session opened
audit_creator_body_regex_unix_session_opened
Description A regular expression that defines the data format in a syslog string that
the audit creator detects.
body_field_index_unix_session_opened_user
Description The index of the user who opened the unix session in the audit_creator_
body_regex_unix_session_opened property.
Section: Syslog
Sub-section: Audit creator for unix session opened
Default Value 2
body_field_index_unix_session_opened_session_type
Description The index of the type of session that was opened in the audit_creator_
body_regex_unix_session_opened property.
Default Value 1
Section: Syslog
Sub-section: Audit creator for CEF
audit_creator_body_regex_cef
Description A regular expression that defines the data format in a syslog string that the
audit creator detects.
Default CEF:(?<cefVersion>\\d+)\\|(?<vendor>(?:[^\\\\\\|]|\\\\.)*+)\\|(?<product>(?:
Value [^\\\\\\|]|\\\\.)*+)\\|(?<version>(?:[^\\\\\\|]|\\\\.)*+)\\|(?<id>(?:[^\\\\\\|]|\\\\.)*+)\\|
(?<name>(?:[^\\\\\\|]|\\\\.)*+)\\|(?<severity>(?:[^\\\\\\|]|\\\\.)*+)\\|
(?<extension>.*)
custom_CEF_Windows_plugin_parameter
Description Custom vendor and product name for Windows logon support
Section: Schedulers
excessive_access_task_trigger
Description The time for frequent updates of the excessive access (user) baseline.
The default is midnight of every day.
Default 0 0 0 * * ?
Value
irregular_ip_task_trigger
Description The time for frequent updates of the irregular IP (user) baseline. The
Section: Schedulers
Default 0 0 0 * * ?
Value
vault_accounts_reload_task_trigger
Description The time for frequent updates of the Vault accounts reload. The default is
1:00 AM of every day.
Default 0 0 1 * * ?
Value
human_vault_user_cache_reload_task_trigger
Description The time for frequent updates of the Vault users reload. The default is
midnight of every day.
Default 0 0 0 * * ?
Value
irregular_hours_asset_task_trigger
Description The time for frequent updates of the irregular hours (machine) baseline.
The default is midnight of every day.
Default 0 0 0 * * ?
Value
irregular_hours_user_task_trigger
Description The time for frequent updates of the irregular hours (user) baseline. The
default is midnight of every day.
Default 0 0 0 * * ?
Value
audits_retention_task_trigger
Description The time for deleting raw data that has passed the retention period. The
default is 3:30 AM every day.
Section: Schedulers
Default 0 30 3 * * ?
Value
Section: Algorithms
disabled_detection_algorithms
Acceptable ■ ActiveDormantUserAnomalyAlgorithm
Values ■ AggregativeIceAnomalyAlgorithm
■ BaseICEAnomalyAlgorithm
■ ExcessiveAccessAnomalyAlgorithm
■ ExcessiveAccessAssetAnomalyAlgorithm
■ ExcessiveAccessUserAnomalyAlgorithm
■ GoldenTicketAnomalyAlgorithm
■ InteractiveLogonWithServiceAccountAnomalyAlgorithm
■ IrregularHoursAssetAnomalyAlgorithm
■ IrregularHoursUserAnomalyAlgorithm
■ LogonIrrSourceMachineToTgtMachineByTgtAccAnomalyAlgorithm
■ LogonIrrTgtAccFromMachineAnomalyAlgorithm
■ LogonIrrTgtMachineByTgtAccAnomalyAlgorithm
■ MachineAccessViaIrregularIpAnomalyAlgorithm
■ MaliciousRetrievalOfDomainAccountsAnomalyAlgorithm
■ OverPassTheHashAnomalyAlgorithm
■ PacAsRequestAttackAnomalyAlgorithm
■ PSMRiskyCommandAnomalyAlgorithm
■ PSMVaultAnomalyAlgorithm
■ SuspectedCredentialsTheftAnomalyAlgorithm
■ UnmanagedPrivilegedAccessAnomalyAlgorithm
■ VaultAccessViaIrregularIpAnomalyAlgorithm
■ RiskySPNRisk
■ IrregularDayUserAnomaly
Section: Algorithms
Sub-section: irregular hours
irr_hours_excluded_usernames_list
Description The list of users to be excluded from the Irregular Hours baseline
Section: Algorithms
Sub-section: irregular hours
Default None
Value
irr_hours_baseline_range_start
Description The starting-point of training data (vault_log) in the range, for baseline
calculation.
Default 0
Value
irr_hours_baseline_range_end
Description The endpoint of training data (vault_log) in the range, for baseline
calculation.
Default 1
Value
irr_hours_baseline_debug
Note:
This parameter is for internal debugging purposes.
Acceptable true/false
Values
Default false
Value
Section: Algorithms
Sub-section: DC Replication
dc_replication_whitelist
Section: Algorithms
Sub-section: DC Replication
Default None
Value
Section: Algorithms
Sub-section: Unmanaged privileged access
privileged_users_list
Description A list of users considered privileged in the organization, and who should be
managed by CyberArk’s Privileged Account Security solution.
Acceptable A list of the following information: {platform, case sensitivity of user, regular
Values expression}
Acceptable values are:
■ Platform – WINDOWS/UNIX/ORACLE (upper case)
■ Case sensitivity – true/false
■ Regex – string
Default If this value is not defined by the user, the system will use the following
Value default value:
[{"mPlatform":"UNIX","mIsCaseSensitive":true, "mUsers" :[root]},
{"mPlatform":"WINDOWS","mIsCaseSensitive":false,"mUsers":
[.*admin.*]},{"mPlatform":"ORACLE", "mIsCaseSensitive":
false,"mUsers":[sys,system,sysman]}]
privileged_groups_list
Default None
Value
Unmanaged_Privileged_Access_Score
Default 30
Value
Section: Algorithms
Sub-section: vault access via irregular ip
irregular_ip_tail_proporion_exp_base
Description The base taken in the exponent of the proportion of the tail of the given IP
which was not spanned by the tree.
Specify a number greater than ‘1’.
Acceptable ■ Double
Values
Default 8.0
Value
irr_ip_excluded_usernames_list
Description A list of usernames that PTA will ignore when analyzing Vault access via
irregular IP addresses.
Default DR,BATCH,BACKUP
Value
irr_ip_excluded_sourceIP_list
Description A list of IP addresses that PTA will ignore when analyzing Vault access
via irregular IP addresses.
Acceptable IPs
Values
Section: Algorithms
Sub-section: ICE - asset connection words algorithms
asset_connection_excluded_domain_account_list
Acceptable Values A list of the following information: {domain, list of users that belong
to the domain}
Acceptable values are:
■ Domain – any valid domain name (string)
■ Users – string of users name separated by comma
Section: Algorithms
Sub-section: Suspected credentials theft
not_via_pim_time_window
Description The number of minutes of the default check-out time period of a password.
Acceptable Number
Values
Default 480
Value
sct_excluded_account_list
Description A list of usernames that PTA will ignore when analyzing connections to
remote machines without first retrieving the required credentials from the
Vault.
Default None
Value
Section: Algorithms
Sub-section: Suspicious Password Change
suspicious_password_change_time_window_minutes
Description The time, in minutes, PTA waits before indicating a password change
was not done by CPM and is suspicious.
Default Value 2
Section: Algorithms
Sub-section: Suspicious Password Change
suspicious_password_change_score
Default Value 80
Section: Algorithms
Sub-section: Suspicious activities detected in a privileged session
risky_command_configuration
Descri A regular expression that defines the suspicious session activities that
ption PTA analyzes.
Accept A list of the following information: {regular expression of the command, score,
able description, category}
Values Acceptable values are:
■ Regex – string
■ Score – 1-100
■ Description (optional) – string
■ Category - Universal keystrokes, SCP, SQL, SSH, Windows titles
■ Response - NONE, TERMINATE, SUSPEND
■ Active - true/false
For example:{"regex":"kill
(.*)","score":"70","description":"description2","category":"SSH","response
":"NONE",“active”:true}]
Section: Algorithms
Sub-section: Risky SPN
risky_spn_excluded_account_list
Description A list of usernames, domains and service principal names that PTA will
ignore when analyzing privileged accounts that contain service principal
names.
Section: Algorithms
Sub-section: Risky SPN
All fields can be configured as a list with a ‘,’ delimiter, and can support
asterisks.
For example:
risky_spn_excluded_account_list=[{"mUsers":["user1"],"domain":
["domain.com"],"service":["host\service","fqdn\service"]},{"mUsers":
["sqladmin"],"domain":["domain.com"],"service":["*"]}]
Default None
Value
Section: Email
mail.smtp.host
Acceptable IP address
Values
Default None
Value
mail.smtp.port
Default 25
Value
mail.smtp.auth
Acceptable true/false
Values
Default true
Value
mail.debug
Description Whether the debug messages of the email process appear in the log.
Acceptable true/false
Values
Default false
Value
email_from
Section: Email
Default None
Value
email_recipient
Description A list of the recipient email addresses that will receive an email when an
incident is discovered. Specify email addresses using only lowercase
characters. Multiple addresses are separated by a semi-colon (;).
Default None
Value
Section: DNS
dns_srv_record_format
Default \\s*\\d+\\s+\\d+\\s+\\d+\\s+((?=.{1,255}$)[0-9A-Za-z](?:(?:[0-9A-Za-z]|-)
Value {0,61}[0-9A-Za-z])?(?:\\.[0-9A-Za-z](?:(?:[0-9A-Za-z]|-){0,61}[0-9A-Za-
z])?)*\\.?)\\.
dns_ldap_domain_srv_record_name_prefix
Acceptable String
Values
Default _ldap._tcp.dc._msdcs.
Value
dns_resolving_timeout
Default 10000
Value
Section: Domain
domain_controllers
Section: Domain
Acceptable {"domain_name":[{"mAddress":"dc1_ip_address","mHostName":"dc1_
Values host_name"},{"mAddress":"dc2_ip_address","mHostName":"dc2_host_
address"}]}
Default None
Value
pre2000_domain_list
Description List of DNS names with their corresponding pre-Windows 2000 names.
Acceptable {"preWin2000DomainName":"fullDNSDomainName",
Values "preWin2000DomainName2":"fullDNSDomainName2"}
Default None
Value
epv_https_enabled
Acceptable true/false
Values
Default true
Value
epv_host
Description The name of PAS that PTA will connect to. Enter the FQDN.
Acceptable String
Values
Default -
Value
epv_port
epv_root_context
Acceptable String
Values
Default PasswordVault
Value
Section: Domain
send_psm_session_related_data
Description Whether PTA will send a privileged session risk score to PSM to make the
score available in PVWA.
Acceptable true/false
Values
Default true
Value
Section: UI
numberOfIncidentsToGroupBy
Description The number of suspicious session activity incidents for the selected
timeframe that will be displayed in individual bubbles on the dashboard.
The rest of the incidents will be displayed in a single aggregated bubble.
Acceptable Number
Values
Default Value 0
Section: Mitigation
epvintegrationRotatePasswordExcludeList
Acceptable ■ SuspectedCredentialsTheft
Values ■ OverPassTheHash
■ SuspiciousPasswordChange
EnableAutomaticMitigationByEPV
Acceptable true/false
Values
Default Value ■ When integration with PAS is not configured, this parameter is
not relevant.
■ When integration with PAS is configured, this parameter is
automatically set to true.
epvIntegrationEnableAddPendingAccount
Section: Mitigation
epv_integration_rotate_password
epv_integration_reconcile_password
psm_mitigation_enabled
psm_mitigation_termination_enabled
psm_mitigation_suspension_enabled
audits_retention_period_in_days
Description The retention period for raw data to be stored in PTA before it will be
deleted. This does not apply to events that PTA has detected.
Acceptable Number
Values
Default 90
Value
Section: PTA Agent
enable_client_verification
enable_dcagent_connection
Note:
All parameters must be specified without spaces.
Section: ServerInfo
PTA_IP_Address
SSL_Data_Port
Description The port used to send syslog data to PTA in a secure channel.
SSL_Control_Port
Description The port used to send statistics data to PTA in a secure channel.
Section: DCInfo
Server_Verification_Required
Acceptable true/false
Values
Default true
Value
Section: DCInfo
Network_Interface_ID
Acceptable Number
Values
Default 1
Value
KeepAlive_Interval_msec
Acceptable Number
Values
Network_Enabled
Default True
Value
Windows_Event_Enabled
Default False
Value
Section: Debug
Write_Events_To_Log
Description Set the debug events flag. This parameter is for internal debugging
purposes.
Acceptable ■ 0 - false
Values ■ 1 - true
Section: Monitoring
Machine_Monitoring_Enabled_Global
Section: Monitoring
Machine_Monitoring_Enabled_Memory
Machine_Monitoring_Enabled_CPU
Machine_Monitoring_Enabled_Network
Machine_Monitoring_To_Log
Machine_Monitoring_Interval_sec
Default Value 10
Section: ClientCertificate
Client_Certificate_Enabled
Description Determines whether the client sends the certificate to the PTA Server
for verification .
Acceptable true/false
Section: ClientCertificate
Values
Client_Certificate_Subject_Name
Acceptable String
Values
Section: Enforcement
Process_CPU_Enabled
Process_CPU_Monitoring_Time_Window
Default Value 60
Process_CPU_Percent_Threshold
Default Value 35
Process_CPU_Percent_Exceeded_Samples_sec
Default Value 70
Section: Forwarder
Windows_Event_Log
Description The Windows event log name from which the PTA Windows Agent
reads the events.
Acceptable String
Values
Time Zones
The PTA installation wizard requires you to configure your time zone. The following table
lists the available time zones.
GB Iran Mexico/BajaSur
NZ Asia/Macao Asia/Irkutsk
Rico