Step-Tech-Gui05 Cyberark Pam User Guide 5
Step-Tech-Gui05 Cyberark Pam User Guide 5
Objective/Risk
Solution David
CyberArk Privileged Access Management (PAM) is a
solution that helps organizations to control, monitor,
Owner Muliro
Definitions
PAM Privileged Access Management (PAM) refers to a comprehensive
cybersecurity strategy – comprising people, processes, and
technology – to control, monitor, secure and audit all human and
non-human privileged identities and activities across an
enterprise IT environment.
1.2.3 Then you will see the list of devices you are entitled to access
a) Make sure you click the “Accounts” icon on left side as highlighted
by red color
a) Click the “Open file” from the Downloads. Avoid clicking on the RDP file
more than once.
b) By default, it opens with new tab if you want to open it with new window
off “Remote Access” button.
d) Enter your phone number, including a + sign and the country code.
h) Set the PIN code that CyberArk Mobile uses to restore your settings, when
relevant.
n) When you have successfully joined the tenant, the following message
appears on the Remote Access portal.
▪ <Ad_Username>@[email protected]@10.3.74.114
▪ E.g., yared.kebede@[email protected]@10.3.74.114
• After you login to the Jump-box you can user your AD credentials.
3 Document History
The document Owner and Champion are responsible for reviewing this
document every 1 years or when relevant information to include.
The primary version of this policy document shall be stored within the Safaricom
Ethiopia portal. Any other versions outside of that library location will be of an
uncontrolled status.
4 Document Approval
Versi Name Position Signature Date
on