15 Server Privilege Management Use Cases for Unix & Linux
Eliminate sudo and achieve greater control over Unix & Linux environments. Download this guide to learn how to get started.
Analyze user behavior by collecting, securely storing and indexing keystroke logs, session recordings and other privileged events.
Elevate privileges for standard users on Unix and Linux through fine-grained, policy-based controls.
Enable users to run specific commands and conduct sessions remotely based on rules without logging on as admin or root.
Utilize factors such as time, day, location and application/asset vulnerability status to make privilege elevation decisions.
Audit and report on changes to critical policy, system, application and data files.
Correlate user behavior against asset vulnerability data and security intelligence from best-of-breed security solutions.
Eliminate sudo and achieve greater control over Unix & Linux environments. Download this guide to learn how to get started.
Feature | Description |
---|---|
Auditing & Governance | Analyzes user behavior by collecting, securely storing and indexing keystroke logs, session recordings and other privileged events. This capability speeds forensics and simplifies compliance by providing an unimpeachable audit trail of all user activity. |
Graphical Log Review & Session Playback | Search, view and playback collected audit data. |
GUI-based Administration Console | Web-based administration interface that helps to discover, deploy, upgrade and manage systems. |
Remote System & Application Control | Enables users to run specific commands and conduct sessions remotely based on rules without logging on as root. This capability enhances user productivity by simplifying processes that are complex with native tools or sudo, limits attack surfaces by preventing the use of the root and admin account, and keeps systems safe by only allowing approved applications and commands to be executed. |
Dynamic Access Policy | Utilizes factors such as time, day, location and application/asset vulnerability status to make privilege elevation decisions. This capability reduces attack surfaces by helping IT make privilege decisions based on context and risk. |
GUI-based Policy | Role-based privilege elevation polices configured using a GUI. |
Fine-Grained Least Privilege | Elevates privileges for standard users on Unix and Linux through fine-grained, policy-based controls. This capability enables compliance through the compartmentalization of IT tasks that require privileged accounts, and limits attack surfaces by providing just enough access to complete a task. |
File & Policy Integrity Monitoring | Audits and reports on changes to critical policy, system, application and data files. This capability reduces risk by ensuring that critical files have not been tampered with, protects critical files from malware and privilege misuse, and eliminates workarounds or gaps that could lead to exploits. |
System Level Controls | Controls what the system will do vs. what the user types. |
System Level Auditing | Audit file system operations and scripts. |
Privileged Shells | Default user shells to control privilege and audit user activity. |
Data Driven Policies | Policies controlled by external data sources such as LDAP and databases. |
Privileged Threat Analytics | Correlates user behavior against asset vulnerability data and security intelligence from best-of-breed security solutions. This capability reduces the risk that user activity can lead to a potentially damaging data breach. |