Privileged Threat Analytics (PTA)
Implementation Guide
3.95
Copyright © 1999-2018 CyberArk Software Ltd. All rights reserved.
This document contains information and ideas, which are proprietary to CyberArk
Software Ltd. No part of this publication may be reproduced, stored in a retrieval system,
or transmitted, in any form or by any means, electronic, mechanical, photocopying,
recording, scanning, or otherwise, without the prior written permission of CyberArk
Software Ltd.
PTAIMP003-95-0-1
2 Table of Contents
Table of Contents
Introducing CyberArk PTA 4
What Detections Does PTA Report? 6
Use PTA for the First Time 10
Log on to PTA for the First Time 11
Upload the License File 13
Configure and Implement PTA 14
Configure LDAP 15
Create an Active Directory Query User for LDAP Users 15
Configure LDAP Connection Details 15
Configure LDAP Authentication to PTA (Optional) 17
Configure PTA for PAS Integration 18
Configure PTA for Privileged Session Manager (PSM) Integration 21
PTA and PSM Integration Architecture 21
Configure PTA for PSM Integration 22
Configure Suspicious Session Activities in PTA 23
Configure PTA for Endpoint Privilege Manager (EPM) Integration 25
Review the Golden Ticket and Network Sensors Configuration 27
Configure Privileged Users 27
Whitelist: Configure a List of Allowed Machines to Perform DC Replication 29
Configure PTA for Authorized Hosts 31
Configure PTA to Support Vault DR 33
Troubleshoot PTA Configuration 34
Use the PTA Utility for Troubleshooting 35
Use the diamond.log for Troubleshooting 35
Domain Controllers – View the List and Manage the Cache 46
Test the PTA Network Sensor Connection to the PTA Server 47
Reset PTA Network Sensor Connection with the PTA Server 47
Modify or Troubleshoot PTA Network Sensor Configurations 48
Troubleshoot PAS Integration 48
PTAAppUser is Suspended - Reactivate CasosService 49
Integrate PTA 51
Integrate PTA with PAS 52
CyberArk Vault / PAS Compatibility 52
Configure the Vault to Forward syslog Messages to PTA 53
Configure the PVWA for PTA Integration with PAS 55
Integrate PTA with PSM 56
Integrate PTA with EPM 57
Forward Log Data to PTA 58
Configure Windows Event Forwarder server to forward Windows events to PTA 59
Configure HP ArcSight to Forward syslog Messages to PTA 59
Configure Splunk to Forward syslog Messages to PTA 59
Configure QRadar to Forward syslog Messages to PTA 61
Configure LogRhythm to Forward syslog Messages to PTA 63
Configure RSA to Forward syslog Messages to PTA 63
Privileged Threat Analytics
Table of Contents 3
Configure McAfee ESM to Forward syslog Messages to PTA 63
Configure UNIX Hosts to Forward syslog Messages to PTA 68
Send PTA Data 71
Send PTA syslog Records to SIEM 71
Send PTA Alerts to Email 77
Send PTA Alerts to the Vault 78
Use PTA 79
Access and Use PTA 80
Log on to PTA 81
Log off from PTA 82
Change your Password 82
Reset your Password 83
Manage your Password 83
Access PTA Information 85
Use and Understand the Dashboard 87
Select a Time Frame 88
View Current Incidents 88
View System Activities 90
View the Incident Summary 91
Close an Incident 93
View Privileged Related Risks 95
Generate Reports 103
Generate a PTA Report 103
Understanding the User Activities Report 105
Understanding the Privileged Threat Assessment Report 106
Manage PTA 114
Manage your License 115
View your License Settings 115
View License Usage 116
Upload a License 116
Updating an Expired License File 117
Use the Inclusion and Exclusion Lists 117
Run the PTA Management Utility 120
Other PTA Utilities 121
Logging 123
PTA Logging 123
PTA Windows Agent Logging 125
File Size and Rolling 126
Reset PTA to Clear All Data 126
Monitor PTA 127
Collect Data from PTA 128
Import PTA to a New Machine 129
Appendices 132
Configure System Properties 133
systemparm.properties 133
Configure Agent Properties 154
Time Zones 158
Privileged Threat Analytics
4
Introducing CyberArk PTA
Since privileged accounts are most often compromised as part of an attack, CyberArk
Privileged Threat Analytics (PTA) continuously monitors the use of privileged accounts
that are managed in the CyberArk Privileged Account Security (PAS) platform, as well as
accounts that are not yet managed by CyberArk, and looks for indications of abuse or
misuse of the CyberArk platform. PTA also looks for attackers who compromise
privileged accounts by running sophisticated attacks, such as Golden Ticket.
PTA is part of the CyberArk Privileged Account Security solution and provides an
additional security layer, which detects malicious activity caused by privileged accounts
and proactively contains in-progress attacks. PTA supports detection of malicious
activities in privileged accounts when authenticated either by passwords, or by SSH
Keys.
Using proprietary profiling algorithms, PTA distinguishes in real time between normal
and abnormal behavior, and raises an alert when abnormal activity is detected. In this
way, it leverages the capabilities of the CISO to reduce the risk of inside-threats,
malwares, targeted attacks and APTs that utilize privileged users to carry out attacks.
This significantly reduces the ability of these threat factors to infiltrate the system and
eliminates one of the biggest risks to your organization.
Using DPI technology and tapping the organization network, PTA can deterministically
detect and raise alerts on Kerberos attacks in real time.
PTA also proactively monitors critical privileged account related risks in the IT
environment that can be abused by an attacker. PTA sends alerts to the security team to
handle these risks before attackers abuse them.
PTA processes the network traffic and receives raw events from your organization’s
Vault, UNIX machines, and Windows machines, and receives additional inputs by
Privileged Threat Analytics
PTA Implementation Guide 5
querying Active Directory, then detects security events in real time and sends them as
alerts by email, to the PTA’s proprietary dashboard, or to the SIEM dashboard.
In general, PTA does the following:
■ Detects privileged accounts related anomalies: Detect anomalies in the usage
of privileged accounts, such as usage that does not occur during the regular hours of
use.
■ Detects privileged accounts related security incidents: Detects security
incidents by running deep packet inspection and finding deterministic characteristics
of Kerberos attacks, and additional known attacks such as Golden Ticket and
Malicious Retrieval of Domain Accounts (DC Sync).
■ Detects privileged accounts related risks: Detects risks by monitoring and
alerting on critical risks in privileged accounts.
■ Contains security incidents: Generates actionable insights to support rapid and
automatically reactive incident containment.
In order to pinpoint abnormal activities of privileged users, PTA employs various
statistical algorithms. These algorithms generate profiles of system activities, and
subsequent activities are searched for deviations from these profiles. Deviations that are
suspicious and pose a potential risk are classified as security incidents.
For Example: A user who connects to a remote machine during hours which are deemed
irregular (when compared to the specific user’s connectivity profile as learned by PTA),
or from an unfamiliar IP.
In addition, PTA can detect Kerberos attacks in real-time. These Kerberos attacks can be
used by an attacker for privilege escalation, and to achieve persistency within the
network.
For a complete list of PTA detections, indicators of compromise and their descriptions,
see What Detections Does PTA Report?, page 6.
All system activity and analysis is displayed in a dashboard that provides details about
current and past privileged accounts related incidents, latest privileged accounts related
risks, and a summary of system activity. The dashboard presents all this information in
multiple graphic analyses of system activity and security incidents that enable you to see
and understand system activity at a glance.
Privileged Threat Analytics
6 What Detections Does PTA Report?
PTA detects different types of suspicious privileged account activity and ranks these
detections in terms of severity. It then classifies them in different risk levels. PTA also
correlates multiple security events that occur during a certain period and which are
related to each other, into one or more incidents, so that they tell a more comprehensive
story and enable initial investigation.
When PTA performs a real-time data analysis, colorful bubbles in the Incidents chart
display suspicious activities. The Risk Index is denoted by the color of the bubble and its
risk index. The higher the bubble appears in the chart, the more risk it reflects. For further
details, see Use and Understand the Dashboard, page 87.
PTA enables you to generate a high-level report of all incidents for a particular Vault user
during a specified period. The report gives you an immediate understanding of a user’s
profile (normal behavior), security events, and audit records over a given timeframe. For
further details, see Generate Reports, page 103.
What Detections Does PTA Report?
PTA reports multiple suspicious activities and indicators of compromise.
Event
Detection / Required
Event Description Type
Event Name Sensor
ID
Suspected Detected when a user connects to a Logs 21
credentials machine without first retrieving the Vault
theft required credentials from the Vault.
Unmanaged Detected when a connection to a Logs 22
privileged machine is made with a privileged Vault
access account that is not stored in the Vault. AD
(optional)
Privileged Detected when a user retrieves a Vault 23
access to the privileged account password at an
Privileged Threat Analytics
PTA Implementation Guide 7
Event
Detection / Required
Event Description Type
Event Name Sensor
ID
Vault during irregular hour for that user.
irregular hours
Excessive Detected when a user retrieves Vault 24
access to privileged accounts more frequently
privileged than normal for that user.
accounts in the
Vault
Privileged Detected when a user accesses the Vault 25
access to the Vault from an unusual IP address or
Vault from subnet.
irregular IP
Active dormant Detected when PTA detects Vault 26
Vault user indications of activity from a Vault
dormant user.
Machine Detected when a machine is accessed Logs 27
accessed at an irregular hour.
during irregular
hours
Anomalous Detected when an account logged onto Network 30
access to a high number of machines during a Sensor
multiple relatively short time. PTA Wind
machines ows Agent
PAC attack Detected when PTA detects Network 31
indications of a PAC (Privilege Sensor
Account Certificate) attack in the PTA Wind
network. ows Agent
OverPass the Detected when PTA detects Network 32
Hash attack indications of an Overpass the Hash Sensor
attack in the network. PTA Wind
ows Agent
Golden Ticket Detected when PTA detects Network 33
attack indications of a Golden Ticket attack in Sensor
the network. PTA Wind
ows Agent
Suspected Detected or blocked when EPM 34
LSASS EPM suspects LSASS credentials
credentials harvesting occurred on a specific
harvesting endpoint.
Suspected Detected or blocked when EPM 35
SAM hash EPM suspects SAM hash harvesting
harvesting occurred on a specific endpoint.
Privileged Threat Analytics
8 What Detections Does PTA Report?
Event
Detection / Required
Event Description Type
Event Name Sensor
ID
Malicious Detected when there is a potentially Network 36
retrieval of malicious retrieval of credentials from Sensor
domain the domain controller (DCSync). PTA Wind
accounts ows Agent
Exposed Detected when services connecting Network 37
credentials with LDAP expose accounts Sensor
credentials in clear text. PTA Wind
ows Agent
Unconstrained Accounts with unconstrained AD 38
delegation delegation are accounts that are
granted permissive delegation
privileges and thereby expose the
domain to a high risk.
Suspicious Detected when PTA identifies a Vault 39
activities privileged session with activities
detected in a (commands and Vault anomalies)
privileged defined as suspicious.
session
Suspected Detected or blocked when EPM 40
credentials EPM suspects credentials theft from
theft from Chrome occurred on a specific
Chrome endpoint.
Suspected Detected or blocked when EPM 41
credentials EPM suspects credentials theft from
theft from Firefox occurred on a specific
Firefox endpoint.
Suspected Detected or blocked when EPM 43
credentials EPM suspects credentials theft from
theft from VNC VNC occurred on a specific endpoint.
Suspected Detected or blocked when EPM 44
credentials EPM suspects credentials theft from
theft from WinSCP occurred on a specific
WinSCP endpoint.
Suspected Detected or blocked when EPM 46
credentials EPM suspects credentials theft from a
theft from service account occurred on a specific
service endpoint.
account
Suspected Detected or blocked when EPM 47
domain EPM suspects domain credentials
credentials theft from the local cache occurred on
theft from local a specific endpoint.
cache
Privileged Threat Analytics
PTA Implementation Guide 9
Event
Detection / Required
Event Description Type
Event Name Sensor
ID
Suspicious Detected or blocked by EPM when a EPM 49
request to boot request to boot a machine in safe
in safe mode mode occurred.
Suspected Detected or blocked when EPM 50
credentials EPM suspects credentials theft from
theft from mRemoteNG occurred on a specific
mRemoteNG endpoint.
Suspected Detected or blocked when EPM 51
credentials EPM suspects credentials theft from
theft from CheckPoint Endpoint Security VPN
CheckPoint occurred on a specific endpoint.
Endpoint
Security VPN
Service Detected when PTA identifies an Logs 52
account logged interactive logon with a service Vault
on interactively account. (optional)
AD
(optional)
Risky SPN Privileged accounts with SPN (service AD 53
principal name) configuration can be
vulnerable to offline brute-forcing and
dictionary attacks, allowing a
malicious insider to recover the
account's clear-text password.
Privileged Detected when a user retrieves a Vault 54
access to the privileged account password on an
Vault during irregular day for that user.
irregular days
Suspicious Detected when PTA identifies a Logs 55
password request to change or reset a password Vault
change by bypassing the Password Manager.
Privileged Threat Analytics
10
Use PTA for the First Time
As a first time PTA user, you must perform the following procedures to log on to PTA for
the first time, and to authenticate to PTA.
Users can log on to PTA using username and password authentication. After successful
authentication, all communication between the browser and PTA is encrypted using the
industry-standard Secure Socket Layer (SSL) encryption.
Log on to PTA for the First Time
Upload the License File
Privileged Threat Analytics
PTA Implementation Guide 11
Log on to PTA for the First Time
When you log on to PTA for the first time, you are required to change the initial password
so that only you know what the password is.
To Log on to PTA for the First Time:
1. In your browser, navigate to the following URL: https://ptaserver
The PTA Sign In window is displayed.
2. In the Sign In window, do the following:
a. In Username, type administrator.
b. In Password, type the initial password provided by CyberArk: Administrator.
c. Click Sign In; the Change Password window appears.
Privileged Threat Analytics
12 Log on to PTA for the First Time
3. In Current Password, type Administrator.
4. In New Password, specify a password that meets all of the following criteria:
■ A minimum of twelve characters
■ At least two uppercase and two lowercase letters
■ At least two digits
5. In Confirm Password, retype the new password, then click Change password;
PTA changes the administrator’s password, authenticates you and displays the PTA
dashboard.
6. Continue with Upload the License File, page 13.
Privileged Threat Analytics
PTA Implementation Guide 13
Upload the License File
After you have authenticated successfully to PTA for the first time, the License
Required page is displayed. This page also appears when an existing license has
expired.
To Upload the License File:
1. In the License Required page, click Browse and select the license file which was
provided by your CyberArk support representative.
2. Click Upload to upload the file. When the license file is uploaded successfully, the
PTA dashboard is displayed.
Privileged Threat Analytics
14
Configure and Implement PTA
This section describes how to configure and implement PTA.
In this section:
Configure LDAP
Configure PTA for PAS Integration
Configure PTA for Privileged Session Manager (PSM) Integration
Configure PTA for Endpoint Privilege Manager (EPM) Integration
Review the Golden Ticket and Network Sensors Configuration
Configure Privileged Users
Whitelist: Configure a List of Allowed Machines to Perform DC Replication
Configure PTA for Authorized Hosts
Configure PTA to Support Vault DR
Troubleshoot PTA Configuration
Privileged Threat Analytics
PTA Implementation Guide 15
Configure LDAP
Perform the following procedures to:
■ Enable LDAP authentication
■ Broaden and increase the accuracy of PTA detections
Create an Active Directory Query User for LDAP Users
Use the following guideline to create an Active Directory user with the least privileges
for the LDAP client.
To Create an Active Directory Query User with Least Privileges
1. Create the LDAP user, or select an existing LDAP user.
2. To ensure that the LDAP client user who will run the query has the least privileges,
grant the LDAP user the List Contents permission from the ACL, with no domain
group membership. Also, set the LDAP user password to never expire.
Configure LDAP Connection Details
Use the following procedure to configure LDAP connection details.
To Configure LDAP Client in PTA:
1. In PTA, click the Settings tab.
The Settings page appears.
2. In the left pane, click Administration > AD Connectivity. The Active Directory
connectivity settings area appears.
Privileged Threat Analytics
16 Configure LDAP
3. In the CONNECTION DETAILS area, enter the relevant DC IP address in Global
Catalog server IP.
4. If the LDAP server is configured to use LDAP over SSL, select Yes.
If the LDAP server is not configured to use LDAP over SSL select No.
5. Define the server port number in Global Catalog port.
Note:
The default port if the LDAP server is configured to use LDAP over SSL is 3269. The
default port if the LDAP server is not configured to use LDAP over SSL is 3268.
6. If the LDAP server is configured to use LDAP over SSL, click Browse to navigate to
the dedicated security Base-64 encoded X.509 SSL certificate.
■ In the window that opens, select the certificate file, click Open, and then click OK
to make your selection.
7. In User Principal Name, enter the LDAP user created above, who will be used to
connect and query the Active Directory. Enter the user in a UPN format:
For Example: [email protected]
8. In Password, enter the password of the LDAP user created above, who will be used
to connect and query the Active Directory.
9. Click Save.
Privileged Threat Analytics
PTA Implementation Guide 17
Configure LDAP Authentication to PTA (Optional)
Use the following procedure to configure LDAP Authentication to PTA.
Note:
PTA supports only one domain forest when configuring LDAP authentication.
To Configure LDAP Authentication to PTA:
1. In PTA, click the Settings tab.
The Settings page appears.
2. In the left pane, click Administration > AD Connectivity. The Active Directory
connectivity settings area appears.
3. In the LDAP AUTHENTICATION TO PTA area, enter the sAMAccountName of
the LDAP PTA group in LDAP PTA group.
4. In Group domain, enter the group whose members are allowed to connect to PTA
using their LDAP accounts.
5. Click Save.
Privileged Threat Analytics
18 Configure PTA for PAS Integration
Configure PTA for PAS Integration
This section describes how to configure your system for threat containment, such as
when suspected credential theft or Overpass the Hash occurs.
Perform the following procedure only if:
■ Your site has PAS 9.3 and higher (see CyberArk Vault / PAS Compatibility, page
52)
You can perform this either through the PTA Settings page, or by updating the specific
parameters. Select one of the following procedures.
To Configure PTA to Integrate with PAS using PTA Settings:
1. In PTA, click the Settings tab.
The Settings page appears.
2. In the left pane, click Administration > PAS Connectivity. The PVWA Connection
Details area appears.
3. Enter the PVWA host name, in FQDN format, not the URL.
4. Select whether the connection is over HTTPS. We recommend using an HTTPS
connection.
5. Enter the PVWA port that PTA will use to access the PVWA.
6. Enter the PVWA application name that PTA will use to access the PVWA. The
default name is PasswordVault, but you can specify a different application name
when you install the PVWA.
7. (Optional) To automatically add unmanaged accounts to the PAS pending accounts
queue, select Automatic Adding to Pending Accounts.
Privileged Threat Analytics
PTA Implementation Guide 19
Note:
Only perform this step if you have performed the appropriate steps shown in Configure
the PVWA for PTA Integration with PAS, page 55.
8. (Optional) To automatically rotate passwords for credentials theft in PAS, select
Automatic Rotate Password.
Note:
Only perform this step if you have performed the appropriate steps shown in Configure
the PVWA for PTA Integration with PAS, page 55.
9. Click Save.
Note:
For details on PSM Connectivity, refer to Configure PTA for PSM Integration, page 22.
To Configure PTA to Integrate with PAS using System Parameters:
Edit the local systemparm.properties file using the LOCALPARM command, and
specify the following parameters:
Defined… Parameter Description
…in EnableAutomaticMitigationByEPV Enables you to
systemparm.propertie manage
s file automatic PTA
threat
containment,
and Overpass
the Hash.
It determines
whether PTA
will integrate
with PAS to
react
automatically
to detected
credential
thefts.
…during installation / epv_https_enabled Determines
upgrade whether PTA
will connect to
PAS though
https
epv_host The PVWA
hostname
(FQDN) of the
PVWA. Do
Privileged Threat Analytics
20 Configure PTA for PAS Integration
Defined… Parameter Description
not enter the
URL of the
PVWA.
epv_port The port
through which
PTA will
connect to
PAS.
epv_root_context The PVWA
application
name.
epvIntegrationEnableAddPendingAccoun Determines
t whether PTA
will integrate
with PAS to
automatically
add
unmanaged
privileged
accounts to
the
PVWA pendin
g accounts
queue.
epv_integration_rotate_password Determines
whether PTA
will integrate
with PAS to
automatically
rotate
passwords to
accounts.
…in psm_mitigation_termination_enabled Determines
systemparm.propertie whether PTA
s file will integrate
with PAS to
automatically
terminate a
session for
suspicious
commands.
Save and close the systemparm.properties file using :wq!, and restart the PTA main
service using the service appmgr restart command.
Privileged Threat Analytics
PTA Implementation Guide 21
Configure PTA for Privileged Session Manager
(PSM) Integration
The integration of PTA with Privileged Session Manager (PSM) leverages the analytic
capabilities of PTA and assigns a risk score to privileged sessions. PTA identifies
suspicious commands in privileged sessions and anomalous activities initiated by the
Vault user.
The privileged sessions to which PTA assigned a risk score appear in PTA and are
available for security review. In addition, when PTA assigns a risk score to a privileged
session, PTA updates PSM to make the score available in PVWA, increasing the
efficiency of privileged sessions review by auditing teams.
In PSM, for SSH sessions, the Security Administrator can configure forbidden
commands in regular expression. If a user enters a forbidden command, PSM blocks the
command from running on the target machine, and in the audit next to the command
appears the word "denied", which means that the command has not been run on the
target machine. In PTA, you can set an alert on restricted commands to see which users
try to use restricted commands. For details, refer to Configuring SSH Commands Access
Control in PSMP in the PAS Implementation Guide.
■ PTA and PSM Integration Architecture , page 21
■ Configure PTA for PSM Integration, page 22
■ Configure Suspicious Session Activities in PTA, page 23
PTA and PSM Integration Architecture
Following is the architecture and process flow in an environment with PTA and PSM.
PTA-PSM integration process flow:
7. PTA receives the PSM session related syslogs from the Vault.
Privileged Threat Analytics
22 Configure PTA for Privileged Session Manager (PSM) Integration
8. PTA analyzes the PSM session related syslogs, and displays them as incidents in the
PTA Dashboard.
9. PTA sends the PSM session related data which was analyzed and found to contain
risky commands, to the PVWA.
10. PVWA displays the PTA analyzed session related data with scores in the PVWA
MONITORING tab.
Configure PTA for PSM Integration
1. Click the Settings tab.
The Settings page appears.
2. In the left pane, click Administration > PAS Connectivity. The PVWA Connection
Details area appears.
3. To send a privileged session risk score to PSM to make the score available in PVWA,
select Send PSM session related data.
4. If PSM Connectivity is not configured or PTAUser is not a member of the
PSMPTAAppUsers Vault group, the Vault Admin user credentials section of the
PVWA Connection Details area appears. Enter the Username and Password of the
Vault Administrator.
5. Click Save.
Limitations
■ PTA only analyzes session data from the time of the integration with PSM. Older
sessions are not analyzed, do not trigger security incidents in PTA, and do not
display risk scores in PVWA.
Privileged Threat Analytics
PTA Implementation Guide 23
■ Changing the configuration affects sessions from that point onward, and does not
affect older sessions.
■ PTA does not support session activities performed in environments with multibyte
languages.
Configure Suspicious Session Activities in PTA
To best reflect your organizational policy, we recommended configuring the predefined
set of suspicious session activities.
You can perform this either through the PTA Settings page, or by updating the specific
parameters. Select one of the following procedures.
To Configure Suspicious Session Activities in PTA in the Settings tab:
1. In PTA, click the Settings tab.
The Settings page appears.
2. In the left pane, click Configuration > Privileged Session Analysis. The
Privileged Session Analysis area appears.
The default rules shown represent a set of best practices that CyberArk recommends
for your use. Based on your analysis, you can add new rules or edit the default rules
to align with your security needs.
Note:
If you want to edit the default rules, we recommend creating a new rule and disabling
the default rule. The default rule will still exist if you need it in the future.
The default rules are enabled, and all new rules that you add are also enabled. You
can disable and enable each rule as needed.
3. Click Add.
4. Select a Category from the drop-down list.
The available categories are:
■ Universal keystrokes – For all platforms
■ SCP – Secure copy. For UNIX only
■ SQL – For Databases only
Privileged Threat Analytics
24 Configure PTA for Privileged Session Manager (PSM) Integration
■ SSH – For UNIX only
■ Windows titles – For Windows only
5. Enter a valid Pattern (Regular Expression) for the selected category.
Note:
Regular expressions are case sensitive for all categories except SQL and Windows
titles.
6. Enter a Score between 1 - 100 that reflects the risk level of the suspicious session
activity.
7. (Optional) Enter a Description of the suspicious session activity.
8. Determine the Response, either None, Suspend, or Terminate, to the suspicious
session activity.
9. Click Update.
To Enable and Disable Rules:
1. Double-click the selected rule.
2. Select (to enable the rule) or de-select (to disable the rule) the Enabled box.
3. Click Update.
To Configure Suspicious Session Activities in PTA Manually:
1. Edit the local systemparm.properties file using the LOCALPARM command.
2. Specify the following parameter values:
Parameter Mandatory Default
Parameter Description
Name or Optional Value
Regex Regular expression of the suspicious Mandatory None
session activity
For Example:
kill [*.*]
Note: Regular expressions are case
sensitive.
Score Score between 1 - 100 that reflects the risk Mandatory 0
level of the suspicious session activity.
Description Description / comment of the regular Optional None
expression.
Category Type of suspicious session activity; the Mandatory None
PSM audit type supported.
Enter one of the following categories:
■ SSH
For unix platform only
■ Windows titles
For windows platform only
■ SQL
Privileged Threat Analytics
PTA Implementation Guide 25
Parameter Mandatory Default
Parameter Description
Name or Optional Value
For Databases only
■ Universal keystrokes
For all platforms
■ SCP (Secure copy)
For unix platform only
Response Automatic response configuration for the Optional None
specific suspicious command.
Accepted Values:
NONE - No automatic response for the
command
SUSPEND - Automatic session
suspension for the command
TERMINATE - Automatic session
termination for the command
Active Determines whether the rule is enabled or Mandatory True
disabled.
3. Save and close the systemparm.properties file using :wq!, and restart the PTA main
service using the service appmgr restart command.
Example:
[{\"regex\":\"kill
(.*)\",\"score\":\"80\",\"description\":\"description\",\"catego
ry\":\"SSH\",\"response\":\"NONE\",\"active\":\"true\"},
{\"regex\":\"who\",\"score\":\"70\",\"description\":\"descriptio
n2\",\"category\":\"SSH\",\"response\":\"TERMINATE\",\"active\":
\"true\"}]
Configure PTA for Endpoint Privilege Manager (EPM)
Integration
Endpoint Privilege Manager (EPM) detects and blocks threats to the endpoint. Sending
these events from EPM to PTA enables you to review all privileged account related
incidents and risks in a central location.
To Integrate PTA and EPM:
1. In PTA, click the Settings tab.
The Settings page appears.
2. In the left pane, click Administration > EPM Connectivity. The EPM Connection
Details area appears.
Privileged Threat Analytics
26 Configure PTA for Endpoint Privilege Manager (EPM) Integration
3. Click Yes to enable EPM.
4. Click Save.
A message appears that EPM has been successfully enabled. The message also
contains the username and password that will be used in EPM to access PTA. For
details, refer to Integrate PTA with EPM, page 57
Privileged Threat Analytics
PTA Implementation Guide 27
Review the Golden Ticket and Network Sensors
Configuration
You are able to view the current Golden Ticket and Network Sensors configuration via
the Dashboard. To access this information, follow these directions:
1. In the Dashboard, click the Settings tab.
2. In the left pane, click Configuration > Golden Ticket Detection.
The selected configuration, as it was installed at your site, is displayed.
Configure Privileged Users
Create a list of privileged groups and users who must be managed in the CyberArk
Privileged Account Security solution.
Before You Begin:
To create privileged groups, you must activate Active Directory, as shown in Configure
LDAP, page 15
You can perform this either through the PTA Settings page, or by updating the specific
parameters. Select one of the following procedures.
To Create privileged groups and users:
1. In PTA, click the Settings tab.
The Settings page appears.
2. In the left pane, click Configuration > Privileged Groups and Users. The
Privileged Groups area appears.
Privileged Threat Analytics
28 Configure Privileged Users
3. In the PRIVILEGED GROUPS LIST area, click Add to add Active Directory groups
to the list of privileged groups.
Note:
The configured groups are in addition to the PTA predefined privileged groups.
4. In the PRIVILEGED USERS LIST area, click Add to add users and patterns to the
list of privileged users.
Note:
There is a list of default users and patterns:
Unix - root
Windows - .*admin.*
Oracle - sys, sysman, system
Regular expressions, such as (.*)_A, are supported.
5. Click Save.
Privileged Threat Analytics
PTA Implementation Guide 29
To Manually Create privileged groups and users:
Edit the local systemparm.properties file using the LOCALPARM command, and
specify the following parameters:
Parameter Description
privileged_ A list of groups considered privileged in the organization, and whose
groups_list members should be managed by CyberArk’s Privileged Account Security
solution.
privileged_ A list of users considered privileged in the organization, and who should be
users_list managed by CyberArk’s Privileged Account Security solution.
The default values are:
■ Unix - root
■ Windows - .*admin.*
■ Oracle - sys, sysman, system
Save and close the systemparm.properties file using :wq!, and restart the PTA main
service using the service appmgr restart command.
Whitelist: Configure a List of Allowed Machines to
Perform DC Replication
To keep directory data on all domain controllers consistent and up to date, Active
Directory replicates directory changes on a regular basis. DC Replication (DC Sync) is
a known attack technique for stealing credentials from a DC by mimicking a legitimate
replication request.
PTA has a DC replication whitelist which, by default, identifies domain controllers
which are allowed to perform DC replication. PTA automatically uses this whitelist to
identify legitimate DC replicators in the network.
After PTA is installed and running for some time, and after reviewing the Dashboard, you
may decide that a machine needs to be added to the DC replication whitelist.
For example, you may have systems that are not domain controllers, but which are used
for authentication in your environment. You should secure these systems with the same
level of security as your most secured assets, such as domain controllers and they should
be added to the DC replication whitelist. See Use and Understand the Dashboard, page
87.
Use the following procedure to add machines to the DC replication whitelist.
To Add Machines to the DC Replication Whitelist:
1. Edit the local systemparm.properties file using the LOCALPARM command.
2. Search for the following property:
dc_replication_whitelist
See the system property Sub-section: DC Replication, page 143.
Privileged Threat Analytics
30 Whitelist: Configure a List of Allowed Machines to Perform DC Replication
3. Add machines to the whitelist using the following format, where multiple names are
separated by commas.
dc_replication_whitelist=<IP1>,<IP2>,<FQDN1>,<FQDN2>…
4. Save and close the systemparm.properties file using :wq!, and restart the PTA main
service using the service appmgr restart command.
5. After a few weeks, review the results and edit again as necessary.
Privileged Threat Analytics
PTA Implementation Guide 31
Configure PTA for Authorized Hosts
Run the following procedure to configure authorized hosts only if:
■ Your site has SIEM/Vault, or any other authorized host that forwards messages to
PTA
■ You are upgrading your site from PTA versions 2.6.3 and below
Note:
When PTA is configured with a Vault that is deployed in a Cluster environment, configure the
Virtual IP in the Vault Connection Configuration step.
When PTA is configured with a Vault that is deployed in a distributed environment, configure the
IP for the primary Vault in the Vault Connection Configuration step.
To Configure PTA for Authorized Hosts after Upgrading:
1. Navigate to the utility directory using the UTILITYDIR command.
2. Run the file: authorizedSourceHostsConfiguration.sh
3. Search for the text Authorized machines, then add the relevant authorized source.
Authorized machines: all
Enter one of the following options:
■ IPs separated by commas
■ None
■ All
[root@PTAServer ~]# cd /opt/tomcat/utility/
[root@PTAServer utility]#
./authorizedSourceHostsConfiguration.sh
[Step 1/1 - Authorized source hosts configuration]
Specify the source host IPs that are authorized to forward
messages to PTA, separated by a comma (for example:
11.22.33.44,11.22.33.55).
To allow all hosts types to forward messages to PTA, specify
'All'.
To prevent any host type from forwarding messages to PTA,
specify 'None'.
PTA should only be permitted to receive messages from authorized
sources such as the CyberArk Vault, organizational SIEM solution
and any other server that sends messages directly to PTA.
If the Vault connection was configured, the Vault is
automatically considered to be an authorized source host (no
need to specify it in this step).
Authorized machines: all
Authorized source hosts configuration finished successfully.
Updating iptables rules...
Privileged Threat Analytics
32 Configure PTA for Authorized Hosts
Updating iptables finished successfully
-----
Verify the configuration
Log on to the PTA machine as a root user and run the PTA diagnostic tool using the
RUN_DIAGNOSTICS command to verify that PTA works properly with the new
configuration.
Privileged Threat Analytics
PTA Implementation Guide 33
Configure PTA to Support Vault DR
Perform the following procedure only if your site has Vault Disaster Recovery.
Note:
For sites where the original installation of PTA was from version 3.0 and above, this
procedure is not needed. Vault Disaster Recovery configuration is part of the
installation procedure.
To Configure PTA to Support Vault DR after Upgrade:
1. Open the file /opt/tomcat/diamond-resources/Vault.ini
2. Edit the ADDRESS by adding the Vault DR IP address:
ADDRESS=<vault_ip>,<vault_DR_ip>
3. Restart the appmgr service, to restart PTA.
4. To configure the Vault DR to send syslogs to PTA, for each Vault DR perform the
procedure Configure the Vault to Forward syslog Messages to PTA, page 53.
Verify the configuration
Log on to the PTA machine as a root user and run the PTA diagnostic tool using the
RUN_DIAGNOSTICS command to verify that PTA works properly with the new
configuration.
Privileged Threat Analytics
34 Troubleshoot PTA Configuration
Troubleshoot PTA Configuration
Verify the configuration
Log on to the PTA machine as a root user and run the PTA diagnostic tool using the
RUN_DIAGNOSTICS command to verify that PTA works properly with the new
configuration.
In this section:
Use the PTA Utility for Troubleshooting , page 35
Use the diamond.log for Troubleshooting, page 35
Domain Controllers – View the List and Manage the Cache, page 46
Test the PTA Network Sensor Connection to the PTA Server, page 47
Reset PTA Network Sensor Connection with the PTA Server, page 47
Modify or Troubleshoot PTA Network Sensor Configurations, page 48
Troubleshoot PAS Integration, page 48
PTAAppUser is Suspended - Reactivate CasosService, page 49
Privileged Threat Analytics
PTA Implementation Guide 35
Use the PTA Utility for Troubleshooting
The PTA utility enables you to perform various troubleshooting tasks, and control
processes.
Run the PTA utility, using the following command:
/opt/tomcat/utility/run.sh
Reset PTA Data
To reset the data used to generate Incident charts:
■ To clear only the analysis results, select 10 - Clear analysis data.
■ To clear all the data from the database, select 11 - Clear database.
Restart PTA Processes
To restart PTA processes:
■ To stop all the processes, select 3 - Stop application processes.
■ To start all the processes, select 4 - Start application processes.
To restart the Tomcat Web Server:
■ To stop the Tomcat Web Server, select 5 - Stop Tomcat Web Server.
■ To start the Tomcat Web Server, select 6 - Start Tomcat Web Server.
Use the diamond.log for Troubleshooting
■ View Automatic Containment Responses, page 35
■ View Statistics in the diamond.log, page 36
■ Shortcuts for Common Commands, page 41
■ Aliases, page 45
View Automatic Containment Responses
When PTA is integrated with PAS to automatically contain the threat of Overpass the
Hash attack or suspected credential thefts events, the following messages in the
diamond.log file indicate that PTA has successfully sent a password change request to
PAS:
■ At info level:
Reset pass logic ended with result ‘true’
■ At debug level:
The account (user: OUserForReset, ip: 10.1.8.20, host:
10.1.8.20, fqdn: 10.1.8.20) is managed by PAS
Event score calculated - score is '50.00'.
Event is security event. Begin reset pass logic...
Attempt to reset password by ip/host/fqdn <value> succeeded.
Privileged Threat Analytics
36 Troubleshoot PTA Configuration
View Statistics in the diamond.log
Note:
The numbers that appear in the diamond.log are reset each time the system reboots.
1. Run the following command:
SHOW_METRICS
2. Click Y to approve the terms of service.
+-- [2018-01-02 10:13:34.318 IST] ------------------------------
-----------------------+------------+
| Listener Types | Amount |
+---------------------------------------------------------------
-----------------------+------------+
| auditType_CPM_CHANGE_PASS | 3 |
| auditType_DRSUAPI_DS_GET_NC_CHANGES | 28456 |
| auditType_PAM_UNIX_SESSION_OPENED | 4 |
| auditType_PSM_CONNECT | 4 |
| auditType_PSM_DISCONNECT | 3 |
| auditType_PSM_SSH_COMMAND | 7 |
| auditType_PSM_WIN_TITLE | 35 |
| auditType_VAULT_LOGON | 82 |
| auditType_VAULT_RET_PASS | 27 |
| auditType_VAULT_STORE_PASSWORD | 5 |
| auditType_WINDOWS_KERBEROS_AS | 3608 |
| auditType_WINDOWS_KERBEROS_TGS | 14628 |
| auditType_WINDOWS_LOGON | 750 |
| auditType_WINDOWS_RESET_PASSWORD | 9 |
| filtered_audits | 56 |
| human_vault_user_task_success | 5 |
| match_bulk_ArcSightBulk | 1297 |
| match_bulk_LogRhythmBulk | 147199 |
| match_bulk_QradarBulk | 55689 |
| match_but_not_created_plugin_
com.cyberark.diamond.plugins.impl.inbound.ALEWindowsCre | 1 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.ALEWindowsCreator |
148129 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.CorreLogWindowsCreator
| 339202 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.CPMChangePasswordAudit
Creator | 3 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.DSGetNCChangesAuditCre
ator | 28456 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.KerberosWindowsCreator
| 18236 |
| match_plugin_
Privileged Threat Analytics
PTA Implementation Guide 37
com.cyberark.diamond.plugins.impl.inbound.PSMCommandAuditCreator
| 49 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.UnixPamLogonAuditCreat
or | 4 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.VaultLogonAuditCreator
| 82 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.VaultRetrievePasswordA
uditCre | 27 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.VaultStorePasswordAudi
tCreato | 5 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.WefChangeOrResetPasswo
rdCreat | 10 |
| match_plugin_
com.cyberark.diamond.plugins.impl.inbound.WefCreator | 147188 |
| mesages_with_no_matching_plugin | 1035535 |
| resolve_not_in_cache | 12946 |
| resolve_request | 109713 |
| resolve_returned_from_failed_cache | 17465 |
| resolve_returned_from_success_cache | 79302 |
| risk_processing_sent_to_sampler | 221 |
| sensorType_NETWORK_SENSOR | 46692 |
| sensorType_PAM_UNIX | 4 |
| sensorType_SIEM | 759 |
| sensorType_VAULT | 166 |
| syslog_filtered_reason_non_human | 56 |
+---------------------------------------------------------------
-----------------------+------------+
+-- [2018-01-02 10:13:43.348 IST] ------------------------------
-----------------------+------------+
| Sampler Types | Amount |
+---------------------------------------------------------------
-----------------------+------------+
| anomaly_type_PSMRiskyCommand | 5 |
| anomaly_type_SuspectedCredentialsTheft | 2 |
| anomaly_type_SuspectedPasswordChange | 1 |
| anomaly_type_UnmanagedPrivilegedAccess | 8 |
| decrypt_uds_handler_success | 1056 |
| DomainAccountAttributesRetrieving_failure | 11 |
| DomainAccountAttributesRetrieving_success | 7 |
| NetRep_FromDomain_AL_LAB.AMPM.COM_failure_no_NetRepParameters
| 5 |
| NetRep_FromDomain_AMPMDEFAULT.AMPM.COM_failure_no_
NetRepParameters | 5 |
| NetRep_FromDomain_ARIEPM63.AMPM.COM_failure_no_
NetRepParameters | 4 |
| NetRep_FromDomain_ARIEPM64.AMPM.COM_failure_no_
NetRepParameters | 4 |
| NetRep_FromDomain_ARIEPMSAAS.ENV_failure_no_NetRepParameters |
Privileged Threat Analytics
38 Troubleshoot PTA Configuration
4 |
| NetRep_FromDomain_DCDISTVAULTS.AMPM.COM_failure_no_
NetRepParameters | 1 |
| NetRep_FromDomain_ENIGMA.COM_failure_no_NetRepParameters | 5 |
| NetRep_FromDomain_EXTDOMAIN.COM_failure_no_NetRepParameters |
5 |
| NetRep_FromDomain_HRDC.AMPM.COM_failure_no_NetRepParameters |
1 |
| NetRep_FromDomain_HR_DOM.AMPM.COM_failure_no_NetRepParameters
| 1 |
| NetRep_FromDomain_IL.ENIGMA.COM_failure_no_NetRepParameters |
5 |
| NetRep_FromDomain_IL.PTA.COM_success_ | 5 |
| NetRep_FromDomain_LAB.SUPPORT.COM_failure_no_NetRepParameters
| 5 |
| NetRep_FromDomain_LYDC.AMPM.COM_failure_no_NetRepParameters |
2 |
| NetRep_FromDomain_NINIO.COM_failure_no_NetRepParameters | 2 |
| NetRep_FromDomain_PRINCESSES.COM_success_ | 3 |
| NetRep_FromDomain_PTA.COM_success_ | 5 |
| NetRep_FromDomain_RANDY.LOCAL_failure_no_NetRepParameters | 2
|
| NetRep_FromDomain_SPECFLOWDOMAIN.AMPM.COM_failure_no_
NetRepParameters | 1 |
| NetRep_FromDomain_US.PTA.COM_success_ | 5 |
| NetRep_FromDomain_WIN2KDC1.AMPM.COM_failure_no_
NetRepParameters | 3 |
| psm_score_update_success | 3 |
| resolve_not_in_cache | 45 |
| resolve_request | 748 |
| resolve_returned_from_failed_cache | 101 |
| resolve_returned_from_success_cache | 602 |
| risk_event_handler_aggregation_counter | 386 |
| risk_event_handler_create_risk_counter | 5 |
| risk_event_handler_in | 401 |
| risk_event_handler_in_typed_cleartext_protocol | 374 |
| risk_event_handler_in_typed_interactive_service_account | 2 |
| risk_event_handler_in_typed_risky_spn | 10 |
| risk_event_handler_in_typed_unconstrained_delegation | 5 |
| risk_manager_out_event | 2 |
| risk_queue_consumer_in_count | 800 |
| risk_raw_handler_in_json | 399 |
| risk_raw_handler_out_event | 389 |
| suspend_session_PSM_RISKY_COMMAND_success | 1 |
| terminate_session_PSM_RISKY_COMMAND_success | 1 |
| tkt_data_failure | 2726 |
| tkt_data_success | 166 |
| unmanage_onboard_failure | 4 |
+---------------------------------------------------------------
-----------------------+------------+
+-- [2018-01-02 10:13:32.550 IST] ------------------------------
-----------------------+------------+
| Background Scheduler Types | Amount |
Privileged Threat Analytics
PTA Implementation Guide 39
+---------------------------------------------------------------
-----------------------+------------+
| ActiveDormantUserAnomaly_success | 5 |
| AggregativeIce_success | 5 |
| CasosServicesReActivateTask_success | 5 |
| ChangePTAVaultPasswordTask_success | 5 |
| DCAServerReActivateTask_success | 5 |
| DomainAccountsAttributesQueryTask_success | 6 |
| ExcessiveAccess_success | 5 |
| GenerateJwtAuthSecretTask_success | 5 |
| GetVaultVersionTask_success | 6 |
| IrregularDayUser_success | 5 |
| IrregularHoursAsset_success | 5 |
| IrregularHoursUser_success | 5 |
| NormalActivityCountingTask_success | 6 |
| PrivilegedAccountQueryTask_success | 5 |
| RemoveInactiveProcessedAssetsTask_success | 5 |
| RiskySPNAccountsAttributesQueryTask_success | 5 |
| UnconstrainedDelegationAccountsAttributesQueryTask_success | 5
|
| VaultAccountsReloadTask_success | 5 |
| VaultViaIrregularIp_success | 5 |
+---------------------------------------------------------------
-----------------------+------------+
+-- [2018-01-02 10:13:59.066 IST] ------------------------------
-----------------------+------------+
| Services Types | Amount |
+---------------------------------------------------------------
-----------------------+------------+
| PTA_SERVICE_EPV.checkAccountIsManagedByCPM.fail | 0 |
| PTA_SERVICE_
EPV.checkAccountIsManagedByCPM.requestAccount.SuspectedPasswordC
hange.su | 1 |
| PTA_SERVICE_
EPV.checkAccountIsManagedByCPM.requestPlatform.SuspectedPassword
Change.s | 1 |
| PTA_SERVICE_EPV.checkAccountIsManagedByCPM.success | 1 |
| PTA_SERVICE_EPV.requestAddPendingAccount.fail | 4 |
| PTA_SERVICE_
EPV.requestAddPendingAccount.requestAddPendingAccount.error.Unma
nagedPri | 4 |
| PTA_SERVICE_EPV.requestAddPendingAccount.success | 0 |
| PTA_SERVICE_EPV.requestChangePasswordAsync.fail | 2 |
| PTA_SERVICE_
EPV.requestChangePasswordAsync.requestChangePassword.error.Suspe
ctedCred | 2 |
| PTA_SERVICE_EPV.requestChangePasswordAsync.success | 0 |
| PTA_SERVICE_EPV.requestPsmResumeSession.fail | 0 |
| PTA_SERVICE_EPV.requestPsmResumeSession.mitigationAction.PSM_
RISKY_COMMAND.success | 1 |
| PTA_SERVICE_EPV.requestPsmResumeSession.success | 1 |
| PTA_SERVICE_EPV.requestPsmSuspendSession.fail | 0 |
| PTA_SERVICE_EPV.requestPsmSuspendSession.mitigationAction.PSM_
Privileged Threat Analytics
40 Troubleshoot PTA Configuration
RISKY_COMMAND.success | 1 |
| PTA_SERVICE_EPV.requestPsmSuspendSession.success | 1 |
| PTA_SERVICE_EPV.requestPsmTerminateSession.fail | 0 |
| PTA_SERVICE_
EPV.requestPsmTerminateSession.mitigationAction.PSM_RISKY_
COMMAND.succes | 1 |
| PTA_SERVICE_EPV.requestPsmTerminateSession.success | 1 |
| PTA_SERVICE_EPV.submitCommandScores.fail | 0 |
| PTA_SERVICE_
EPV.submitCommandScores.submitCommandScores.PSMRiskyCommand.succ
ess | 3 |
| PTA_SERVICE_EPV.submitCommandScores.success | 3 |
| PTA_SERVICE_VAULT.writeAuditLog.fail | 0 |
| PTA_SERVICE_VAULT.writeAuditLog.success | 8 |
+---------------------------------------------------------------
-----------------------+------------+
+-- [2018-01-02 10:13:58.379 IST] ------------------------------
-----------------------+------------+
| DCA Server Types | Amount |
+---------------------------------------------------------------
-----------------------+------------+
| control_agent_Server_to_Agent_ACK_success | 581533 |
| data_clear_text_create_success | 153 |
| data_dcerpc_event_create_success | 6122 |
| data_formatter_clear_text_events_match_cleartextformatter_
success | 153 |
| data_formatter_dcerpc_event_events_match_dcerpcformatter_
success | 6122 |
| data_formatter_kerberos_events_match_kerberosformatter_success
| 10317 |
| data_formatter_windows_events_events_match_rawdataformatter_
success | 147208 |
| data_incoming_event_CLEAR_TEXT_success | 153 |
| data_incoming_event_DCERPC_EVENT_success | 6122 |
| data_incoming_event_KERBEROS_success | 10317 |
| data_incoming_event_WINDOWS_EVENTS_success | 147208 |
| data_in_sensor_create_success | 163647 |
| data_kerberos_as-req-rep_create_success | 6629 |
| data_kerberos_tgs-req-rep_create_success | 3688 |
| data_raw_risks_create_success | 153 |
| data_windows_events_create_success | 147208 |
+---------------------------------------------------------------
-----------------------+------------+
Log file can be found at '/opt/tomcat/logs/PTA_Tool_Log_
20180102101359.log'.
■ Search for auditType_<audit type>. This the number of audits created per
type.
In the Example above: {"auditType_WINDOWS_KERBEROS_TGS":14628}
Privileged Threat Analytics
PTA Implementation Guide 41
■ Search for sensorType_<Sensor type>":. This the number of audits created
per sensor.
In the Example above: {"sensorType_NETWORK_SENSOR":46692}
■ Search for mesages_with_no_matching_plugin. The number that appears is
the number of messages that PTA failed to parse as they did not match any of
the PTA plugins per message type.
■ Search for syslog_filtered_reason_<filter name>. This is the number of
audits which were filtered by <filter name>.
For Example: syslog_filtered_reason_non_human:56}
■ Search for filtered_audits. This is the total number of audits that were filtered
by all the PTA filters.
■ Search for anomaly_type_<attack name>. This is the number of audits
identified by PTA as security events of type <attack name>.
Shortcuts for Common Commands
The shortcuts.sh utility allows easy use of PTA common commands. The format is:
shortcuts.sh [<type>]
Following are the types for this utility:
Type Command Description
1 tail -f /opt/tomcat/logs/diamond.log | grep Output all errors in the last part
"ERROR" of the main PTA log file, follow
the file and output any errors as
the file grows
2 cat /opt/tomcat/logs/diamond.log | grep Output all errors in the main
"ERROR" | less PTA log file
3 tail -f /opt/tomcat/logs/diamond.log | grep Output all listener metrics in the
"metrics-PTA-listener" last part of the main PTA log
file, follow the file and output
any listener metrics as the file
grows
Use this:
■ To verify incoming traffic
from the sensors (such as
Vault, Network Sensor,
SIEM)
■ To verify the creation of
audits per operation (such
as Vault retrieve password,
Vault logon, Windows
logon, Unix logon, Kerberos
traffic)
■ To verify that the syslogs
from the various SIEMs
(such as ArcSight, QRadar,
Privileged Threat Analytics
42 Troubleshoot PTA Configuration
Type Command Description
Splunk, and so on) are
successfully accepted in
PTA
4 cat /opt/tomcat/logs/diamond.log | grep Output all listener metrics in the
"metrics-PTA-listener" | less main PTA log file
Use this:
■ To verify incoming traffic
from the sensors (such as
Vault, Network Sensor,
SIEM)
■ To verify the creation of
audits per operation (such
as Vault retrieve password,
Vault logon, Windows
logon, Unix logon, Kerberos
traffic)
■ To verify that the syslogs
from the various SIEMs
(such as ArcSight, QRadar,
Splunk, and so on) are
successfully accepted in
PTA
5 tail -f /opt/tomcat/logs/diamond.log | grep Output all sampler metrics in the
"metrics-PTA-sampler" last part of the main PTA log
file, follow the file and output
any sampler metrics as the file
grows
Use this:
■ To verify incident creation
and that the outbound mail
or syslogs were sent
■ To verify mitigation results,
such as rotate password
upon suspected credential
theft
6 cat /opt/tomcat/logs/diamond.log | grep Output all sampler metrics in the
"metrics-PTA-sampler" | less main PTA log file
Use this:
■ To verify incident creation
and that the outbound mail
or syslogs were sent
■ To verify mitigation results,
such as rotate password
upon suspected credential
theft
Privileged Threat Analytics
PTA Implementation Guide 43
Type Command Description
7 tail -f /opt/tomcat/logs/diamond.log | grep Output all scheduled task
"metrics-PTA-Background" metrics in the last part of the
main PTA log file, follow the file
and output any scheduled task
metrics as the file grows
Use this to verify the results of
scheduled tasks, such as
Active Directory, Vault
accounts and users, and so on
8 cat /opt/tomcat/logs/diamond.log | grep Output all scheduled task
"metrics-PTA-Background" | less metrics in the main PTA log file
Use this to verify the results of
scheduled tasks, such as
Active Directory, Vault
accounts and users, and so on
9 tail -f /opt/tomcat/logs/diamond.log | grep Output all PTA internal services
"metrics-PTA-services" metrics in the last part of the
main PTA log file, follow the file
and output any PTA internal
services metrics as the file
grows
10 cat /opt/tomcat/logs/diamond.log | grep Output all PTA internal services
"metrics-PTA-services" | less metrics in the main PTA log file
11 tail -f /opt/tomcat/logs/diamond.log | grep Output all metrics in the last part
"metrics-PTA" of the main PTA log file, follow
the file and output any metrics
as the file grows
12 cat /opt/tomcat/logs/diamond.log | grep Output all metrics in the main
"metrics-PTA" | less PTA log file
13 tail -f /opt/tomcat/logs/diamond.log | grep Output all incoming syslogs in
"Incoming syslog" the last part of the main PTA log
file, follow the file and output
any incoming syslogs as the file
grows
This command requires the
Listener component to be on the
Debug log level
Use this:
■ To verify the incoming
syslog is from Vault, SIEM,
or Network Sensor
■ To see the syslog String
received by PTA from the
different inbound sources
Privileged Threat Analytics
44 Troubleshoot PTA Configuration
Type Command Description
14 cat /opt/tomcat/logs/diamond.log | grep Output all incoming syslogs in
"Incoming syslog" | less the main PTA log file
This command requires the
Listener component to be on the
Debug log level
Use this:
■ To verify the incoming
syslog is from Vault, SIEM,
or Network Sensor
■ To see the syslog String
received by PTA from the
different inbound sources
15 tail -f /opt/tomcat/logs/diamond.log | grep Output all containment calls
"CyberArkAuthenticationService.svc/logon" used in password rotation,
| less pending accounts, and PSM
risky commands in the last part
of the main PTA log file, follow
the file and output any
containment calls as the file
grows
Use this to troubleshoot issues
with mitigation of various
containment capabilities such
as Rotate Password, Pending
unmanaged accounts, and
update Risky commands
scores in the PVWA
16 cat /opt/tomcat/logs/diamond.log | grep Output all containment calls
"CyberArkAuthenticationService.svc/logon" used in password rotation,
| less pending accounts, and PSM
risky commands in the the main
PTA log file
Use this to troubleshoot issues
with mitigation of various
containment capabilities such
as Rotate Password, Pending
unmanaged accounts, and
update Risky commands
scores in the PVWA
17 tail -f /opt/tomcat/logs/diamond.log | grep Output all dcaserver metrics in
"metrics-PTA-dcaserver" the last part of the main PTA log
file, follow the file and output
any dcaserver metrics as the
file grows.
Use this:
■ To troubleshoot
Privileged Threat Analytics
PTA Implementation Guide 45
Type Command Description
configuration issues with
the PTA Windows Agent
■ To troubleshoot connection
issues between the
PTA Windows Agent and
the PTA Server
18 cat /opt/tomcat/logs/diamond.log | grep Output all dcaserver metrics in
"metrics-PTA-dcaserver" | less the main PTA log file
Use this:
■ To troubleshoot
configuration issues with
the PTA Windows Agent
■ To troubleshoot connection
issues between the
PTA Windows Agent and
the PTA Server
Aliases
Aliases are predefined commands that allow easier troubleshooting of the PTA server.
The aliases are only available for the root user, and must be written in capital letters.
Alias Command
LOGSDIR cd /opt/tomcat/logs
TAILDIAMOND tail -f /opt/tomcat/logs/diamond.log
LESSDIAMOND less /opt/tomcat/logs/diamond.log
DEFAULTPARM less /opt/tomcat/diamond-
resources/default/systemparm.properties
LOCALPARM vi /opt/tomcat/diamond-
resources/local/systemparm.properties
VAULTSERVICESDIR cd /opt/tomcat/VaultServices/
VAULTSERVICESLOG less /opt/tomcat/VaultServices/Casos.Debug.log
CASOSSERVICESDIR cd /opt/tomcat/CasosServices
CASOSSERVICESLOG less /opt/tomcat/CasosServices/Casos.Debug.log
NETWORK_SENSOR_ cat /opt/ag/conf/pta_devices.conf
DEVICES
VERSION_NUMBER cat /opt/tomcat/diamond-resources/version.properties
UPGRADE_HISTORY cat /opt/tomcat/logs/upgrade_history.log
RUN_DIAGNOSTICS /opt/pta/diag-tool/pta_tool.sh
Privileged Threat Analytics
46 Troubleshoot PTA Configuration
Alias Command
AGENTSHELL /opt/agentshell/run.sh
EXPORT_UTILITY /opt/tomcat/utility/exportTool.sh
MONIT_STATUS sudo -u monit /opt/monit/bin/monit status
STATISTICS less /opt/tomcat/statistics/logs/statistics.log
SHOW_METRICS /opt/pta/diag-tool/pta_tool.sh P037
UTILITYDIR cd /opt/tomcat/utility
PREPWIZDIR cd /opt/tomcat/prepwiz
Domain Controllers – View the List and Manage the Cache
PTA uses domain controllers data for real time analysis. Using this tool, you are able to:
■ View the list of domains and list of Domain Controllers per each domain.
■ Clear the domain collection cache in the Database. You do this so that PTA is able
to relearn which Domain Controllers there are in each domain.
To View the Domain Controller List and to Manage the Cache:
1. Navigate to the utility directory using the UTILITYDIR command, and run
domainsUtil.sh.
The following menu appears:
1- Get list of domains and list of DC's per each domain
2- Clear domains collection cache in the Database:
2. Specify 1 to view the list of machines which PTA identifies as Domain Controllers,
for each domain.
For Example:
1- Get list of domains and list of DC's per each domain
2- Clear domains collection cache in the Database: 1
1. <Domain> includes 2 dc's: {10.1.1.1,aa-d1-dc1, aa-d1-
dc1.<Domain>}; {10.1.1.11, aa-d1-dc2, aa-d1-dc2.<Domain>}
[root@PTAServer utility]# ./domainsUtil.sh
3. Specify 2 to clear the domain collection cache in the Database.
For Example:
1- Get list of domains and list of DC's per each domain
2- Clear domains collection cache in the Database: 2
Collection 'domains' has been deleted successfully
[root@PTAServer utility]#
Privileged Threat Analytics
PTA Implementation Guide 47
Test the PTA Network Sensor Connection to the PTA
Server
Use this procedure to test the connection between the PTA Network Sensor and the
PTA Server.
To Test the Connection Between PTA and the Network Sensors:
1. Log on to PTA using the root user.
2. Change the user to agbroker by using the following command: su agbroker
3. At the command line, in the /opt/ag/bin/ folder, run the following command:
deviceMgmt.sh diag
4. You should see succeeded with the Network Sensor version number.
SSH access to device 'Probe1'(1) at '10.0.10.10'... Succeeded.
Version 5.1 Build 10
SSH access to device 'Probe2'(2) at '10.0.11.11'... Succeeded.
Version 5.1 Build 10
SSH access to device 'Probe3'(3) at '10.0.12.12'... Succeeded.
Version 5.1 Build 10
5. To reset the connection, you must reset the password of the PTA Network Sensor
broker user. For details, see Reset PTA Network Sensor Connection with the PTA
Server, page 47.
Reset PTA Network Sensor Connection with the PTA
Server
Use this procedure when there is no connection between the PTA Network Sensor and
the PTA Server. The message that the connection is refused might appear.
To reset the connection, you must reset the broker password. Use the below procedure
to achieve this.
To Reset the PTA Network Sensor Connection with the PTA Server:
1. Log on to the PTA Network Sensor machine using the admin username and
password:
■ Username: admin
■ Password: The admin password you created.
Note:
The PTA Network Sensor machine is hardened for security reasons. As such, you can
only log on to it using the admin user.
2. Change the user to root by using the following command: su –
Enter the same password: The root password you created.
3. At the command line, in the /opt/ag/bin/ folder, run the following command:
ns_setup.sh
Privileged Threat Analytics
48 Troubleshoot PTA Configuration
4. Reset the password of the PTA Network Sensor broker user.
5. Add Sensors to your system. To do this, continue with the Add PTA Network Sensor
Coverage or a PTA Windows Agent connection section in the PTA Installation Guide.
Modify or Troubleshoot PTA Network Sensor
Configurations
Use the following procedure to modify or troubleshoot the PTA Network Sensor
configuration parameters.
To Modify or Troubleshoot PTA Network Sensor Configurations:
1. At the command line, in the /opt/ag/bin/ folder, run the following command:
ns_setup.sh
2. You are then able to modify the following PTA Network Sensor configurations:
PTA Network Sensor
You can…
configuration
Network settings Modify Management card network settings.
(IP, subnet, gateway)
User credentials Change admin, root, and broker users.
Note:
Reset the broker user password if you
need to add a Network Sensor to a PTA
machine. See Reset PTA Network Sensor
Connection with the PTA Server, page 47.
Hostname Modify the hostname of the PTA Network Sensor
machine.
NTP Modify NTP of the PTA Network Sensor.
Date, Time and Timezone Set the Date, Time and Timezone of the Network
Sensor.
3. In addition, you are able to restore PTA Network Sensor to the default settings.
Troubleshoot PAS Integration
Log
Problem Suggested Resolution
Message
Error 500 Failed to log on to PAS There might be multiple binds for the same
port in the IIS configuration. Fix the IIS
configuration to have only one bind per port.
Error 404 Failed to log on to PAS The endpoint bindingConfiguration was
httpBinding. It must be returned to
httpsBinding.
Privileged Threat Analytics
PTA Implementation Guide 49
Log
Problem Suggested Resolution
Message
Error 405 Failed to change Need to disable WebDAVModule and
credentials WebDAV handler
http://stackoverflow.com/a/14465655
You can remove them from the IIS features
using the Server Manager > Add or Server
Manager > Remove features
PTAUser Failed to change Need to add permissions.
had no credentials See Integrate PTA with PAS, page 52.
permissions
to invoke
CPM
Access When clicking Full In the PVWA, go to Administration >
denied session details in Options > Access restrictions and
Suspicious activities configure PTA as an allowed referrer in the
in a privileged PVWA for both the IP address and the
session, an access FQDN/host. The format of the PTA machine
denied message is should be: https://<IP> or
shown by the PVWA. https://<FQDN/HOST>.
PTAAppUser is Suspended - Reactivate CasosService
When Golden Ticket detection is configured, CasosServices must be up and running.
When the PTAAppUser is suspended, this means that CasosServices are not running,
and therefore not monitored.
This could be caused by exceeding the number of violations allowed for the PTAAppUser
in the Vault (default is 5).
Note:
By default, CasosServices are configured to request a restart five times.
If Golden Ticket detection is configured, perform the following procedure to reactivate
CasosServices so it can start monitoring again, for PTA to continue decrypting tickets.
To review the CasosServices logs:
■ Path to the log configuration file location:
/opt/tomcat/CasosServices/logconf.log4cxx
■ Path to the log location:
/opt/tomcat/CasosServices/logs/casosservices.log
To Reactivate CasosServices:
1. Using the PrivateArk client, reactivate the suspended PTAAppUser.
2. Run one of the following commands:
■ Using the SEutility, enter task_executer then select the following:
Privileged Threat Analytics
50 Troubleshoot PTA Configuration
CasosServicesReActivateTask
■ Or, using command prompt:
sudo –u monit /opt/monit/bin/monit monitor ptacasosservicesd
Privileged Threat Analytics
51
Integrate PTA
To enable PTA to work correctly, the PTA machine must have access to data such as the
real-time activities of the Vault and the UNIX machines in your organization. The
following tasks describe how to configure PTA, CyberArk components, SIEM vendors
and the inspected UNIX machines to send their logging data to the PTA machine.
In this section:
Integrate PTA with PAS
Forward Log Data to PTA
Send PTA Data
Privileged Threat Analytics
PTA Implementation Guide 52
Integrate PTA with PAS
PTA can integrate with PAS to provide actionability in the form of automatic reactive
containment to detected credential thefts, unmanaged privileged accounts, and
Overpass the Hash. This enables you to benefit from a comprehensive CyberArk solution
which not only detects, but also contains the risk, and which protects your organizational
environment at the highest standard.
PTA can be configured to automatically initiate password rotation when it detects a
suspected credential threat and Overpass the Hash, without any user intervention. In
addition, PTA can be configured to automatically add detected unmanaged privileged
accounts to the pending accounts queue in PAS. These features can only be installed in
environments where the Vault is installed, and is enabled at system level.
To integrate PTA with PAS, perform the following procedures.
Verify the configuration
Log on to the PTA machine as a root user and run the PTA diagnostic tool using the
RUN_DIAGNOSTICS command to verify that PTA works properly with the new
configuration.
CyberArk Vault / PAS Compatibility
Integration Required Version
Integrate the Vault with SIEM and PTA CyberArk Vault version
7.2.5 or higher
Support automatic threat containment using PAS CyberArk Vault version
integration, for Overpass the Hash attack and Suspected 9.3 or higher
Credential Theft security events
Support automatically adding unmanaged privileged CyberArk Vault version
accounts to the pending accounts queue 9.7 or higher
Configure Golden Ticket detection CyberArk Vault version
9.8 or higher
Support the Privileged Session Management integration CyberArk Vault and
PVWA version 9.8 or
higher
Note:
Privileged
Session
Management
integration
works with
lower
Privileged Threat Analytics
53 Integrate PTA with PAS
Integration Required Version
versions of
CyberArk
Vault, but
without the
ability to
report
Privileged
Session
Analysis
results to
PVWA.
Support a distributed Vault environment CyberArk Vault version
9.9.5 or higher
Support sending PTA alerts to the Vault CyberArk Vault version
9.10 or higher
Support automatic session termination CyberArk Privileged
Account Security suite
version 10.1 or higher
Configure the Vault to Forward syslog Messages to PTA
The system logger of the Vault must be configured to send logging data to the PTA
machine for real-time data analysis.
Note:
When PTA is configured with Vaults deployed in a distributed environment, configure
the primary and satellite Vaults.
To Configure syslog on the Vault Machine:
1. From the installation package, copy PTA.xsl to the Syslog subdirectory of the Vault
installation folder. By default, the subdirectory is:
C:\Program Files (x86)\PrivateArk\Server\Syslog.
2. In the same server installation folder,by default C:\Program Files
(x86)\PrivateArk\Server, open dbparm.ini and add the following lines:
[SYSLOG]
SyslogTranslatorFile=Syslog\PTA.xsl
SyslogServerPort=<port number>
SyslogServerIP=<server IP>
SyslogServerProtocol=UDP
SyslogMessageCodeFilter=295,308,7,24,31,428,361,372,373,359,436,
412,411,300,302,294,427
UseLegacySyslogFormat=No
Specify the following information:
Privileged Threat Analytics
PTA Implementation Guide 54
Parameter Name Define or Select
SyslogServerIP The IP address(es) of the PTA machine where messages
will be sent.
SyslogServerPort The port number through which the syslog will be sent.
Specify 514 to send syslogs to the default PTA port.
SyslogServerProtocol The protocol used to transfer the syslog records.
Specify: tcp or udp.
SyslogMessageCodeFilter Defines which message codes will be sent from the Vault
Machine to PTA through Syslog protocol.
You can specify message numbers, separated by
commas. You can also specify range of numbers using ‘-‘.
Message codes are sent for the following events:
Code Activity
7 Logon
24 CPM Change Password
31 CPM Reconcile Password
295 Retrieve Password
308 Use Password
428 Retrieve SSH keys
361 SSH Command
372 Terminated PSM Session
373 Terminated PSM Session Failed
359 SQL Command
436 SCP Command
412 PSM Keystrokes Logging
411 PSM Window Titles
300 PSM Connect
302 PSM Disconnect
294 Store Password
427 Store SSH Key
SyslogTranslatorFile Specifies the XSL file used to parse Vault records data
into Syslog protocol.
UseLegacySyslogFormat Controls the format of the syslog message, and defines
whether it will be sent in a newer syslog format (RFC
5424) or in a legacy format.
Privileged Threat Analytics
55 Integrate PTA with PAS
Parameter Name Define or Select
Required value: No. This enables the Vault to work with
the newer syslog format.
3. To forward Vault syslogs to multiple machines (for instance to your SIEM solution
as well as to PTA), you can specify multiple values for the following parameters and
separate each value with a comma.
■ This requires a CyberArk Vault version 7.2.5 or higher.
■ All destinations must use the same port and protocol, which are specified in the
SyslogServerPort and SyslogServerProtocol fields.
■ The specified values will apply to all destinations configured in SyslogServerIP,
using the translator files specified in SysLogTranslatorFile.
Parameter Name Comments
SyslogServerIP
SyslogTranslatorFile
UseLegacySyslogFormat
SyslogMessageCodeFilter Separate multiple values with a comma, and separate sets
of multiple values with a pipe-line, as shown in the
example below.
The following example shows how to send different syslog messages to multiple
syslog servers.
[SYSLOG]
SysLogTranslatorFile=Syslog\Arcsight.sample.xsl,Syslog\QRadar.xs
l,Syslog\PTA.xsl
SyslogServerPort=<port number>
SysLogServerIP=1.1.1.1,1.1.2.2,1.1.3.3
SyslogServerProtocol=UDP
UseLegacySyslogFormat=Yes,Yes,No
SyslogMessageCodeFilter=7,8,295|295-
296|295,308,7,24,31,428,361,372,373,359,436,412,411,300,302,294,
427
4. Save the file and close it.
5. Restart the Vault.
For more detailed instructions about integrating SIEM applications, see Integrating with
SIEM Applications in the Privileged Account Security Implementation Guide.
Configure the PVWA for PTA Integration with PAS
Configure the PTA user in PAS so that it can initiate automatic password changes when
PTA identifies a suspected credential threat and Overpass the Hash, and automatically
add detected unmanaged privileged accounts to the pending accounts queue in PAS.
To Configure the PVWA to automatically initiate password rotation or
reconciliation in PAS:
1. Log on to the PVWA as a user with the Manage Users permission.
Privileged Threat Analytics
PTA Implementation Guide 56
2. Navigate to Policies > Access Control (Safes), select the Safe where you want to
automatically initiate password rotation, and click Edit to display the Safe Details
page.
3. Make sure that the Assigned to CPM setting is enabled.
4. Click Save.
5. Click Members.
6. Click Add Member.
7. Search for PTAUser.
8. Leave the default permissions (List accounts, Retrieve accounts, and View Safe
Members).
9. Expand Account Management and select Initiate CPM account management
operations.
10.Click Add.
11.Search for PTAAppUser and perform steps 8 -10 above.
12.Click Close. The PTAUser’s authorizations in the Safe are updated and the Safe
Details page is displayed again.
13.Repeat this procedure for each safe where you want to automatically initiate
password rotation.
To Configure Adding of Unmanaged Privileged Accounts to Pending Accounts
Queue in PAS
1. Log on to the PVWA as a user with the Manage Users permission.
2. Open the PasswordManager_Pending safe, and click Members to display the
Safe Details page.
3. Click Add Member.
4. Search for PTAUser.
5. Remove all default permissions, except List accounts and View Safe Members.
6. Expand Account Management and select the following permissions:
■ Add accounts (includes update properties)
■ Update account content
■ Update account properties
7. Click Add.
8. Click Close. The PTAUser’s authorizations in the Safe are updated and the Safe
Details page is displayed again.
Integrate PTA with PSM
The integration of PTA and PSM requires changes in the Vault and PVWA.
In the Vault:
Configure the Vault to forward syslog messages to PTA. For details, see Configure the
Vault to Forward syslog Messages to PTA, page 53
To Show the PTA Activity Score in PVWA:
1. Log on to the PVWA as a user with the Administrator permission.
Privileged Threat Analytics
57 Integrate PTA with PAS
2. Navigate to Administration > Options, and select PIM Suite Configuration
> Access Restriction.
3. Right-click and select Add AllowedReferrer.
4. In BaseUrl, enter the PTA Server IP address.
5. Set RegularExpression to Yes.
6. Click Apply.
7. Navigate to Administration > Options, and select PIM Suite Configuration
> Privileged Session Management UI.
8. Ensure that the PSMandPTAIntegration setting is valued with Yes.
9. Click Apply and then click OK.
To Allow Session Termination:
1. Log on to the PVWA as a user with the Administrator permission.
2. Navigate to Administration > Options, and select PIM Suite Configuration
> Privileged Session Management > General Settings > Server Settings
> Live Sessions Monitoring Settings.
3. Ensure that the AllowPSMNotifications setting is valued with Yes.
4. Click Apply.
5. Expand Live Sessions Monitoring Settings > Terminating Live Sessions
Users and Groups and ensure that the PSMLiveSessionTerminators group
exists.
6. Click Apply and then click OK.
Integrate PTA with EPM
Go to Advanced > Server Configuration and click the link that represents the current
value of the PTA Configuration parameter. Enter the PTA server name, along with the
username and password created in PTA.
Privileged Threat Analytics
PTA Implementation Guide 58
Forward Log Data to PTA
PTA integrates with various solutions to receive raw data as syslog messages.
PTA can also receive Windows events from the PTA Windows Agent. For details on
installing the PTA Windows Agent, refer to the PTA Installation Guide.
Following are general guidelines for the data sent to PTA:
■ PTA supports UTF-8 formatted data.
■ Windows: The integration with Windows is based on authentication events 4624,
4723, and 4724. PTA supports this event type, which is supported in Windows 2003
and higher.
Note:
In order for PTA to monitor activity of privileged accounts in Windows machines,
Windows security events 4624, 4723, and 4724 from each monitored Windows
machine must be forwarded to the SIEM and from the SIEM to PTA.
■ Unix: When collecting syslogs directly from Unix machines, PAM Unix is supported.
PAM Unix is supported by multiple Unix flavors, such as Red Hat Linux, HP-UX, and
Solaris.
Supported PAM Unix events include accepted public key, accepted password, and
session open.
■ Database: Oracle logon events are supported.
■ Network Sensor: Traffic is received from domain controllers in the environment.
■ Vault: Specific events are accepted. Supported device types are operating system
and database.
Note:
It is strongly recommended to limit the allowed sources of syslog messages using the
organization's firewall. PTA should only be allowed to receive syslog messages from
allowed sources such as ArcSight, Splunk, QRadar, and any other server that reports to
PTA.
■ To configure the Windows Events Forwarder server to send syslog messages
to PTA via the PTA Windows Agents:
■ Configure Windows Event Forwarder server to forward Windows events to
PTA, page 59
■ If your SIEM solution receives syslog messages from UNIX, Windows and Oracle
machines, configure your SIEM solution to send these messages to PTA:
■ Configure HP ArcSight to Forward syslog Messages to PTA, page 59
■ Configure Splunk to Forward syslog Messages to PTA, page 59
■ Configure QRadar to Forward syslog Messages to PTA, page 61
■ Configure LogRhythm to Forward syslog Messages to PTA, page 63
■ Configure RSA to Forward syslog Messages to PTA, page 63
■ Configure McAfee ESM to Forward syslog Messages to PTA, page 63
Privileged Threat Analytics
59 Forward Log Data to PTA
■ To configure the UNIX Hosts to send syslog messages directly to PTA:
■ Configure UNIX Hosts to Forward syslog Messages to PTA, page 68
Verify the configuration
Log on to the PTA machine as a root user and run the PTA diagnostic tool using the
RUN_DIAGNOSTICS command to verify that PTA works properly with the new
configuration.
Configure Windows Event Forwarder server to forward
Windows events to PTA
PTA Windows Agent can integrate with the Windows Event Forwarder server to receive
Windows events that have already been collected. To enable this integration, configure
the Windows Event Forwarder server to send events to the PTA server via the
PTA Windows Agent.
In the Windows Event Forwarder server, create a subscription to send these events.
Configure the Query Filter to send Windows security 4624, 4723, and 4724 events. Also,
in the Advanced Subscription Settings, select Minimize Latency.
Configure HP ArcSight to Forward syslog Messages to
PTA
PTA can integrate with HP ArcSight to receive raw data that has been already collected.
The raw data that PTA analyzes is login activities to Windows and Unix machines, as well
as to Oracle databases. To enable this integration, configure the ArcSight Forwarding
Connector to send CEF Syslog events to the PTA server.
For information about forwarding HP ArcSight events to a third party such as PTA, see
the relevant sections in the "HP ArcSight ESM Forwarding Connector for Integration with
Technology Partners" User’s Guide.
Note:
To forward only the relevant raw data from the HP ArcSight ESM Forwarding Connector,
it is recommended to load the dedicated ArcSight_to_PTA_Filter.arb filter file. This filter
guarantees that the ESM only forwards login activities to the platforms mentioned
above. For more information about this filter file, contact your CyberArk representative.
Configure Splunk to Forward syslog Messages to PTA
PTA can integrate with Splunk to enable it to send raw data to PTA, which analyzes login
activities of Windows and Unix machines, and detects abnormal behavior according to
the machine’s profile.
To Configure Splunk to Forward Windows Events to PTA:
1. In the SPLUNK_HOME/etc/system/local folder, open the outputs.conf file.
2. Add the following section:
[syslog:pta_syslog]
server = <PTA Server IP>:<port>
Privileged Threat Analytics
PTA Implementation Guide 60
indexAndForward=true
type=<udp|tcp>
timestampformat = %s
■ <PTA server IP> - The IP address of the PTA machine.
■ <port> - The port number to which the syslog will be sent. Specify port 514,
which is the default PTA listener port for TCP and UDP.
■ <udp|tcp> – The syslog protocol type. Specify either udp or tcp.
For Example:
[syslog:pta_syslog]
server = 192.168.0.1:514
indexAndForward=true
type=udp
timestampformat = %s
In the above example, the syslog type is udp. The IP of the PTA server is
192.168.0.1 and the PTA listening port is 514.
For more information about configuring the Splunk outputs.conf file, see
http://docs.splunk.com/Documentation/Splunk/latest/Admin/Outputsconf.
3. Save the outputs.conf file and close it.
4. In the same folder, open the props.conf file. If this file does not exist, create it.
5. Add the following section:
[source::WinEventLog:Security]
TRANSFORMS-pta = pta_syslog_filter
6. Save the props.conf file and close it.
7. In the same folder, open the transforms.conf file. If this file does not exist, create it.
8. Add the following section:
[pta_syslog_filter]
REGEX = .*EventCode=4624|4723|4724.*
DEST_KEY = _SYSLOG_ROUTING
FORMAT = pta_syslog
9. Save the transforms.conf file and close it.
To Configure syslog Type as tcp:
1. In the SPLUNK_HOME/etc/system/local folder, open the outputs.conf file.
2. In the type parameter, specify tcp.
3. Save the outputs.conf file and close it.
4. In the same folder, open the props.conf file.
5. In the LINE_BREAKER_LOOKBEHIND parameter, specify 1500, as shown in the
following example:
[windows_snare_syslog]
LINE_BREAKER_LOOKBEHIND = 1500
6. Save the props.conf file and close it.
Privileged Threat Analytics
61 Forward Log Data to PTA
To Configure Splunk to Forward UNIX syslog Messages to PTA:
1. On the Splunk server, in the SPLUNK_HOME/etc/system/local folder, open the
outputs.conf file.
2. Add the following line:
syslogSourceType=sourcetype:: <name of data type>
3. Specify the sourcetype name of the UNIX forwarder installed in your organization
that is associated with the type of data that will be forwarded to Splunk.
4. Save the outputs.conf file and close it.
5. In the same folder, open the props.conf file. If this file does not exist, create it.
6. Add the following row:
[source::/var/log/secure]
7. Save the props.conf file and close it.
Configure QRadar to Forward syslog Messages to PTA
PTA can integrate with QRadar to send raw data to PTA, which analyzes login activities
of Windows machines, and detects abnormal behavior according to the machine’s
profile. PTA supports centralized and endpoint configuration.
To Configure QRadar to Forward Windows Events to PTA:
1. In the QRadar dashboard, display the Admin tab, then select Forwarding
Destination.
2. Add a new destination by specifying the following details:
Parameter Name Define or Select
Name The name of the destination. For example,
PTA.
Destination Address The IP address of the PTA server.
Event Format The format of the destination event. Select:
Payload.
Destination Port The port number to which the syslog will be
sent.
Specify: port 514. This is the default PTA
listener port.
Protocol The syslog protocol type. Specify: udp or
tcp.
Prefix a syslog header if it is missing Select this option.
or invalid
3. Save the new destination and close it.
4. In the QRadar dashboard, in the Admin tab, select Routing Rules.
5. Add a new routing rule by specifying the following details:
Privileged Threat Analytics
PTA Implementation Guide 62
Parameter
Define or Select
Name
Name The name of the new routing rule. For example, Security information for
PTA.
Description A description of the new rule. This is optional.
Mode The mode of the rule. Select Online.
Forwarding The event collector that is used to collect the security information. If
Event multiple event collectors are used, create multiple rules for every event
Collector collector.
Data The data source for this routing rule. Select Events.
Source
Event Set the EventID to 4624, 4723, or 4724. See the following instructions for
Filters details.
Routing Select Forward and specify the forwarding destination that you entered in
Options step 2.
6. In the Event Filters section, set EventID (custom) equals any of 4624, 4723, or
4724, and click the plus sign.
7. Click Add Filter.
Privileged Threat Analytics
63 Forward Log Data to PTA
8. Save the new routing rule and close it.
Configure LogRhythm to Forward syslog Messages to PTA
PTA can integrate with LogRhythm to receive raw data that has already been collected.
The raw data that PTA analyzes is login activities to Windows and Unix machines. To
enable this integration, configure LogRhythm to send events to the PTA server. For
information about forwarding LogRhythm events to a third party such as PTA, see the
relevant LogRhythm User’s Guide.
Configure RSA to Forward syslog Messages to PTA
PTA can integrate with RSA to receive raw data that has already been collected. The
raw data that PTA analyzes is login activities to Windows and Unix machines, as well as
to Oracle databases. To enable this integration, configure RSA to send events to the
PTA server. For information about forwarding RSA events to a third party such as PTA,
see the relevant RSA User’s Guide.
Configure McAfee ESM to Forward syslog Messages to
PTA
PTA can integrate with McAfee ESM to send raw data to PTA, which analyzes login
activities of Windows machines, and detects abnormal behavior according to the
machine’s profile. PTA supports centralized and endpoint configuration.
Before You Begin:
■ Make sure that the devices which will forward syslog messages to PTA are defined
in the McAfee Enterprise Security Manager (ESM).
To Configure McAfee to Forward syslog Messages to PTA:
1. Open McAfee Enterprise Security Manager (ESM), and click the System
Privileged Threat Analytics
PTA Implementation Guide 64
Properties button.
The System Properties window opens.
2. Click the Event Forwarding tab, then click the Add button. The Edit Event
Forwarding Destination window opens.
Privileged Threat Analytics
65 Forward Log Data to PTA
3. Select or enter the following details:
Parameter Name Define or Select
Name Enter a name.
Enabled Click, to select Enabled.
Format Select Syslog (Standard Event Form) from the drop-down list.
Destination IP Enter the PTA IP address.
Destination Port Enter the port number 514.
Protocol Select UDP from the drop-down list.
Facility Leave the default, User.
Severity Leave the default, Informational.
Time Zone Select GMT+ and the PTA Server time zone
4. Click the Event Filters button. The Event Filters window opens.
Privileged Threat Analytics
PTA Implementation Guide 66
5. Next to the Device field, click the filter icon .
The Devices window opens and the list of predefined devices appear. These are the
devices which will send syslog messages to PTA.
6. Select the relevant devices, then click OK. The devices you selected appear in the
Device field.
Privileged Threat Analytics
67 Forward Log Data to PTA
7. In Normalized ID area, click the filter icon to select the types of messages that
will appear. The Filter Variables window opens.
8. Click the Watchlists tab.
9. Navigate to Authentication > Login, and select Host Login.
10.Click OK. The number 408977408/18 appears in the Normalized ID field.
11.Click OK to save your parameters in the Events Filters window.
12.Click OK again. The System Properties window reopens.
Privileged Threat Analytics
PTA Implementation Guide 68
13.Click the Settings button. The Event Forwarding Settings window opens.
14.In the Maximum combined events forwarded per second field, set the value to 1.
15.Then, click OK.
16.Click OK again to save your settings, and to close the System Properties window.
Configure UNIX Hosts to Forward syslog Messages to PTA
You can configure the UNIX machines in your organization to forward syslog messages
to PTA, which analyzes UNIX syslog messages and detects when users access these
machines with a privileged account without first retrieving the password from the Vault.
This configuration is not necessary if the UNIX machines’ syslog messages are
forwarded to your SIEM solution and from there to PTA. For more information, see
Configure HP ArcSight to Forward syslog Messages to PTA, page 59.
Privileged Threat Analytics
69 Forward Log Data to PTA
To Configure UNIX Hosts to Forward syslog Messages to PTA:
1. Log in as the root user.
2. To identify the System Logger engine running on your OS, run the following
command:
ls -d /etc/*syslog*
Depending on your OS, the output will be one of the following:
■ rsyslog.conf
■ syslog.conf (the current version of PTA does not support this syslog engine)
■ syslog-ng.conf (the current version of PTA does not support this syslog
engine)
The table below lists the abilities of the syslog engine.
Output Type Rsyslog
Configuration file location /etc/rsyslog.conf
Custom ports ü
UDP forwarding ü
TCP forwarding ü
3. If an rsyslog engine is not installed on your Linux machine, install it.
For information about installing the rsyslog engine, see
http://www.rsyslog.com/rhelcentos-rpms/.
4. When the rsyslog engine is installed on your machine, configure it as follows:
a. Edit the configuration file with a text editor such as vi, as follows:
vi /etc/rsyslog.conf
b. In the configuration file, add the authpriv keyword, which limits the syslog
messages sent to security and authorization messages:
authpriv.*<tab><protocol><server IP>:<port number>
Note: Make sure authpriv.* and <protocol><server IP> are separated by tabs and not
spaces.
c. Specify the following information:
■ Protocol – Replace <protocol> with @ for UDP or @@ for TCP.
■ ServerIP – Replace <server IP> with the IP of the PTA machine.
■ Port number - Replace <port number> with the port number to which the
syslog will be sent. Specify port 514, which is the default PTA listener port for
TCP and UDP.
Note:
In Linux, you cannot use custom ports and can only specify the following:
authpriv.*<tab>@<server IP>
d. Save the file and exit the editor.
Privileged Threat Analytics
PTA Implementation Guide 70
5. Restart the syslog service by using one of the following commands:
service rsyslog restart
or,
/etc/init.d/rsyslog restart
Privileged Threat Analytics
71 Send PTA Data
Send PTA Data
PTA can send detected incidents as syslog messages to SIEM solutions. PTA can also
send alerts to individual or group email addresses, or to the Vault.
In this section:
Send PTA syslog Records to SIEM , page 71
Send PTA Alerts to Email , page 77
Send PTA Alerts to the Vault, page 78
Verify the configuration
Log on to the PTA machine as a root user and run the PTA diagnostic tool using the
RUN_DIAGNOSTICS command to verify that PTA works properly with the new
configuration.
Send PTA syslog Records to SIEM
PTA can integrate with SIEM solutions to send detected incidents as syslog messages in
CEF/LEEF format.
This section describes how to configure outbound integration of PTA with your SIEM
solution. When PTA detects an event, it sends a syslog record to the server where your
SIEM solution is installed in real time using CEF/LEEF format.
You can identify PTA records by their device vendor name, CyberArk, and their device
product name, PTA.
To Configure PTA to Send syslog Records to SIEM:
1. On the PTA machine, open the default systemparm.properties file using the
DEFAULTPARM command.
2. Copy the line containing the syslog_outbound property, and exit the file.
3. Open the local systemparm.properties file using the LOCALPARM command.
4. Click i to edit the file.
5. Paste the line you copied, uncomment the syslog_outbound property and edit the
parameters. Use the following table as a guide.
Parameter Description Comments
siem Enter the SIEM system in your
organization.
PTA supports the following
vendors:
■ HP ArcSight
■ McAfee
■ QRadar
■ RSA
■ Splunk
Privileged Threat Analytics
PTA Implementation Guide 72
Parameter Description Comments
format The format used to transfer the ■ CEF is supported by the
syslog records to the server following Vendors:
where your SIEM solution is ■ HP ArcSight
installed. ■ McAfee
Enter: ■ RSA
CEF -or- LEEF ■ Splunk
■ LEEF is supported by
the following Vendors:
■ QRadar
host The Host/IP address of the server
where your SIEM solution is
installed.
port The port number through which
the syslog records will be sent to
the server where your SIEM
solution is installed.
protocol The protocol used to transfer the
syslog records to the server
where your SIEM solution is
installed.
Currently, PTA supports only
udp.
Example for: HP ArcSight, McAfee, RSA, Splunk
syslog_outbound=[{"siem": "McAfee", "format": "CEF", "host":
"SIEM_MACHINE_ADDRESS", "port": 1236, "protocol": "UDP"}]
Example for: QRadar
syslog_outbound=[{"siem": "QRadar", "format": "LEEF", "host":
"SIEM_MACHINE_ADDRESS", "port": 1236, "protocol": "UDP"}]
Example for: multiple syslog recipients, separated by commas.
syslog_outbound=[{"siem": "RSA", "format": "CEF", "host": "SIEM_
MACHINE_ADDRESS", "port": 1236, "protocol": "UDP"}, {"siem":
"QRadar", "format": "LEEF", "host": "SIEM_MACHINE_ADDRESS",
"port": 1236, "protocol": "UDP"}, …]
6. Save the configuration file and close it.
7. Restart PTA.
8. To view the syslog records sent by PTA, see:
■ CEF-Based Format Definition, page 73
■ LEEF-Based Format Definition, page 75
Privileged Threat Analytics
73 Send PTA Data
CEF-Based Format Definition
The following table describes the CEF-based format of the syslog records sent by PTA.
Field Description Specified value
Prefix fields
CEF:[number] The CEF header and CEF:0
version.
The version number
identifies the version of
the CEF format.
Device Vendor, Device Information about the CyberArk, PTA, 3.95
Product, Device Version device sending the
message. For PTA, the
Device Vendor is
CyberArk, and the
Device Product is PTA.
Event Type A unique ID that {21-55}
identifies the event that
is reported.
Event Name A description of the {Suspected credentials theft,
reported event type. Unmanaged privileged
account, Privileged access
during irregular hours, etc…}
For a complete list of PTA
detections, indicators of
compromise and their
descriptions, see What
Detections Does PTA
Report?, page 6.
Severity A numeric value that {1,2,3,4,5,6,7,8,9,10}
indicates the severity of
the event.
■ 1 is the lowest event
severity
■ 10 is the highest
event severity
Extension fields
suser Source User Name Any user
shost Source host name Any host
src Source IP address Any IP
duser Destination user name Any user
dhost Destination host address Any host
Privileged Threat Analytics
PTA Implementation Guide 74
Field Description Specified value
dst Destination IP address Any IP
cs1Label The label of the Extra “ExtraData”
Data field
cs1 Additional information SPN, Session etc.
which is relevant for the
reported security event
cs2Label The label of the Security “EventID”
Event ID field
cs2 The ID of the reported 52b06812ec3500ed864c461e
security event
deviceCustomDate1Label The label of the “DetectionDate”
detectionDate field
deviceCustomDate1 The system time when 1388577900000
PTA identified the
security event
cs3Label The label of the link field “PTALink”
cs3 The HTTPS link to the https://1.1.1.1/incidents/
Incident Details page of 52b06812ec3500ed864c461e
this security event in the
PTA dashboard
cs4Label The label of the external “ExternalLink”
link field
cs4 An HTTPS link to other http://...
CyberArk or third party
product that can add
more information to the
incident
Note:
suser, shost, src, duser, dhost and dst fields may contain a single value or a list of values. If
the field contains a list of values, these values will be separated by a comma, and if they are larger
than 1024, data will be omitted and “etc..” will be added to the end.
dhost and dst fields could be a single host or a database instance. If it is a database instance, the
dhost destination will be in the format <machine:instance>.
When the src, dst, duser, suser or cs1 field has no value, the field is sent with the value None.
The following example shows syslog output generated by PTA:
CEF:0|CyberArk|PTA|3.95|1|Suspected credentials
theft|8|
[email protected] shost=prod1.domain.com
src=1.1.1.1
[email protected] dhost=dev1.domain.com
dst=2.2.2.2 cs1Label=ExtraData cs1=None cs2Label=EventID
cs2=52b06812ec3500ed864c461e deviceCustomDate1Label=detectionDate
deviceCustomDate1=1388577900000 cs3Label=PTAlink
Privileged Threat Analytics
75 Send PTA Data
cs3=https://1.1.1.1/incidents/52b06812ec3500ed864c461e
cs4Label=ExternalLink cs4=None
LEEF-Based Format Definition
The following table describes the LEEF-based format of the syslog records sent by PTA.
Field Description Specified value
Prefix fields
LEEF:[number] The LEEF header and LEEF:[number]
version. The version
number identifies the
version of the LEEF
format.
Device Vendor, Information about the CyberArk, PTA, 3.95
Device Product, device sending the
Device Version message. For PTA, the
Device
Vendor is CyberArk, and
the Device Product is
PTA.
Event Type A unique ID that {21-55}
identifies the event type
that is reported.
Cat A description of the {Suspected credentials theft,
reported event type. Unmanaged privileged account,
Privileged access during irregular
hours, etc…}
For a complete list of PTA detections,
indicators of compromise and their
descriptions, see What Detections
Does PTA Report?, page 6.
sev A numeric value that {1,2,3,4,5,6,7,8,9,10}
indicates the severity of
the event.
■ 1 is the lowest event
severity
■ 10 is the highest
event severity
Extension fields
src Source host/IP address Any host/IP
usrName Destination user name Any user
associated with the
event.
Privileged Threat Analytics
PTA Implementation Guide 76
Field Description Specified value
dst Destination host/IP Any host/IP
address
extraDataLabel The label of the Extra “extraData”
data field.
extraData Additional information SPN, Session etc.
relevant for the reported
security event
eventIdLabel The label of the Security “eventID”
Event ID field
eventID The ID of the reported 52b06812ec3500ed864c461e
security event
devTime The system time when 1388577600000
PTA identified the
security event
linkLabel The label of the link field “ptaLink”
ptaLink The HTTPS link to the https://1.1.1.1/incidents/
Incident Details page of 52b06812ec3500ed864c461e
this security event in the
PTA dashboard.
suserLabel The label of the Event “suser”
Name field.
suser Source User Name Any user
externalLinkLabel The label of the external “externalLink”
link field.
externalLink The HTTPS link to the http://...
Incident Details page of
this security event in the
PTA dashboard.
Note:
suser, shost, src, duser, dhost and dst fields may contain a single value or a list of values. If
the field contains a list of values, these values will be separated by a comma, and if they are larger
than 1024, data will be omitted and “etc..” will be added to the end.
dhost and dst fields could be a single host or a database instance. If it is a database instance, the
dhost destination will be in the format <machine:instance>.
When the src, dst, duser, suser or cs1 field has no value, the field is sent with the value None.
The following example shows syslog output generated by PTA:
LEEF:1.0|CyberArk|PTA|3.95|1|Cat=Suspected credentials
theft|sev=8| src=src1 userName=mike dst=192.168.0.1
ExtraDataLabel=ExtraData ExtraData=None EventIdLabel=EventID
EventID=52b06812ec3500ed864c461e devTime= 1388577600000
Privileged Threat Analytics
77 Send PTA Data
LinkLabel=PTALink
PTALink=https://1.1.1.1/incidents/52b06812ec3500ed864c461e
suserLabel=SourceUserName suser=mike2
ExternalLinkLabel=ExternalLink ExternalLink=None
Send PTA Alerts to Email
PTA can send alerts to individual or group email addresses.
To Configure PTA to Send Alerts to Emails:
Note:
If you already configured PTA to send emails during the PTA installation, you do not
need to perform this procedure.
1. On the system console, log in as the root user user using the password you specified
during installation.
2. Start the PTA utility by running the following command:
/opt/tomcat/utility/emailConfiguration.sh
3. Enter the IP address of the email server in your organization, then press Enter.
Specify the email server IP address:
The SMTP port prompt appears.
Specify SMTP port [25]:
a. Enter the port of the SMTP server, then press Enter. The following prompt
appears.
Specify the sender’s email address (in the following format:
[email protected]):
b. Specify the email address, in lowercase characters, of the user whose name will
be included as the sender in notifications, then press Enter. The following prompt
appears.
Specify the recipient’s email address (in the following
format: [email protected]). Separate multiple addresses with
‘;’ (semi-colon):
c. Specify the email address(es), in lowercase characters, of the notification
recipient(s), then press Enter. Separate multiple recipient addresses with a
semi-colon. The mail server authentication prompt appears.
Does the mail server require authentication (y/n)? [y]:
d. Enter y if the mail server requires authentication, then press Enter.
The sender’s credentials prompts appear:
Setting the sender’s credentials
Enter username and password for the user that will send email
Privileged Threat Analytics
PTA Implementation Guide 78
notifications.
Username:
Password:
Retype password:
e. Enter the user name and password of the user in the email system who will send
notifications, then press Enter. After the sender’s credentials are saved
successfully, the following confirmation is displayed.
The sender's credentials saved successfully.
f. After the email notifications are configured successfully, the following
confirmation is displayed, and the installation proceeds to the next step.
Email notifications configuration finished successfully.
Send PTA Alerts to the Vault
PTA can send alerts to the Vault. This feature is automatically enabled.
In PVWA, you can see the PTA alerts under the Privileged Threat Analytics Activities
section. There are two events:
■ 460 - Privileged Threat Analytics event for managed account
■ 461 - Privileged Threat Analytics event for Vault user
In PAS, the alerts are marked in the report as Privileged Threat Analytics Event.
To Disable this Feature:
1. On the PTA machine, open the local systemparm.properties configuration file
using the LOCALPARM command. .
2. Click i to edit the file.
3. Change the send_pta_events_to_pas_enabled property to False.
4. Save the file and close it.
5. Run the service appmgr restart command to restart PTA.
Privileged Threat Analytics
79
Use PTA
The PTA dashboard displays an overview of general system status for a selected period
of time, enabling you to view system activity and analysis, as well as details about current
and past incidents and a summary of system activity.
This section describes how to access PTA, introduces you to the PTA dashboard and
explains how to generate reports.
In this section:
Access and Use PTA
Use and Understand the Dashboard
Generate Reports
Privileged Threat Analytics
PTA Implementation Guide 80
Access and Use PTA
Refer to the following procedures to access and use PTA.
Log on to PTA
Log off from PTA
Change your Password
Reset your Password
Manage your Password
Access PTA Information
Privileged Threat Analytics
81 Access and Use PTA
Log on to PTA
In your browser, navigate to the following URL: https://ptaserver
The PTA Sign In window is displayed.
To Log on to PTA as an administrator:
1. In the Sign In window, specify administrator and the administrator password, then
click Sign In; PTA authenticates your user and displays the PTA dashboard.
2. While you are logged onto PTA as an administrator, you can use any of the following
procedures:
■ To change or reset your password, see Change your Password, page 82.
■ If you forgot your password, you can reset your password. See Reset your
Password, page 83.
■ Updating the settings shown in Use PTA for the First Time, page 10.
To Log on to PTA as a regular user:
1. Specify your user name and password, then click Sign In; PTA authenticates your
user and displays the PTA dashboard.
2. If you are an LDAP user, enter your username as UPN.
For Example:
[email protected] Privileged Threat Analytics
PTA Implementation Guide 82
Log off from PTA
From the User menu, select Sign out; PTA signs you out.
Change your Password
Use the following procedure to change your password.
To Change your Password:
1. From the User menu, select Change Password.
The Change Password window is displayed.
2. In Current Password, specify the password that you used to log on to PTA.
3. In New Password, specify a new password that meets all of the following criteria:
■ A minimum of twelve characters
Privileged Threat Analytics
83 Access and Use PTA
■ At least two uppercase and two lowercase letters
■ At least two digits
4. In Confirm Password, specify your new password again to confirm it, then click
Change password; PTA updates your password.
Reset your Password
If you forget your administrator password, you can initiate a password reset process.
To Reset your Password:
1. On the system console, log in as the ptauser user using the password you specified
during installation.
2. At the command line, in the /opt/tomcat/utility folder, run the following command.
sudo ./resetPtaAdminPass.sh
The following prompt appears.
[Step 1/1 – Reset PTA Administrator’s Password]
This will reset the Administrator’s password. Are you sure you
want to continue (y/n)? [n]: y
3. Specify y to continue the reset password procedure. The Password prompt appears.
Password:
4. Specify the new password, then press Enter. The Retype password prompt
appears.
Retype password:
5. Specify the new password again, then press Enter; the process resets the password
and the following confirmation is displayed.
PTA Administrator’s password has been reset successfully
When you log on to PTA for the first time after resetting your password, the Change
Password window is displayed and you are required to change your password. For more
information, see Change your Password, page 82.
Manage your Password
You can manage your PTA Dashboard Administrator password via CyberArk Privileged
Account Security, for password verification and automatic password change.
To Manage your Administrator Password (for PAS 10.1 and PVWA 10.1 and
higher):
Note:
This procedure is only for users whose PAS and PVWA versions are 10.1 or higher.
See the next procedure for older versions of PAS and PVWA.
Privileged Threat Analytics
PTA Implementation Guide 84
1. In the PVWA, go to Administration > Platform management > CyberArk PTA
and ensure that the status is Active.
2. In the PVWA, create a new account.
a. Value the Platform Name with CyberArk PTA.
b. Value the Device Type with Application.
c. Value the Address with the PTA Server. Use one of the following values:
i. IP address
ii. Host name
iii. FQDN
d. Value the Username with Administrator.
e. Value the Password with the Administrator account's password.
3. Verify the account.
To Manage your Administrator Password (for PAS and PVWA version less than
10.1):
Note:
This procedure is only for users whose PAS and PVWA versions are less than 10.1. See the
previous procedure for newer versions of PAS and PVWA.
If you are using a previous version of the PTAPlugin.zip file, that creates a PTA Dashboard
platform, you must import the new PTAPlugin.zip file, and move the account to the new platform.
1. Import the PTAPlugin.zip file included in the PTA installation package to the PVWA.
See the Importing New Platforms section in the Privileged Account Security
Implementation Guide.
2. In the PVWA, create a new account.
Privileged Threat Analytics
85 Access and Use PTA
a. Value the Platform Name with CyberArk PTA.
b. Value the Device Type with Application.
c. Value the Address with the PTA Server. Use one of the following values:
i. IP address
ii. Host name
iii. FQDN
d. Value the Username with Administrator.
e. Value the Password with the Administrator account's password.
3. Verify the account.
4. In the PVWA, go to Administration > Platform management. If the
PTA Dashboard platform with a Website device exists, delete the existing account.
5. Go to Administration > Platform management > PTA Dashboard and ensure
that the status is Inactive.
Access PTA Information
■ Click and select About to view information about the current release of PTA.
■ Click and select Help Center to open an HTML version of the
PTA Implementation Guide.
Privileged Threat Analytics
PTA Implementation Guide 86
Privileged Threat Analytics
87 Use and Understand the Dashboard
Use and Understand the Dashboard
The Dashboard provides an overview of general system status for a selected period of
time, as well as details about current and past incidents and a summary of system activity
over time.
The dashboard presents all this information in multiple graphic analysis of system activity
and security incidents that enable you to see and understand system activity at a glance.
In this section:
Select a Time Frame , page 88
View Current Incidents, page 88
View System Activities, page 90
View the Incident Summary , page 91
Close an Incident, page 93
View Privileged Related Risks, page 95
Privileged Threat Analytics
PTA Implementation Guide 88
Select a Time Frame
In the upper right area of the Dashboard, select the time frame to display in the
Dashboard analysis.
View Current Incidents
The Incidents chart displays incidents in the system over the selected timeframe and
shows their severity using the following display features:
■ Color: Incidents are displayed as colored bubbles, according to one of three risk
levels. This enables you to easily understand if suspicious activities occurred.
Suspicious activities detected in a privileged session are displayed in a larger bubble,
with the center of the bubble also colored. Only one bubble is displayed for all the
suspicious activities detected over the selected timeframe. This bubble is an
aggregation of all the suspicious activities, and is placed between the most suspicious
and the latest suspicious activities in the privileged session.
Suspicious activities detected in a privileged session include:
■ Commands that are considered suspicious
■ Privileged access to the Vault during irregular hours
■ Excessive access to privileged accounts in the Vault
■ Activity by dormant Vault users
Note:
You can display suspicious activities in individual bubbles, using the
numberOfIncidentsToGroupBy system parameter. For details, see Section: UI, page 151.
■ Severity score: Each bubble contains a score which denotes the severity attributed
to the incident. Although the bubbles are placed at different levels on the chart, this
score give a precise indication of severity.
■ Frame: The frame around each bubble indicates the management status of the
incident.
■ A heavy outline indicates that the incident has not yet been viewed.
■ A light outline indicates that the incident has been viewed.
Privileged Threat Analytics
89 Use and Understand the Dashboard
■ Enlarge the Display of a Timeframe, page 89
■ View Incident Details, page 89
Enlarge the Display of a Timeframe
You can zoom into the display of a time period in the chart to enable you to distinguish
more clearly between incidents that occurred closely together.
■ Click and hold the mouse over a date, then drag it to create a yellow box that defines
the relevant timeframe. You can further enlarge the selected period by repeating this
procedure.
■ To return to the default view of the Incidents chart, select Week in the upper right
area of the Dashboard.
View Incident Details
■ Hold your mouse over an incident to view details,
or,
■ Select an incident to display a summary of details in the Details pane. The summary
includes the name, risk index and status of the incident, as well as a description. For
more information, see View the Incident Summary , page 91.
The incident details for suspicious activities detected in a privileged session are shown as
a table. Click the suspicious activities incident to view details:
Privileged Threat Analytics
PTA Implementation Guide 90
The incident details are displayed in order according to the Risk Index. You can sort them
by Start Date. A summary of details for the first incident is displayed in the Details pane.
Select an incident to show its summary of details. The summary includes the name, risk
index and status of the incident, as well as a description. For more information, see View
the Incident Summary , page 91.
View System Activities
You can see a summary of events in the system over the selected period of time, giving
you a comparison among the different types of activities. This information is displayed in a
bar chart that indicates the number of activities by type and the date when they occurred.
To view a summary of these activities for a specific day, move your mouse over any bar.
You can click on any of the activity types at the bottom. When the activity type is gray, its
events are not shown.
The activity types are received from Vault, SIEM, Unix, Network Sensor, AD, and EPM.
If there is no activity from one of these sources during the selected period of time, the type
is not shown. Activities for the time period before this version was installed are shown as
type of All.
Privileged Threat Analytics
91 Use and Understand the Dashboard
View the Incident Summary
The Details pane displays the current risk index and status of the incident.
The Incident Summary indicates whether the incident has been handled, using the
following stages:
Status Indicates
Unread This incident has not yet been viewed.
In the Incidents graph, this type of incident is marked with a bold
frame.
Active This incident has been viewed and is currently being handled.
In the Incidents graph, this type of incident is marked with a light
frame.
Closed This incident is no longer in progress.
In the Incidents graph, this type of incident is marked with a gray
frame.
■ Click Details to display the Incident Details page, which contains more information
about each incident. See View Incident Details, page 92.
Privileged Threat Analytics
PTA Implementation Guide 92
View Incident Details
The Incident Details page provides details about a selected incident, enabling you to view
a break-down of events and the incident’s current status and risk. Using this information,
you can investigate incidents and contain them to ensure a lower risk environment.
The example above shows a Suspected credentials theft event.
In the Incident Details page for suspicious activities, click Full session details to view
the details in PVWA. You must authenticate yourself to access PVWA.
View Correlated Events
The Correlated Events page provides details about multiple security events that occurred
over a certain period involving the same Vault user, account, attacked asset, and/or
source machine, which are correlated into one or more incidents.
■ Identifying the Correlated Incident, page 92
■ Viewing the Correlated Incident as a Table of Security Events, page 93
Identifying the Correlated Incident
PTA allocates an ID to each correlated incident, which is combined with the reason for
the incident to create a unique title. The title of the first type of suspicious activity that
occurred is displayed. A short description gives an overview of the correlated incident,
which includes multiple correlated security events that occurred in a certain period and
involved the same Vault user and/or attacked asset.
Privileged Threat Analytics
93 Use and Understand the Dashboard
Viewing the Correlated Incident as a Table of Security Events
PTA displays a table of security events which lists all the correlated security events that
comprise the incident. You can expand an event to view a descriptive description of it.
This table includes the following details:
Status Indicates...
ID The unique ID of the event.
Score The risk index of an event.
User The name of the Vault user whose account was used.
Target user The name of the target user whose account was used.
Target The target address of the machine where the event occurred.
address
Source The source address of the machine on which the event occurred.
address
Event type The type of event that occurred.
Detection The time when the security event was detected. This enables you to
time see how much time has passed since the event occurred and security
may have been compromised.
Close an Incident
After you have handled an incident successfully, you can close it and it is removed from
the Dashboard’s Incident chart. Its risk index will not be used to calculate the system risk
index any more.
1. In the Incident Summary, click Close; the Close incident window is displayed.
Privileged Threat Analytics
PTA Implementation Guide 94
2. From the Reason drop-down list, select the reason for closing the incident:
■ Incident was handled – The user investigated the reason for the incident, took
care of the relevant issues, and it is no longer a threat.
■ It is not a real incident – Although an anomaly was detected, human
observation determined that it was not a real anomaly.
3. Click OK to save your changes.
Privileged Threat Analytics
95 Use and Understand the Dashboard
View Privileged Related Risks
PTA is able to proactively create alerts on critical risks in privileged accounts.
You can review these critical risks in the PTA dashboard.
Risk Name Explanation of the Risk Recommended Actions
Unconstrained Service accounts are granted
Delegation with permissive delegation Caution:
privileges and therefore expose This
the domain to high risk. procedure is
by
An attacker could maliciously
recommendati
leverage the service account that
on only.
is trusted for unconstrained
delegation, in order to The
compromise credentials and recommendati
access remote services on ons in this
behalf of delegated accounts. section are
the
PTA searches for accounts with
Customer's
permissive delegation privileges
responsibility.
and flags these accounts as
risky. CyberArk
does not bear
any
responsibility
for the
procedures
below which
are performed
at the
Customer
site.
Use the following recommended
procedure: To Identify Risky
Service Accounts Exposed to
Unconstrained Delegations:,
page To Identify Risky Service
Accounts Exposed to
Unconstrained Delegations:,
page 97
Risky SPNs Privileged accounts with SPN
(service principal name) Caution:
configuration can be vulnerable This
to offline brute-forcing and procedure is
dictionary attacks, allowing a by
malicious insider to recover the recommendati
account's clear-text password. on only.
Privileged Threat Analytics
PTA Implementation Guide 96
The
recommendati
ons in this
section are
the
Customer's
responsibility.
CyberArk
does not bear
any
responsibility
for the
procedures
below which
are performed
at the
Customer
site.
Use the following recommended
procedure: To Identify Risky
SPNs:, page To Identify Risky
SPNs:, page 98
Dual Usage A service account was
interactively logged on. Caution:
This
Logging on interactively using procedure is
service accounts can create by
security risks by leaving recommendati
credential hashes on the target on only.
machine. Attackers seek service
The
account credentials, which are
recommendati
valid for an extended period of
ons in this
time.
section are
the
Customer's
responsibility.
CyberArk
does not bear
any
responsibility
for the
procedures
below which
are performed
at the
Customer
site.
Privileged Threat Analytics
97 Use and Understand the Dashboard
Use the following recommended
procedure: To Identify Service
Accounts Logged on
Interactively:, page 101.
Exposed LDAP might send user
Credentials credentials in clear text when Caution:
using unsecure or legacy LDAP This
methods for authentication. In procedure is
other words, the credentials are by
exposed and not encrypted. recommendati
on only.
PTA searches for clear text
credentials transmitted over the The
wire, and flags the machines recommendati
which expose these credentials ons in this
as risky. You can also view a list section are
of the detected compromised the
accounts. Customer's
responsibility.
CyberArk
does not bear
any
responsibility
for the
procedures
below which
are performed
at the
Customer
site.
Use the following recommended
procedure: To Identify Machines
Exposing Credentials:, page 100.
To Identify Risky Service Accounts Exposed to Unconstrained Delegations:
Caution:
This procedure is by recommendation only.
The recommendations in this section are the Customer's responsibility.
CyberArk does not bear any responsibility for the procedures below which are
performed at the Customer site.
1. In the Dashboard, click on the risk, Unconstrained Delegation in the left pane.
Privileged Threat Analytics
PTA Implementation Guide 98
The events connected to that Risk appear in the Unconstrained Delegation
window, with details of each event.
■ The Unconstrained Delegation window displays the following details: Score,
Account name, Target address, Source address, Event type, and Status.
■ If the risk appears in an aggregated summary, in the Account column
Multiple will appear instead of the account name, and in the risk details, a list of
detected compromised accounts appears.
2. Review each event.
3. Consider changing the Delegation property rights of the relevant service accounts to
Constrained Delegation.
4. Consider also configuring privileged accounts as sensitive and cannot be
delegated.
5. Repeat for every machine where the potential risk is identified.
6. Continue with To Close and Filter Risky Events, page 102.
To Identify Risky SPNs:
Caution:
This procedure is by recommendation only.
The recommendations in this section are the Customer's responsibility.
CyberArk does not bear any responsibility for the procedures below which are
performed at the Customer site.
Privileged Threat Analytics
99 Use and Understand the Dashboard
1. In the Dashboard, click on the risk, Risky SPN(s) in the left pane.
The events connected to that Risk appear in the Risky SPN(s) window, with details
of each event.
■ The Risky SPN(s) window displays the following details: Score, Account
name, Event type, and Status.
■ If the risk appears in an aggregated summary, in the Account column
Multiple will appear instead of the account name, and in the risk details, a list of
detected compromised accounts appears.
2. Review each event.
3. Consider increasing the encryption level to use AES256.
4. Reduce the privileges of accounts associated with SPNs to the minimum possible.
5. Periodically clean SPNs that are no longer necessary.
6. Ensure that accounts associated with SPNs are configured with complex, rotated
and random generated passwords.
7. Store and manage the privileged account in the Vault.
8. Repeat for every machine where the potential risk is identified.
9. Continue with To Close and Filter Risky Events, page 102.
Privileged Threat Analytics
PTA Implementation Guide 100
To Identify Machines Exposing Credentials:
Caution:
This procedure is by recommendation only.
The recommendations in this section are the Customer's responsibility.
CyberArk does not bear any responsibility for the procedures below which are
performed at the Customer site.
1. In the Dashboard, click on the risk, Exposed Credentials in the left pane.
The events connected to that Risk appear in the Exposed Credentials window, with
details of each event.
■ The Exposed Credentials window displays the following details: Score,
Account name, Target address, Source address, Event type, and Status.
■ If the risk appears in an aggregated summary, in the Account column
Multiple will appear instead of the account name, and in the risk details, a list of
detected compromised accounts appears.
2. Review each event.
3. Double click, or click the plus sign, to view details of the risky machine.
4. Go to the physical machine where the potential risk was identified, and search for any
services running LDAP.
Privileged Threat Analytics
101 Use and Understand the Dashboard
5. Consider changing the method LDAP is using for authentication to a more secure
method, or use LDAPS.
6. Repeat for every machine where the potential risk is identified.
7. Continue with To Close and Filter Risky Events, page 102.
To Identify Service Accounts Logged on Interactively:
Caution:
This procedure is by recommendation only.
The recommendations in this section are the Customer's responsibility.
CyberArk does not bear any responsibility for the procedures below which are
performed at the Customer site.
1. In the Dashboard, click on the risk, Dual Usage in the left pane.
The events connected to that Risk appear in the Service Account logged on
interactively window, with details of each event.
■ The Service Account logged on interactively window displays the following
details: Score, Account name, Target address, Source address, Event
type, and Status.
Privileged Threat Analytics
PTA Implementation Guide 102
■ If the risk appears in an aggregated summary, in the Account column
Multiple will appear instead of the account name, and in the risk details, a list of
detected compromised accounts appears.
2. Review each event.
3. Consider separating between user accounts and service accounts, and only logging
on with user accounts..
4. Repeat for every machine where the potential risk is identified.
5. Continue with To Close and Filter Risky Events, page 102.
To Close and Filter Risky Events
1. After reviewing an event you can close it.
■ To close an event, click the square to select the event, then click the Close
button.
2. To filter the events while reviewing them, do the following:
■ Select Show open events to only show the open events.
■ Select Show all events to show both open and closed events.
3. After reviewing the events, you can close all the events in the risk.
■ To do this, click the top square to select all the events, then click the Close
button.
Privileged Threat Analytics
103 Generate Reports
Generate Reports
For a general description on generating and using PTA reports, see Generate a PTA
Report, page 103.
In the Reports page, you are able to generate the following PTA reports:
■ User Activities Report – This report describes the User Profile of a Vault user,
and displays their regular activities and anomalies during a specified period.
See Understanding the User Activities Report, page 105.
■ Privileged Threat Assessment Report – This report presents a thorough visual
summary of PTA analysis of privileged account activity in your organizational
environment.
See Understanding the Privileged Threat Assessment Report, page 106.
Generate a PTA Report
1. Click Reports to display the Reports page.
2. Define the report to generate and its contents:
■ Report Type – Select one of the following report types:
■ User Activities Report
■ Privileged Threat Assessment (PDF)
■ Date Range – Select the time frame to include in the report. Choose one of the
following:
■ Last 7 days
■ Last 30 days
■ Last 60 days
■ Customize – Choose this option to display the Select Date Range window,
which enables you to select a date range.
■ User – Specify the username of the Vault user. PTA provides suggestions as
you type into the field. This is only relevant to the User Activities Report.
The following diagram displays the definitions for the User Activities Report:
Privileged Threat Analytics
PTA Implementation Guide 104
The following diagram displays the definitions for the Privileged Threat
Assessment Report:
3. Click Generate to generate the report for the selected time period.
Privileged Threat Analytics
105 Generate Reports
Understanding the User Activities Report
The User Activities Report displays the user’s normal behavior by anomaly type, and
shows all events that occurred in the given time frame in a table.
The User Activities Report includes the following sections:
■ Profile summary – Displays the user’s normal behavior by profile type:
■ Working hours
■ Access rate (8 hours)
■ Source IP
Note:
If the user has a default profile, “default” is displayed. If no profile exists for this user,
“N/A” is displayed.
■ Events table – Displays all events that occurred for this user in the given time
frame. The table includes the following fields:
■ Serial number – The anomaly’s serial number in the table.
■ ID – The anomaly’s ID in the PTA database.
■ Score – The risk index of the event.
■ Target user – The target user affected by the event.
■ Target address – The target address of the machineaffected by the event.
■ Source address – The source address of the machine on which the event
occurred.
■ Event type - The type of event that occurred.
■ Detection time - The time when the event was detected.
Privileged Threat Analytics
PTA Implementation Guide 106
Understanding the Privileged Threat Assessment Report
The Privileged Threat Assessment Report presents a thorough visual summary of PTA
analysis of privileged account activity in your organizational environment.
After generating the Privileged Threat Assessment Report, it is automatically
downloaded to your local machine.
Before the report presents the activity analysis, it gives an at-a-glance view of the level of
risk to which your organization is exposed.
This section of the report presents the following details:
■ Overall risk level – A system score that reflects the current overall risk index. This
score uses the following values:
Risk index System score
Low 0 – 70
Medium 70 – 90
High 90 – 100
Note:
Time range selection does not impact the value of this field.
■ Total number of security incidents – A security incident is an event or series of
events that indicates a security risk. This metric displays the number of incidents
detected during the selected date range that pose a potential security risk. This
number includes all types of incidents – Unread, Active and Closed.
■ Average incident score – The average score of all the incidents in this report. The
score range is 1–100.
■ Total security events – A security event is an observable occurrence of suspicious
or malicious behavior. This metric displays the total number of security events
indicating abnormal user behavior that occurred during the date range for this report.
The Privileged Threat Assessment Report analyzes the following privileged account
activity:
■ Top Accounts with Unusual Behavior, page 108
■ Top Machines with Unusual Behavior, page 109
■ Top Accounts not Managed by CyberArk, page 110
Privileged Threat Analytics
107 Generate Reports
■ Top Accounts Suspected of Credentials Theft, page 111
■ Top Scored Incidents, page 112
Privileged Threat Analytics
PTA Implementation Guide 108
Top Accounts with Unusual Behavior
A list of accounts that have the most detected incidents. Review these accounts to make
sure they do not pose a potential security threat.
This list displays the following information:
Column Description
User The name of the user who used the account.
Target The machine the user used to log on and/or to retrieve the
password.
Account type The type of account. Possible values are:
■ OS: Unix/Windows/”N/A”
■ DB: Oracle
■ Domain
Number of The number of incidents that the user or account was involved in.
incidents
Average score The average risk score for each incident.
Last observed The date and time of the last incident.
Privileged Threat Analytics
109 Generate Reports
Top Machines with Unusual Behavior
A list of machines that have the most detected incidents. Review these machines to make
sure they do not pose a potential security threat.
This list displays the following information:
Column Description
Name The fully qualified domain name (FQDN) of the machine where the
incident took place.
Number of The number of incidents that the user or account was involved in.
incidents
Average score The average risk score for each incident.
Last observed The date and time of the last incident.
Privileged Threat Analytics
PTA Implementation Guide 110
Top Accounts not Managed by CyberArk
A list of the most used privileged accounts that are not currently managed by CyberArk
and could pose a potentially high security threat.
This list displays the following information:
Column Description
Name The name of the user who used the account.
Target The fully qualified domain name (FQDN) of the machine where the user
logged on and/or retrieved the password.
Account type The type of account. Possible values are:
■ OS: Unix/Windows/”N/A”
■ DB: Oracle
Times The number of times that the account was involved in security events.
observed
Last observed The date and time of the last security event.
Privileged Threat Analytics
111 Generate Reports
Top Accounts Suspected of Credentials Theft
A list of accounts that are managed by CyberArk, but access to the accounts is not
properly going through the CyberArk Vault. This type of account usage indicates misuse
of privileged accounts and suspected credential theft.
This list displays the following information:
Column Description
User The name of the user who used the account.
Target The fully qualified domain name (FQDN) of the
machine where the user logged on and/or retrieved
the password.
Account type The type of account. Possible values are:
■ OS: Unix/Windows/”N/A”
■ DB: Oracle
■ Domain
Times The number of times that the account was involved
observed in security events.
Last observed The date and time of the last incident.
Privileged Threat Analytics
PTA Implementation Guide 112
Top Scored Incidents
A list of the most severe incidents, with a breakdown of their security events. This list
provides informative details for forensic investigation of potential threats.
This list displays the following information:
Column Description
Index The sequence of listed incidents, from the most severe to the least
severe.
ID The ID of the incident, allocated by PTA.
Score The risk score for each incident.
Type The type of incident.
User The type of user who used the account during each incident. Possible
values are:
■ Vault user
■ User name
Privileged Threat Analytics
113 Generate Reports
Column Description
■ None
Affected asset The name of the asset that was affected by each incident. Possible
values are:
■ Target machine
■ Database
■ Source IP
■ Source machine
■ None
Detection time The date and time when each incident was detected.
Description A detailed description of each incident.
Privileged Threat Analytics
114
Manage PTA
This section describes how to manage PTA.
In this section:
Manage your License
Run the PTA Management Utility
Logging
Reset PTA to Clear All Data
Monitor PTA
Collect Data from PTA
Import PTA to a New Machine
Privileged Threat Analytics
PTA Implementation Guide 115
Manage your License
The PTA license settings enable you to do the following:
■ View license usage in your organization
■ Upload a license
■ Update an expired license
■ Specify targets and Domain Controllers that PTA will monitor or disregard
See the following:
View your License Settings
View License Usage
Upload a License
Updating an Expired License File
Use the Inclusion and Exclusion Lists
View your License Settings
1. In the Dashboard, click the Settings tab.
2. In the left pane, click Administration > License.
Privileged Threat Analytics
116 Manage your License
View License Usage
The License Usage area displays the number of monitored targets and Domain
Controllers in your organization that is being monitored by PTA, compared to the number
of targets and Domain Controllers allowed under the terms of your license.
When the number of monitored targets and Domain Controllers exceeds your license
limits, a red exclamation mark appears and the number of monitored targets and Domain
Controllers is displayed along with its percentage of the total number of targets and
Domain Controllers allowed under your license terms. For information about expanding
your license, contact your CyberArk support representative.
Upload a License
To upgrade or renew your license, upload a valid license file as follows:
1. Click Uploading License to display the license upload area.
2. Click Browse and select the license file.
3. Click Upload to upload the file.
Privileged Threat Analytics
PTA Implementation Guide 117
When the license file is uploaded successfully, the PTA dashboard is displayed.
Updating an Expired License File
When an existing license has expired, the License Required page is displayed.
Upload the license file provided by your CyberArk support representative as follows:
■ Click Browse and select the license file, then click Upload to upload the file. When
the license file is uploaded successfully, the PTA dashboard is displayed.
Use the Inclusion and Exclusion Lists
The Inclusion and Exclusion Lists enable you to specify which targets and Domain
Controllers you want PTA to monitor, and which targets and Domain Controllers you
want it to disregard. This allows you to focus PTA monitoring on the most relevant targets
and Domain Controllers in your organization, while passing over less significant ones.
Excluded targets and Domain Controllers will not be counted under the terms of your
license.
Privileged Threat Analytics
118 Manage your License
■ In the Inclusion List, specify the targets and Domain Controllers that PTA will be
monitoring. For example, to monitor all the production machines in your
organization, add them to this list. If no targets and Domain Controllers are specified
in the Inclusion List, PTA will assume that all targets and Domain Controllers in your
organization must be monitored.
■ In the Exclusion List, specify the targets and Domain Controllers that you want
PTA to disregard. For example, to exclude all machines that are used for testing or
debugging, add them to this list. If no targets and Domain Controllers are specified in
this list, PTA will assume that no machine must be excluded.
The targets and Domain Controllers you specify in the Exclusion List will be subtracted
from the targets and Domain Controllers you specified in the Inclusion List to form the
group of targets and Domain Controllers that PTA will monitor. If a particular target or
Domain Controller exists in both the Inclusion and the Exclusion List, the target or
Domain Controller will be excluded from PTA monitoring.
Targets and Domain Controllers can be added to the lists in the following formats:
■ IP/CIDR
■ Policy ID
To Add an Entry to the Inclusion or Exclusion List:
1. In the Settings page, display the relevant list.
2. Add one or more targets and Domain Controllers to the list in the supported formats.
For example:
■ IP – 10.10.0.1
Privileged Threat Analytics
PTA Implementation Guide 119
■ Policy ID – Unix_test
To Remove an Entry from the Inclusion or Exclusion List:
■ In the specific target or Domain Controller row, click the delete icon; the target or
Domain Controller is removed from the list.
Privileged Threat Analytics
120 Run the PTA Management Utility
Run the PTA Management Utility
The PTA utility enables you to manage PTA. It is used for the following purposes:
■ Uploading data to the database
■ Creating the baselines for different algorithms
■ Administrating the application
To Run the PTA Management Utility:
1. On the system console, log in as the ptauser user using the password you specified
during installation.
2. Start the PTA utility by running the following command:
sudo /opt/tomcat/utility/run.sh
The menu options, as described in the table below, appear.
Option Description
1. Create baseline for 'Privileged Creates a baseline for the ‘Privileged access
access during irregular hours' during irregular hours’ algorithm from the Vault
algorithm log data.
2. Create baseline for 'Excessive Creates a baseline for the ‘Excessive access to
access to privileged accounts' privileged accounts’ algorithm from the Vault log
algorithm data.
3. Stop application processes Stops PTA.
4. Start application processes Starts PTA.
5. Stop Tomcat Web Server Stops the PTA Web Server.
6. Start Tomcat Web Server Starts the PTA Web Server.
7. Show application processes status Enables you to monitor PTA services.
8. Enter exchange user Enables you to specify credentials for the
Exchange user who will send incident
notifications.
9. Export external data Exports data from the PTA system.
10. Clear analysis data Deletes all the analysis data from the database.
11. Clear database Clears all the data from the database.
12. Create baseline for 'Accessing the Creates a baseline for the 'Accessing the Vault
Vault from irregular IP' algorithm from irregular IP' algorithm from the Vault log
data.
13. Delete all events, incidents and Clears all the data of events’ incidents and
profiles profiles from the database
14. Generating a Certificate Signing Generates a Certificate Signing Request (CSR)
Privileged Threat Analytics
PTA Implementation Guide 121
Option Description
Request (CSR)
Note:
The CSR requires a Base-64
encoded X.509 SSL certificate
15. Installing SSL Certificate Chain Installs an SSL Certificate Chain
(Root, Intermediate(s), PTA Server
certificates)
Note:
The SSL Certificate Chain requires
a Base-64 encoded X.509 SSL
certificate
16. Installing SSL Client Certificate Installs an SSL Client Certificate Issuer Chain
Issuer Chain (Root, Intermediate(s))
Note:
The SSL Certificate Issuer Chain
requires a Base-64 encoded X.509
SSL certificate
17. Exit Exits the PTA utility.
3. Select the relevant option and then click Enter.
4. In the /opt/tomcat/utility/logs/ directory, open the diamond-utility.log file and
verify that no errors have occurred.
Other PTA Utilities
PTA provides other utilities that can assist you when managing the system.
To run these utilities, at the command line, in the /opt/tomcat/utility/ folder, run the
specific command:
Note:
The ChangeLogLevel.sh, changeComponentResource.sh, and shortcuts.sh utilities are
found in the /opt/pta/utility/ folder.
Utility Name of log file
authorizedSourceHostsConfiguration.sh Configure authorized hosts
See Configure PTA for Authorized Hosts ,
page 31
crossDomainConfiguration.sh Configure cross-domain mapping in a multi-
domains environment
dataAndTimezoneConfiguration.sh Configure the date and time zone
domainsUtil.sh View the Domain Controller List and manage
the Cache
Privileged Threat Analytics
122 Run the PTA Management Utility
Utility Name of log file
See Domain Controllers – View the List and
Manage the Cache, page 46
emailConfiguration.sh Configure email notifications
exportTool.sh Collect data from PTA
See Collect Data from PTA , page 128
exportObscurelyTool.sh Collect and encrypt data from PTA
goldenTicketConfiguration.sh Add domain coverage for Golden Ticket
Detection
See the Add PTA Network Sensor Coverage
or a PTA Windows Agent connection with
Golden Ticket Detection section in the
PTA Installation Guide
identifyDuplicateDNSUtil.sh Identify if there is a DNS issue
networkConfiguration.sh Specify the network configuration
networkSensorConfiguration.sh Add Network Sensor coverage
See the Add PTA Network Sensor Coverage
or a PTA Windows Agent connection section
in the PTA Installation Guide
objectCountUtil.sh Count how many objects exist for a specified
period
reloadVaultData.sh Reload data from the Vault
resetPtaAdminPass.sh Initiate a password reset process
See Reset your Password, page 83
vaultConfiguration.sh Configure the Vault connection
ChangeLogLevel.sh For each component, set the target log level
retrieved as info, debug, or trace. Info is the
default level for each component log
Note:
By default, every change restarts
the affected component. To
disable the restart, add -norestart .
shortcuts.sh Easily use PTA common commands
See Shortcuts for Common Commands, page
41
migrate_centos6_to_centos7.sh Migrate data from CentOS 6 to CentOS 7
See the Migrate to CentOS 7 - PTA Version
3.6 section in the PTA Installation Guide for
details
Privileged Threat Analytics
PTA Implementation Guide 123
Utility Name of log file
import_PTA_data.sh Import PTA data, configuration and settings
from the existing PTA machine to a new
machine
See Import PTA to a New Machine, page 129
Logging
Logging enables you to track all the activities carried out by PTA or by PTA Windows
Agent and to identify problems, if they occur.
PTA Logging
The log files that are created by the system are stored on the PTA machine in the
locations specified below. It is not recommended to change the locations of these files.
For your convenience, you can use the changeLogLevel.sh utility instead of manually
changing the log level in the system .
For Name of log file Default location
PTA installation and configuration prepwiz.log /opt/tomcat/prepwiz/logs
PTA utility diamond-utility.log /opt/tomcat/utility/logs
PTA system diamond.log /opt/tomcat/logs
PTA statistics statistics.log /opt/tomcat/statistics/logs
PTA upgrade log_upgrade.log /opt/tomcat/logs
The debug level determines the types of messages that are included in the log files. The
default debug level is info. To see all activities, change the debug level to trace.
Note:
To view statistics that are generated in the diamond.log, see View Statistics in the
diamond.log, page 36.
To use the changeLogLevel.sh utility:
1. Log in as the root user and run the changeLogLevel.sh utility using the following
format:
changeLogLevel.sh -c <component id> [-l <debug level>] [<-
norestart>]
2. Value the <component id> based on the Applications you want to change:
■ 1 - Listener
■ 2 - Sampler
■ 3 - Background
■ 4 - DiamondWebApp
Privileged Threat Analytics
124 Logging
■ 5 - Services
■ 6 - statistics
■ 7 - prepwiz
■ 8 - dcaserver
■ 9 - agentshell
■ all - all Applications
3. Set the new <debug level>:
■ info
■ debug
■ trace
For example:
Example 1:
Change all components to "info":
changeLogLevel.sh -c all
Example 2:
Change Listener and Sampler components to "debug":
changeLogLevel.sh -c 12 -l debug
Example 3:
Change all components to "trace" without restarting:
changeLogLevel.sh -c all -l trace -norestart
To Manually Change the Debug Level for each Application:
1. Open the following files using vi editor:
■ DiamondWebApp application:
/opt/-tomcat/webapps/DiamondWebApp/WEB-INF/classes/log4j2.xml
■ Listener application:
/opt/tomcat/listener/log4j2.xml
■ Sampler application:
/opt/sampler/log4j2.xml
■ CasosServices application:
/opt/tomcat/CasosServices/logconf.log4cxx
■ Background scheduler:
/opt/backgroundScheduler/log4j2.xml
■ Statistics:
/opt/tomcat/statistics/log4j2.xml
2. In each of the above files, in the order listed above, change info to trace:
Privileged Threat Analytics
PTA Implementation Guide 125
Example 1:
Change:
<priority value ="info" />
to:
<priority value ="trace" />
Example2:
Change:
<Logger name="com.cyberark.diamond" level="info">
to:
<Logger name="com.cyberark.diamond" level="trace">
3. Restart the PTA main service using the following command:
service appmgr restart
PTA Windows Agent Logging
The log files that are created by the system are stored on the PTA Windows Agent
machine in %PROGRAMDATA%\CyberArk\PTA Agent, or in the location you selected
when installing the PTA Windows Agent.
Default
Appender
For Name of log file Debug
Name
Level
General debug log pta_agent.log debug_ Info
Appender
Write syslog forwarder pta_agent_ forwarder_ Info
events if debug is enabled windows_ debug_
events.log Appender
Debugging Kerberos parsing pta_agent_krb.log krb_debug_ Info
process Appender
Debugging the LDAP parsing pta_agent_ ldap_debug_ Info
process ldap.log Appender
Write network agent events if pta_agent_ events_debug_ Info
debug is enabled network_ Appender
events.log
The debug level determines the types of messages that are included in the log files. To
see all activities, change the debug level to trace.
To Change the Debug Level for each Log:
1. Edit C:\Program Files\CyberArk\PTA Agent\aggregator_win.log4cxx.
2. Find the log that you want to modify.
3. Change the priority value to info, debug, or trace.
Privileged Threat Analytics
126 Reset PTA to Clear All Data
Example 1:
<category name="DEBUG" >
<priority value ="info" />
<appender-ref ref="debug_Appender"/>
</category>
Example2:
<category name="KRB_DEBUG" >
<priority value ="info" />
<appender-ref ref="krb_debug_Appender"/>
</category>
Example3:
<category name="LDAP_DBG" >
<priority value ="info" />
<appender-ref ref="ldap_debug_Appender"/>
</category>
Example4:
<category name="EVENT_DEBUG" >
<priority value ="info" />
<appender-ref ref="events_debug_Appender"/>
</category>
Example5:
<category name="FORWARDER_DEBUG" >
<priority value ="info" />
<appender-ref ref="forwarder_debug_Appender"/>
</category>
File Size and Rolling
Log files record all the activities carried out by PTA. By default, when a diamond.log log
file reaches 100MB, a new log file is created and the previous one is compressed and
saved in the /opt/tomcat/logs/archive/ directory as a .gz file. Log files are stored in a cycle
of 500 files, meaning that when a new log file is created, the current date and a number
between one and 500 is added to the name of the file incrementally. For example:
diamond-mm-dd-yyyy-1.log.gz). When the 501st log file is created, it replaces the first log
file, and so on.
Reset PTA to Clear All Data
You can reset PTA to clear all data gathered by the system, including baseline
information, events, incidents and audits. For example, you can delete all POC-related
data prior to production deployment.
Privileged Threat Analytics
PTA Implementation Guide 127
To Reset PTA to Clear All Data:
1. On the system console, log in as the ptauser user using the password you specified
during installation.
2. Initialize PTA by running the following command:
sudo /opt/tomcat/utility/run.sh
3. Using the PTA utility, do the following:
a. Clear all the data from the database. Select 11 - Clear database.
b. Stop the Tomcat Web Server. Select 5 - Stop Tomcat Web Server.
c. Start the Tomcat Web Server. Select 6 - Start Tomcat Web Server.
Monitor PTA
You can monitor the PTA Server machine using Simple Network Management Protocol
(SNMP).
You can monitor the following processes:
■ activemq.service
■ mongod.service
■ monit.service
■ tomcat.service
■ loggersocket
■ ptalistenerd
■ ptasamplerd
■ ptabschedulerd
■ ptastatisticsd
■ ptaservicesd
■ ptadcaserverd (only if PTA Windows Agent is configured)
■ ptacasosservicesd (only if Golden Ticket Detection is configured)
To allow the monitoring agent to communicate, you must create a custom firewall.
To create a custom firewall
1. Stop the PTA Application to revert to the static firewall settings.
systemctl stop appmgr
2. Add the requested SNMP rule manually.
Example1: Allow outgoing rule of port 1234 to IP 10.10.1.1
iptables -I OUTPUT 1 -p tcp -d 10.10.1.1 --dport 1234 -j ACCEPT
-m comment --comment 'Allow SNMP Outgoing connection'
Example 2: Allow incoming rule from IP 10.10.2.2 to port 1235
iptables -I INPUT 1 -p tcp -s 10.10.2.2 --dport 1235 -j ACCEPT -
m comment --comment 'Allow SNMP Incoming connection'
Privileged Threat Analytics
128 Collect Data from PTA
3. Save the static firewall settings.
iptables save
4. Start the PTA Application.
systemctl start appmgr
5. Verify that the port and connection are open, reboot the machine, and test the
firewall.
Note:
We recommend adding the most specific firewall rule possible.
Collect Data from PTA
The PTA export utility enables you to collect data gathered by PTA, including baseline
information, events, incidents, audits and PTA log files. This utility stores all the collected
data in a compressed .tar file in the /opt/tomcat/logs directory.
To Collect Data from PTA:
1. On the system console, log in as the ptauser user using the password you specified
during installation.
2. Initialize the PTA export tool by running the following command:
sudo /opt/tomcat/utility/exportTool.sh
The following prompt appears:
[Step 1/1 - Threat Center export utility]
The number of previous days for which to include records (leave
empty to include all records):
3. Press Enter to collect all records and logs files, or specify the number of days for
which to include records and log files.
The following prompt appears:
Would you like to export db files? (Type 'y' or 'n'):
4. Enter Y to also export databases, or N to not export the databases.
The following prompt appears:
Would you like to export dump files? (Type 'y' or 'n'):
5. Enter Y to also export dump files, or N to not export the dump files.
The data is collected by the PTA export utility, then a confirmation message is
displayed.
Privileged Threat Analytics
PTA Implementation Guide 129
Import PTA to a New Machine
Use the following procedure to import your existing PTA data, settings, configurations
and logs to a new PTA machine. The existing PTA machine will then no longer be used.
Note:
Both machines must have the same PTA version.
The migration script runs in the background. The script can run for up to a few hours. Refer to the
import PTA log (/tmp/import_PTA_data.log) for details on the progress of the script. Important
messages are also written to the screen.
To import PTA to a new machine:
1. Save a snapshot of the PTA image on the new PTA machine.
2. Log in to PTA as the root user.
3. Navigate to the utility directory using the UTILITYDIR command and run the
following command:
./import_PTA_data.sh
The migration script begins. The script can run for up to a few hours.
Before running the migration, save a snapshot of the PTA image
on the new PTA machine.
While the migration script runs in the background, the
existing PTA machine will be down and you will not receive any
data.
After the migration process ends successfully, all PTA data will
be contained on the new PTA machine.
4. Provide the details of the existing PTA machine.
Note:
The new PTA instance must have the same PTA image as the existing PTA machine. If
the script cannot connect to the existing PTA machine after three attempts, contact your
administrator.
Provide the details of the existing PTA machine.
Enter the existing PTA machine IP:
Enter the existing PTA machine root user password:
5. The tool opens SSH port 22 on the new PTA machine to migrate the data from the
existing PTA machine.
Opening port 22 on the new PTA machine for SSH communication
with the existing (<IP>) PTA machine.
6. The migration script stops the PTA Server on the existing PTA machine.
The PTA Server will be stopped on the existing PTA machine
(<IP>) - Press Enter to continue.
Redirecting to /bin/systemctl stop appmgr.service
Privileged Threat Analytics
130 Import PTA to a New Machine
7. If there is no NTP server configuration on the existing PTA machine, the following
prompt appears.
Note:
If there is an NTP server configuration on the existing PTA machine, the migration script
copies the NTP server configuration to the new PTA machine.
Would you like to provide the time synchronization details
(y/n)?
8. If you entered y, the following prompt appears.
Note:
If you entered n , the migration script copies the date and time from the existing
PTA machine to the new PTA machine.
Specify your time zone (example: America/Chicago). For a full
time zone list, specify ‘help’.
Time zone:
a. Enter the time zone, then press Enter. The date and time prompt appears.
Specify current date and time in 24h format “MM/DD/YYYY
hh:mm” (example: 11/21/2013 16:20):
b. Enter the current date and time using the format included in the prompt, then
press Enter. The following prompt appears, enabling you to synchronize the time
zone you are setting, with your NTP server.
Do you want to synchronize with NTP server (y/n)? [n]
c. If you specified y, the NTP server IP prompt appears:
Specify the NTP server IP:
d. Enter the IP address of the NTP server, then press Enter.
The date and time zone are now configured and the following confirmation is
displayed, and the installation proceeds to the next step.
Date and time zone configuration finished successfully
9. The migration process begins.
The migration script is running in the background. Refer to the
migration log (/tmp/import_PTA_data.log) for details on the
progress of the script.
Start migrating data...
Copying the configuration files...
Copying the PTA logs...
Copying the database files...
Privileged Threat Analytics
PTA Implementation Guide 131
10.If any error messages appear, navigate to the log and resolve the issue. When you
open the log, address the error by searching for the version number and the task in
which the error occurred.
Note:
If the data migration process does not complete successfully, revert the new PTA
machine using the snapshot that was saved in Step 1 and rerun the migration script.
11.The data migration process is now complete and the following confirmation is
displayed:
Data migration completed successfully.
12.The existing PTA machine is shut down and the PTA Server is started on the new
PTA machine.
a. If the IP of the existing PTA machine is configured as static, the migration script
shuts down the existing PTA machine, sets the new PTA machine with the
existing IP, and starts PTA on the new machine.
Changing machine IP...
Shutting down the existing PTA machine.
Restarting network service...If you are using a terminal,
connect to the new IP - <IP> - where PTA <IP> is up and
running.
Starting PTA service on the new machine...
The migration process completed successfully. PTA is up and
running.
Install VMWare Tools on the new machine.
b. If the IP of the existing PTA machine is configured using DHCP, perform the
following:
The IP address of the existing PTA machine is configured
using DHCP. Perform the following:
1. Save the IP address for later reference.
2. Shut down the existing PTA machine.
3. Assign the saved IP address to the new PTA machine in the
DHCP server configuration. You might need your IT team's
assistance.
4. Start the PTA Server on the new machine.
5. Install VMWare Tools on the new machine.
Privileged Threat Analytics
132
Appendices
This section contains the following appendices:
Configure System Properties, page 133
Configure Agent Properties, page 154
Time Zones, page 158
Privileged Threat Analytics
PTA Implementation Guide 133
Configure System Properties
The systemparm.properties file configures PTA. The default properties file is stored in
the /opt/tomcat/diamond-resources/default directory. This file contains all the
available properties with their default values, if they exist. This file cannot be edited.
The properties file that can be edited is stored in the /opt/tomcat/diamond-
resources/local directory.
To Change Default Property Values:
1. In the /opt/tomcat/diamond-resources/default directory, open the
systemparm.properties file.
2. Copy the relevant property parameter, then close the file.
3. In the /opt/tomcat/diamond-resources/local directory, open the
systemparm.properties file.
4. Paste the copied property parameter and specify its value.
5. Save the file and close it.
6. Run the service appmgr restart command to restart PTA.
The tables below list all the parameters of the systemparm.properties file, with a brief
explanation. You can copy any parameters you require when configuring the properties
file.
Note:
All parameters must be specified without spaces.
systemparm.properties
Section: Data Loading
date_format
Description Date format of the organization. For example, for US users the
format is MM/dd/yyyy.
Acceptable Values MM/dd/yyyy, dd/MM/yyyy
Default Value MM/dd/yyyy
vault_log_records_csv
Description The full pathname of the loglist.csv report generated by the
ExportVaultData utility.
Acceptable Values Full pathname. For example, /tmp/loglist.csv.
Default Value None
pvwa_privileged_accounts_report_csv
Privileged Threat Analytics
134 Configure System Properties
Section: Data Loading
Description The full pathname of the PVWA Inventory Report .csv file.
Acceptable Values Full pathname
Default Value None
Section: LDAP
ldap_connection_protocol
Description The protocol to use for the LDAP connection.
Acceptable Values Valid protocol
Default Value None
ldap_base
Description The LDAP base context.
Acceptable Values String
Default Value None
ldap_port
Description The port of the LDAP server.
Acceptable Values Number between 1024 and 65535
Default Value None
ldap_server
Description The IP of the LDAP server to integrate with.
Acceptable Values IP
Default Value None
ldap_domain
Description The name of the domain where the LDAP server resides.
Acceptable Values String
Default Value None
ldap_group_name
Description The name of the LDAP PTA group.
Acceptable Values String
Default Value PTA_GROUP
ldap_pre2000
Description The netbios (Pre2000) name of the domain.
Acceptable Values String
Privileged Threat Analytics
PTA Implementation Guide 135
Section: LDAP
Default Value None
Section: Syslog
syslog_outbound
Description Outbound configuration that enables PTA to integrate with your SIEM.
Acceptable A list of the following information: {siem, format, host, port, protocol}
Values Acceptable values are:
■ siem – HP ArcSight, McAfee, QRadar, RSA, Splunk
■ format – CEF or LEEF
■ host - Host/IP
■ port – number
■ protocol - UDP
Default None
Value
syslog_port_tcp
Description The port used for incoming syslog records sent from the Vault machine and
Unix machines on the TCP port.
Acceptable Number between 1 and 65535. The number must represent an unused port.
Values
Default 514
Value
syslog_port_udp
Description The port used for incoming syslog records sent from the Vault machine and
Unix machines on the UDP port.
Acceptable Number between 1 and 65535. The number must represent an unused port.
Values
Default 514
Value
vault_timezone
Description The timezone configured in the Vault.
Acceptable NA
Values
Default The PTA machine timezone.
Value
syslog_non_human_filter
Description List of non-human usernames whose syslog messages PTA will ignore.
Acceptable Vault users
Privileged Threat Analytics
136 Configure System Properties
Section: Syslog
Values
Default passwordmanager,prov_,pvwaappuser,psmapp
Value
syslog_port_ssl_data_tcp
Description The port used to receive syslog data in a secure channel.
Acceptable Number between 1 and 65535. The number must represent an unused port.
Values
Default 6514
Value
syslog_port_ssl_control_tcp
Description The port used to receive statistics data in a secure channel.
Acceptable Number between 1 and 65535. The number must represent an unused port.
Values
Default 7514
Value
send_pta_events_to_pas_enabled
Description Enable or disable the option to send PTA events to the Vault.
Acceptable true/false
Values
Default true
Value
Section: Syslog
Sub-section: Syslog
custom_vault_device_types
Description Device Types from PVWA that PTA monitors. The value is case
sensitive.
Acceptable String
Values
Default Value None
Section: Syslog
Sub-section: Syslog format legacy
syslog_format_regex_legacy
Description A regular expression that defines the legacy syslog format.
Acceptable Regular expression
Privileged Threat Analytics
PTA Implementation Guide 137
Section: Syslog
Sub-section: Syslog format legacy
Values
Default (<\\d+>)?([\\d\\.]+)?\\s*([a-zA-Z]+\\s+\\d{1,2}\\s+\\d{1,2}:\\d{1,2}:\\d
Value {1,2})\\s+([^\\s]+)\\s+(.*)
syslog_field_index_date_legacy
Description The index that corresponds to the date field defined in the syslog_format_
regex_legacy property.
Acceptable Number greater than zero
Values
Default 3
Value
syslog_field_index_machine_legacy
Description The index that corresponds to the machine field defined in the syslog_
format_regex_legacy property.
Acceptable Number greater than zero
Values
Default 4
Value
syslog_field_index_body_legacy
Description The index that corresponds to the body field defined in the syslog_format_
regex_legacy property.
Acceptable Number greater than zero
Values
Default 5
Value
Section: Syslog
Sub-section: Syslog format 5424
syslog_format_regex_5424
Description A regular expression that defines the syslog format 5424.
Acceptable Regular expression
Values
Default <(\\d+)>([\\d\\.]+)\\s+(\\d{4}-\\d{2}-\\d{1,2}T\\d{1,2}:\\d{1,2}:\\d{1,2}Z)\\s+
Value ([^\\s]+)\\s+(.*)
syslog_field_index_date_5424
Description The index that corresponds to the date field defined in the syslog_format_
regex_5424 property.
Privileged Threat Analytics
138 Configure System Properties
Section: Syslog
Sub-section: Syslog format 5424
Acceptable Number greater than zero
Values
Default 3
Value
syslog_field_index_machine_5424
Description The index that corresponds to the machine field defined in the syslog_
format_regex_5424 property.
Acceptable Number greater than zero
Values
Default 4
Value
syslog_field_index_body_5424
Description The index that corresponds to the body field defined in the syslog_format_
regex_5424 property.
Acceptable Number greater than zero
Values
Default 5
Value
Section: Syslog
Sub-section: Audit creator for vault retrieve password
audit_creator_body_regex_vault_retrieve_password
Description A regular expression that defines the data format in a syslog string that the
audit creator detects.
Acceptable Regular expression
Values
Default \\s*\\|\\s*([^\\s\\|]+)\\s*\\|\\s*([^\\|]*)\\s*\\|\\s*(Retrieve password|Use
Value Password)\\s*\\|\\s*([^\\s\\|]*)\\s*\\|\\s*([^\\s\\|]*)\\s*\\|(.*)
body_field_index_vault_retrieve_password_user
Description The index that corresponds to the user who retrieved the password from the
Vault in the audit_creator_body_regex_vault_retrieve_password property.
Acceptable Number greater than zero
Values
Default 1
Value
body_field_index_vault_retrieve_password_date
Description The index that corresponds to the date when the password was retrieved
Privileged Threat Analytics
PTA Implementation Guide 139
Section: Syslog
Sub-section: Audit creator for vault retrieve password
from the Vault in the audit_creator_body_regex_vault_retrieve_ password
property.
Acceptable Number greater than zero
Values
Default 2
Value
body_field_index_vault_retrieve_password_account_user
Description The index that corresponds to the user specified in the account that was
retrieved from the Vault in the audit_creator_body_regex_vault_retrieve_
password property.
Acceptable Number greater than zero
Values
Default 4
Value
body_field_index_vault_retrieve_password_account_address
Description The index that corresponds to the address specified in the account that was
retrieved from the Vault in the audit_creator_body_regex_vault_retrieve_
password property.
Acceptable Number greater than zero
Values
Default 5
Value
Section: Syslog
Sub-section: Audit creator for unix session opened
audit_creator_body_regex_unix_session_opened
Description A regular expression that defines the data format in a syslog string that
the audit creator detects.
Acceptable Regular expression
Values
Default Value \\s*[a-zA-Z0-9\\[\\]]+:\\s+pam_unix\\((.+):session\\):\\s*session opened
for user\\s+(\\S+) by.*
body_field_index_unix_session_opened_user
Description The index of the user who opened the unix session in the audit_creator_
body_regex_unix_session_opened property.
Acceptable Number greater than zero
Values
Privileged Threat Analytics
140 Configure System Properties
Section: Syslog
Sub-section: Audit creator for unix session opened
Default Value 2
body_field_index_unix_session_opened_session_type
Description The index of the type of session that was opened in the audit_creator_
body_regex_unix_session_opened property.
Acceptable Number greater than zero
Values
Default Value 1
Section: Syslog
Sub-section: Audit creator for CEF
audit_creator_body_regex_cef
Description A regular expression that defines the data format in a syslog string that the
audit creator detects.
Acceptable Regular expression
Values
Default CEF:(?<cefVersion>\\d+)\\|(?<vendor>(?:[^\\\\\\|]|\\\\.)*+)\\|(?<product>(?:
Value [^\\\\\\|]|\\\\.)*+)\\|(?<version>(?:[^\\\\\\|]|\\\\.)*+)\\|(?<id>(?:[^\\\\\\|]|\\\\.)*+)\\|
(?<name>(?:[^\\\\\\|]|\\\\.)*+)\\|(?<severity>(?:[^\\\\\\|]|\\\\.)*+)\\|
(?<extension>.*)
custom_CEF_Windows_plugin_parameter
Description Custom vendor and product name for Windows logon support
Acceptable Json string
Values
Default [{\"Vendor\":\"Microsoft\",\"Product\":\"Microsoft Windows\"}]
Value
Section: Schedulers
excessive_access_task_trigger
Description The time for frequent updates of the excessive access (user) baseline.
The default is midnight of every day.
Acceptable Cron expression
Values
Default 0 0 0 * * ?
Value
irregular_ip_task_trigger
Description The time for frequent updates of the irregular IP (user) baseline. The
Privileged Threat Analytics
PTA Implementation Guide 141
Section: Schedulers
default is midnight of every day.
Acceptable Cron expression
Values
Default 0 0 0 * * ?
Value
vault_accounts_reload_task_trigger
Description The time for frequent updates of the Vault accounts reload. The default is
1:00 AM of every day.
Acceptable Cron expression
Values
Default 0 0 1 * * ?
Value
human_vault_user_cache_reload_task_trigger
Description The time for frequent updates of the Vault users reload. The default is
midnight of every day.
Acceptable Cron expression
Values
Default 0 0 0 * * ?
Value
irregular_hours_asset_task_trigger
Description The time for frequent updates of the irregular hours (machine) baseline.
The default is midnight of every day.
Acceptable Cron expression
Values
Default 0 0 0 * * ?
Value
irregular_hours_user_task_trigger
Description The time for frequent updates of the irregular hours (user) baseline. The
default is midnight of every day.
Acceptable Cron expression
Values
Default 0 0 0 * * ?
Value
audits_retention_task_trigger
Description The time for deleting raw data that has passed the retention period. The
default is 3:30 AM every day.
Acceptable Cron expression
Values
Privileged Threat Analytics
142 Configure System Properties
Section: Schedulers
Default 0 30 3 * * ?
Value
Section: Algorithms
disabled_detection_algorithms
Description The list of anomalies whose detections are disabled.
Acceptable ■ ActiveDormantUserAnomalyAlgorithm
Values ■ AggregativeIceAnomalyAlgorithm
■ BaseICEAnomalyAlgorithm
■ ExcessiveAccessAnomalyAlgorithm
■ ExcessiveAccessAssetAnomalyAlgorithm
■ ExcessiveAccessUserAnomalyAlgorithm
■ GoldenTicketAnomalyAlgorithm
■ InteractiveLogonWithServiceAccountAnomalyAlgorithm
■ IrregularHoursAssetAnomalyAlgorithm
■ IrregularHoursUserAnomalyAlgorithm
■ LogonIrrSourceMachineToTgtMachineByTgtAccAnomalyAlgorithm
■ LogonIrrTgtAccFromMachineAnomalyAlgorithm
■ LogonIrrTgtMachineByTgtAccAnomalyAlgorithm
■ MachineAccessViaIrregularIpAnomalyAlgorithm
■ MaliciousRetrievalOfDomainAccountsAnomalyAlgorithm
■ OverPassTheHashAnomalyAlgorithm
■ PacAsRequestAttackAnomalyAlgorithm
■ PSMRiskyCommandAnomalyAlgorithm
■ PSMVaultAnomalyAlgorithm
■ SuspectedCredentialsTheftAnomalyAlgorithm
■ UnmanagedPrivilegedAccessAnomalyAlgorithm
■ VaultAccessViaIrregularIpAnomalyAlgorithm
■ RiskySPNRisk
■ IrregularDayUserAnomaly
Default Value ExcessiveAccessAssetAnomalyAlgorithm,
LogonIrrSourceMachineToTgtMachineByTgtAccAnomalyAlgorithm,
LogonIrrTgtAccFromMachineAnomalyAlgorithm,
LogonIrrTgtMachineByTgtAccAnomalyAlgorithm,
MachineAccessViaIrregularIpAnomalyAlgorithm
Section: Algorithms
Sub-section: irregular hours
irr_hours_excluded_usernames_list
Description The list of users to be excluded from the Irregular Hours baseline
Privileged Threat Analytics
PTA Implementation Guide 143
Section: Algorithms
Sub-section: irregular hours
calculation. Multiple names must be separated by commas.
Acceptable Vault users
Values
Default None
Value
irr_hours_baseline_range_start
Description The starting-point of training data (vault_log) in the range, for baseline
calculation.
Acceptable 0.0-1 (where 1 is 100%)
Values
Default 0
Value
irr_hours_baseline_range_end
Description The endpoint of training data (vault_log) in the range, for baseline
calculation.
Acceptable 0.0-1 (where 1 is 100%)
Values
Default 1
Value
irr_hours_baseline_debug
Description Determines how the baseline is created.
Note:
This parameter is for internal debugging purposes.
Acceptable true/false
Values
Default false
Value
Section: Algorithms
Sub-section: DC Replication
dc_replication_whitelist
Description The list of machines which are allowed to execute DC replication
operations. Multiple names must be separated by commas.
Acceptable Fully-qualified machine names, IPs
Values
Privileged Threat Analytics
144 Configure System Properties
Section: Algorithms
Sub-section: DC Replication
Default None
Value
Section: Algorithms
Sub-section: Unmanaged privileged access
privileged_users_list
Description A list of users considered privileged in the organization, and who should be
managed by CyberArk’s Privileged Account Security solution.
Acceptable A list of the following information: {platform, case sensitivity of user, regular
Values expression}
Acceptable values are:
■ Platform – WINDOWS/UNIX/ORACLE (upper case)
■ Case sensitivity – true/false
■ Regex – string
Default If this value is not defined by the user, the system will use the following
Value default value:
[{"mPlatform":"UNIX","mIsCaseSensitive":true, "mUsers" :[root]},
{"mPlatform":"WINDOWS","mIsCaseSensitive":false,"mUsers":
[.*admin.*]},{"mPlatform":"ORACLE", "mIsCaseSensitive":
false,"mUsers":[sys,system,sysman]}]
privileged_groups_list
Description A list of groups considered privileged in the organization, and whose
members should be managed by CyberArk’s Privileged Account Security
solution.
Acceptable A list of the following information: {Domain, Group_name}
Values Acceptable values are:
■ Domain
■ Group Name
Default None
Value
Unmanaged_Privileged_Access_Score
Description The unmanaged privileged access anomaly score.
Acceptable Number between 1-100
Values
Default 30
Value
Privileged Threat Analytics
PTA Implementation Guide 145
Section: Algorithms
Sub-section: vault access via irregular ip
irregular_ip_tail_proporion_exp_base
Description The base taken in the exponent of the proportion of the tail of the given IP
which was not spanned by the tree.
Specify a number greater than ‘1’.
Acceptable ■ Double
Values
Default 8.0
Value
irr_ip_excluded_usernames_list
Description A list of usernames that PTA will ignore when analyzing Vault access via
irregular IP addresses.
Acceptable ■ Vault users
Values
Default DR,BATCH,BACKUP
Value
irr_ip_excluded_sourceIP_list
Description A list of IP addresses that PTA will ignore when analyzing Vault access
via irregular IP addresses.
Acceptable IPs
Values
Default Configured PVWA IP
Value
Section: Algorithms
Sub-section: ICE - asset connection words algorithms
asset_connection_excluded_domain_account_list
Description The list of domain accounts to be excluded from the Asset
Connection baseline calculation.
Acceptable Values A list of the following information: {domain, list of users that belong
to the domain}
Acceptable values are:
■ Domain – any valid domain name (string)
■ Users – string of users name separated by comma
Default Value N/A
Privileged Threat Analytics
146 Configure System Properties
Section: Algorithms
Sub-section: Suspected credentials theft
not_via_pim_time_window
Description The number of minutes of the default check-out time period of a password.
Acceptable Number
Values
Default 480
Value
sct_excluded_account_list
Description A list of usernames that PTA will ignore when analyzing connections to
remote machines without first retrieving the required credentials from the
Vault.
Acceptable A list of the following information: {platform, Machine/domain, DB instance,
Values User}
Acceptable values are:
■ Platform – WINDOWS/UNIX/ORACLE (upper case)
■ Machine – either IP or FQDN
■ Domain – relevant only for WINDOWS platforms, when the account is
a domain account
■ DB Instance – if the Platform is ORACLE, the instance name must be
mentioned
■ User – string
All fields except Platform can be configured as a list with a ‘,’ delimiter and
support asterisks.
For example: #sct_excluded_account_list=[{"mPlatforms":
["WINDOWS"],"mUsers":["user"],"mDomains":["domain.com"]},
{"mPlatforms":["WINDOWS"],"mUsers":["localUser"],"mMachines":
["prod.domain.com"]},{"mPlatforms":["ORACLE"],"mUsers":
["localUser"],"mMachines":["prodDB.domain.com","mInstanceNames":
["MyDB"]}]
Default None
Value
Section: Algorithms
Sub-section: Suspicious Password Change
suspicious_password_change_time_window_minutes
Description The time, in minutes, PTA waits before indicating a password change
was not done by CPM and is suspicious.
Acceptable Number between 1-60
Values
Default Value 2
Privileged Threat Analytics
PTA Implementation Guide 147
Section: Algorithms
Sub-section: Suspicious Password Change
suspicious_password_change_score
Description The suspicious password change anomaly score.
Acceptable Number between 1-100
Values
Default Value 80
Section: Algorithms
Sub-section: Suspicious activities detected in a privileged session
risky_command_configuration
Descri A regular expression that defines the suspicious session activities that
ption PTA analyzes.
Accept A list of the following information: {regular expression of the command, score,
able description, category}
Values Acceptable values are:
■ Regex – string
■ Score – 1-100
■ Description (optional) – string
■ Category - Universal keystrokes, SCP, SQL, SSH, Windows titles
■ Response - NONE, TERMINATE, SUSPEND
■ Active - true/false
For example:{"regex":"kill
(.*)","score":"70","description":"description2","category":"SSH","response
":"NONE",“active”:true}]
Default A set of best practices that CyberArk recommends.
Value
Section: Algorithms
Sub-section: Risky SPN
risky_spn_excluded_account_list
Description A list of usernames, domains and service principal names that PTA will
ignore when analyzing privileged accounts that contain service principal
names.
Acceptable A list of the following information: {user, domain, service}
Values Acceptable values are:
■ User – string
■ Domain – domain name, such as domain.com
■ Service principal name – service principal name in the format of
host\service
Privileged Threat Analytics
148 Configure System Properties
Section: Algorithms
Sub-section: Risky SPN
All fields can be configured as a list with a ‘,’ delimiter, and can support
asterisks.
For example:
risky_spn_excluded_account_list=[{"mUsers":["user1"],"domain":
["domain.com"],"service":["host\service","fqdn\service"]},{"mUsers":
["sqladmin"],"domain":["domain.com"],"service":["*"]}]
Default None
Value
Section: Email
mail.smtp.host
Description The IP of the mail server in the organization.
Acceptable IP address
Values
Default None
Value
mail.smtp.port
Description The SMTP port for emails.
Acceptable 25, 587
Values
Default 25
Value
mail.smtp.auth
Description Whether the authentication method is on.
Acceptable true/false
Values
Default true
Value
mail.debug
Description Whether the debug messages of the email process appear in the log.
Acceptable true/false
Values
Default false
Value
email_from
Description The email address of the sender.
Privileged Threat Analytics
PTA Implementation Guide 149
Section: Email
Acceptable Email address in lowercase characters.
Values
Default None
Value
email_recipient
Description A list of the recipient email addresses that will receive an email when an
incident is discovered. Specify email addresses using only lowercase
characters. Multiple addresses are separated by a semi-colon (;).
Acceptable Email address; email address, ...
Values
Default None
Value
Section: DNS
dns_srv_record_format
Description The format of a DNS service record (SRV).
Acceptable Regular expression
Values
Default \\s*\\d+\\s+\\d+\\s+\\d+\\s+((?=.{1,255}$)[0-9A-Za-z](?:(?:[0-9A-Za-z]|-)
Value {0,61}[0-9A-Za-z])?(?:\\.[0-9A-Za-z](?:(?:[0-9A-Za-z]|-){0,61}[0-9A-Za-
z])?)*\\.?)\\.
dns_ldap_domain_srv_record_name_prefix
Description The prefix that identifies an SRV record for a domain.
Acceptable String
Values
Default _ldap._tcp.dc._msdcs.
Value
dns_resolving_timeout
Description The timeout period for DNS resolving, in milliseconds.
Acceptable Numbers in milliseconds
Values
Default 10000
Value
Section: Domain
domain_controllers
Privileged Threat Analytics
150 Configure System Properties
Section: Domain
Description List of domain and domain controllers.
Acceptable {"domain_name":[{"mAddress":"dc1_ip_address","mHostName":"dc1_
Values host_name"},{"mAddress":"dc2_ip_address","mHostName":"dc2_host_
address"}]}
Default None
Value
pre2000_domain_list
Description List of DNS names with their corresponding pre-Windows 2000 names.
Acceptable {"preWin2000DomainName":"fullDNSDomainName",
Values "preWin2000DomainName2":"fullDNSDomainName2"}
Default None
Value
epv_https_enabled
Description Whether PTA will connect to PAS though https.
Acceptable true/false
Values
Default true
Value
epv_host
Description The name of PAS that PTA will connect to. Enter the FQDN.
Acceptable String
Values
Default -
Value
epv_port
Description The port through which PTA will connect to PAS.
Acceptable Port number
Values
Default ■ https: 443
Value ■ http: 80
epv_root_context
Description The PVWA application name.
Acceptable String
Values
Default PasswordVault
Value
Privileged Threat Analytics
PTA Implementation Guide 151
Section: Domain
send_psm_session_related_data
Description Whether PTA will send a privileged session risk score to PSM to make the
score available in PVWA.
Acceptable true/false
Values
Default true
Value
Section: UI
numberOfIncidentsToGroupBy
Description The number of suspicious session activity incidents for the selected
timeframe that will be displayed in individual bubbles on the dashboard.
The rest of the incidents will be displayed in a single aggregated bubble.
Acceptable Number
Values
Default Value 0
Section: Mitigation
epvintegrationRotatePasswordExcludeList
Description The list of anomalies to be excluded from the automatically rotate
password reaction for credentials theft.
Acceptable ■ SuspectedCredentialsTheft
Values ■ OverPassTheHash
■ SuspiciousPasswordChange
Default Value SuspectedCredentialsTheft,OverPassTheHash,SuspiciousPasswo
rdChange
EnableAutomaticMitigationByEPV
Description Determines whether PTA will integrate with PAS to react
automatically to detected credential thefts.
Acceptable true/false
Values
Default Value ■ When integration with PAS is not configured, this parameter is
not relevant.
■ When integration with PAS is configured, this parameter is
automatically set to true.
epvIntegrationEnableAddPendingAccount
Description Determines whether PTA will integrate with PAS to automatically
Privileged Threat Analytics
152 Configure System Properties
Section: Mitigation
add unmanaged privileged accounts to the PVWA pending accounts
queue.
Acceptable ■ True – automatic adding of unmanaged privileged accounts is
Values enabled
■ False – automatic adding of unmanaged privileged accounts is
disabled
Default Value False
epv_integration_rotate_password
Description Determines whether PTA will integrate with PAS to automatically
rotate passwords to accounts.
Acceptable ■ True – automatic rotate passwords to accounts is enabled
Values ■ False – automatic rotate passwords to accounts is disabled
Default Value False
epv_integration_reconcile_password
Description Determines whether PTA will integrate with PAS to react
automatically to any detected CyberArk Password Manager bypass.
Acceptable ■ True – automatic password reconciliation is enabled
Values ■ False – automatic password reconciliation is disabled
Default Value False
psm_mitigation_enabled
Description Allows a user to enable or all automatic mitigation of PSM
suspicious activities.
Acceptable ■ True – automatic mitigation is enabled
Values ■ False – automatic mitigation is disabled
Default Value True
psm_mitigation_termination_enabled
Description Allows a user to enable or disable automatic mitigation session
termination of PSM suspicious activities.
Acceptable ■ True – automatic mitigation session termination is enabled
Values ■ False – automatic mitigation session termination is disabled
Default Value False
psm_mitigation_suspension_enabled
Description Allows a user to enable or disable automatic mitigation session
suspension of PSM suspicious activities.
Acceptable ■ True – automatic mitigation session suspension is enabled
Values ■ False – automatic mitigation session suspension is disabled
Default Value False
Privileged Threat Analytics
PTA Implementation Guide 153
Section: Auto Purge
audits_retention_period_in_days
Description The retention period for raw data to be stored in PTA before it will be
deleted. This does not apply to events that PTA has detected.
Acceptable Number
Values
Default 90
Value
Section: PTA Agent
enable_client_verification
Description Enables client verification for the secured syslog.
Acceptable ■ True – client verification for the secured syslog is enabled
Values ■ False – client verification for the secured syslog is disabled
Default Value True
enable_dcagent_connection
Description Enables PTA Windows Agent connection to the PTA Server.
Acceptable ■ True – PTA Windows Agent connection to the PTA Server is
Values enabled
■ False – PTA Windows Agent connection to the PTA Server is
disabled
Default Value True
Privileged Threat Analytics
Table of Contents 154
Configure Agent Properties
The config.ini file configures the PTA Windows Agent. The configuration file is stored in
C:\Program Files\cyberark\PTA Agent\ directory.
To Change Default Property Values:
1. Navigate to C:\Program Files\cyberark\PTA Agent\ directory.
2. Locate the needed property from the documentation below.
3. Add to the end of the file the property's header from the documentation below (if the
header is missing).
4. Add the relevant value below the property header.
Note:
All parameters must be specified without spaces.
Section: ServerInfo
PTA_IP_Address
Description The IP of the PTA Server.
Acceptable Values IP address
Default Value None
SSL_Data_Port
Description The port used to send syslog data to PTA in a secure channel.
Acceptable Values Number between 1024 and 65535
Default Value 6514
SSL_Control_Port
Description The port used to send statistics data to PTA in a secure channel.
Acceptable Values Number between 1024 and 65535
Default Value 7514
Section: DCInfo
Server_Verification_Required
Description Determines whether the PTA Server certificate is validated by the
PTA Windows Agent, making the connection trusted.
Acceptable true/false
Values
Default true
Value
Privileged Threat Analytics
155 Table of Contents
Section: DCInfo
Network_Interface_ID
Description The network interface that the PTA Windows Agent uses.
Acceptable Number
Values
Default 1
Value
KeepAlive_Interval_msec
Description The milliseconds between each heartbeat to the PTA Server.
Acceptable Number
Values
Default 2000 (2 seconds)
Value
Network_Enabled
Description Data analysis mode to inspect Network traffic.
Acceptable ■ True – data analysis mode to inspect Network traffic is enabled
Values ■ False – data analysis mode to inspect Network traffic is disabled
Default True
Value
Windows_Event_Enabled
Description Data analysis mode to inspect Windows events.
Acceptable ■ True – data analysis mode to inspect Windows events is enabled
Values ■ False – data analysis mode to inspect Windows events is disabled
Default False
Value
Section: Debug
Write_Events_To_Log
Description Set the debug events flag. This parameter is for internal debugging
purposes.
Acceptable ■ 0 - false
Values ■ 1 - true
Default Value 0 (false)
Section: Monitoring
Machine_Monitoring_Enabled_Global
Privileged Threat Analytics
Table of Contents 156
Section: Monitoring
Description Determines whether monitoring options
are available.
Acceptable Values true/false
Default Value true
Machine_Monitoring_Enabled_Memory
Description Determines whether Memory monitoring
is available.
Acceptable Values true/false
Default Value true
Machine_Monitoring_Enabled_CPU
Description Determines whether CPU monitoring is
available.
Acceptable Values true/false
Default Value true
Machine_Monitoring_Enabled_Network
Description Determines whether Network monitoring
is available.
Acceptable Values true/false
Default Value true
Machine_Monitoring_To_Log
Description Determines whether the monitoring
results are written to the log file.
Acceptable Values true/false
Default Value true
Machine_Monitoring_Interval_sec
Description The interval to query the Machine for the
resources data
Acceptable Values Number
Default Value 10
Section: ClientCertificate
Client_Certificate_Enabled
Description Determines whether the client sends the certificate to the PTA Server
for verification .
Acceptable true/false
Privileged Threat Analytics
157 Table of Contents
Section: ClientCertificate
Values
Default Value true
Client_Certificate_Subject_Name
Description The subject name of the client certificates installed on the
PTA Windows Agent machine.
Acceptable String
Values
Default Value None
Section: Enforcement
Process_CPU_Enabled
Description Determines whether the CPU based enforcement is enabled.
Acceptable Values true/false
Default Value true
Process_CPU_Monitoring_Time_Window
Description The time window to monitor CPU exceptions.
Acceptable Values Number
Default Value 60
Process_CPU_Percent_Threshold
Description The CPU Threshold percentage limit.
Acceptable Values Number between 1 and 100
Default Value 35
Process_CPU_Percent_Exceeded_Samples_sec
Description The allowed percentage of the exceeded threshold.
Acceptable Values Number
Default Value 70
Section: Forwarder
Windows_Event_Log
Description The Windows event log name from which the PTA Windows Agent
reads the events.
Acceptable String
Values
Default Value ForwardedEvents
Privileged Threat Analytics
158 Time Zones
Time Zones
The PTA installation wizard requires you to configure your time zone. The following table
lists the available time zones.
EST5EDT MET WET
GB Iran Mexico/BajaSur
Mexico/BajaNorte Mexico/General Israel
NZ Asia/Macao Asia/Irkutsk
Asia/Shanghai Asia/Chongqing Asia/Anadyr
Asia/Hovd Asia/Urumqi Asia/Harbin
Asia/Thimphu Asia/Bishkek Asia/Dhaka
Asia/Hong_Kong Asia/Jakarta Asia/Vientiane
Asia/Pyongyang Asia/Baghdad Asia/Gaza
Asia/Samarkand Asia/Tashkent Asia/Beirut
Asia/Oral Asia/Jerusalem Asia/Calcutta
Asia/Tokyo Asia/Taipei Asia/Omsk
Asia/Dushanbe Asia/Kolkata Asia/Brunei
Asia/Dili Asia/Istanbul Asia/Baku
Asia/Ashgabat Asia/Jayapura Asia/Colombo
Asia/Tbilisi Asia/Ulan_Bator Asia/Kuching
Asia/Novosibirsk Asia/Phnom_Penh Asia/Novokuznetsk
Asia/Ujung_Pandang Asia/Thimbu Asia/Ashkhabad
Asia/Bahrain Asia/Vladivostok Asia/Kamchatka
Asia/Seoul Asia/Chungking Asia/Sakhalin
Asia/Aqtau Asia/Magadan Asia/Kuwait
Asia/Singapore Asia/Kuala_Lumpur Asia/Amman
Asia/Kathmandu Asia/Krasnoyarsk Asia/Rangoon
Asia/Pontianak Asia/Dubai Asia/Yekaterinburg
Asia/Yakutsk Asia/Aden Asia/Aqtobe
Asia/Qatar Asia/Muscat Asia/Nicosia
Asia/Qyzylorda Asia/Macau Asia/Hebron
Asia/Kabul Asia/Choibalsan Asia/Riyadh87
Privileged Threat Analytics
PTA Implementation Guide 159
Asia/Tel_Aviv Asia/Saigon Asia/Yerevan
Asia/Kashgar Asia/Manila Asia/Ulaanbaatar
Asia/Makassar Asia/Riyadh89 Asia/Ho_Chi_Minh
Asia/Dacca Asia/Bangkok Asia/Riyadh
Asia/Tehran Asia/Damascus Asia/Katmandu
Asia/Karachi Asia/Almaty Asia/Riyadh88
Canada/East- Canada/Central Canada/Newfoundland
Saskatchewan
Canada/Atlantic Canada/Eastern Canada/Yukon
Canada/Mountain Canada/Pacific Canada/Saskatchewan
Greenwich Africa/Accra Africa/Khartoum
Africa/Kigali Africa/Bangui Africa/Timbuktu
Africa/Juba Africa/Ouagadougou Africa/Dar_es_Salaam
Africa/Monrovia Africa/Maputo Africa/Tripoli
Africa/Windhoek Africa/Bissau Africa/Ndjamena
Africa/Asmera Africa/Lome Africa/Ceuta
Africa/Blantyre Africa/Cairo Africa/Tunis
Africa/Mbabane Africa/Porto-Novo Africa/Bamako
Africa/Nouakchott Africa/Maseru Africa/Niamey
Africa/Nairobi Africa/Algiers Africa/Johannesburg
Africa/Lagos Africa/Kinshasa Africa/Gaborone
Africa/Banjul Africa/Brazzaville Africa/Sao_Tome
Africa/Mogadishu Africa/Djibouti Africa/Luanda
Africa/Casablanca Africa/Addis_Ababa Africa/Douala
Africa/Lusaka Africa/Conakry Africa/Abidjan
Africa/Freetown Africa/Malabo Africa/Dakar
Africa/Asmara Africa/Libreville Africa/Bujumbura
Africa/Lubumbashi Africa/Harare Africa/Kampala
Africa/El_Aaiun Zulu Japan
Indian/Maldives Indian/Antananarivo Indian/Chagos
Indian/Reunion Indian/Mayotte Indian/Christmas
Indian/Mauritius Indian/Kerguelen Indian/Mahe
Indian/Cocos Indian/Comoro NZ-CHAT
Privileged Threat Analytics
160 Time Zones
Eire UTC Universal
EET Brazil/Acre Brazil/West
Brazil/East Brazil/DeNoronha MST7MDT
Mideast/Riyadh87 Mideast/Riyadh89 Mideast/Riyadh88
Libya EST UCT
Atlantic/St_Helena Atlantic/South_Georgia Atlantic/Canary
Atlantic/Cape_Verde Atlantic/Faroe Atlantic/Azores
Atlantic/Jan_Mayen Atlantic/Reykjavik Atlantic/Faeroe
Atlantic/Bermuda Atlantic/Madeira Atlantic/Stanley
HST Hongkong posix/EST5EDT
posix/MET posix/WET posix/GB
posix/Iran posix/Mexico/BajaSur posix/Mexico/BajaNorte
posix/Mexico/General posix/Israel posix/NZ
posix/Asia/Macao posix/Asia/Irkutsk posix/Asia/Shanghai
posix/Asia/Chongqing posix/Asia/Anadyr posix/Asia/Hovd
posix/Asia/Urumqi posix/Asia/Harbin posix/Asia/Thimphu
posix/Asia/Bishkek posix/Asia/Dhaka posix/Asia/Hong_Kong
posix/Asia/Jakarta posix/Asia/Vientiane posix/Asia/Pyongyang
posix/Asia/Baghdad posix/Asia/Gaza posix/Asia/Samarkand
posix/Asia/Tashkent posix/Asia/Beirut posix/Asia/Oral
posix/Asia/Jerusalem posix/Asia/Calcutta posix/Asia/Tokyo
posix/Asia/Taipei posix/Asia/Omsk posix/Asia/Dushanbe
posix/Asia/Kolkata posix/Asia/Brunei posix/Asia/Dili
posix/Asia/Istanbul posix/Asia/Baku posix/Asia/Ashgabat
posix/Asia/Jayapura posix/Asia/Colombo posix/Asia/Tbilisi
posix/Asia/Ulan_Bator posix/Asia/Kuching posix/Asia/Novosibirsk
posix/Asia/Phnom_Penh posix/Asia/Novokuznetsk posix/Asia/Ujung_
Pandang
posix/Asia/Thimbu posix/Asia/Ashkhabad posix/Asia/Bahrain
posix/Asia/Vladivostok posix/Asia/Kamchatka posix/Asia/Seoul
posix/Asia/Chungking posix/Asia/Sakhalin posix/Asia/Aqtau
posix/Asia/Magadan posix/Asia/Kuwait posix/Asia/Singapore
posix/Asia/Kuala_Lumpur posix/Asia/Amman posix/Asia/Kathmandu
Privileged Threat Analytics
PTA Implementation Guide 161
posix/Asia/Krasnoyarsk posix/Asia/Rangoon posix/Asia/Pontianak
posix/Asia/Dubai posix/Asia/Yekaterinburg posix/Asia/Yakutsk
posix/Asia/Aden posix/Asia/Aqtobe posix/Asia/Qatar
posix/Asia/Muscat posix/Asia/Nicosia posix/Asia/Qyzylorda
posix/Asia/Macau posix/Asia/Hebron posix/Asia/Kabul
posix/Asia/Choibalsan posix/Asia/Riyadh87 posix/Asia/Tel_Aviv
posix/Asia/Saigon posix/Asia/Yerevan posix/Asia/Kashgar
posix/Asia/Manila posix/Asia/Ulaanbaatar posix/Asia/Makassar
posix/Asia/Riyadh89 posix/Asia/Ho_Chi_Minh posix/Asia/Dacca
posix/Asia/Bangkok posix/Asia/Riyadh posix/Asia/Tehran
posix/Asia/Damascus posix/Asia/Katmandu posix/Asia/Karachi
posix/Asia/Almaty posix/Asia/Riyadh88 posix/Canada/
East-Saskatchewan
posix/Canada/Central posix/Canada/Newfoundl posix/Canada/Atlantic
and
posix/Canada/Eastern posix/Canada/Yukon posix/Canada/Mountain
posix/Canada/Pacific posix/Canada/Saskatche posix/Greenwich
wan
posix/Africa/Accra posix/Africa/Khartoum posix/Africa/Kigali
posix/Africa/Bangui posix/Africa/Timbuktu posix/Africa/Juba
posix/Africa/Ouagadougou posix/Africa/Dar_es_ posix/Africa/Monrovia
Salaam
posix/Africa/Maputo posix/Africa/Tripoli posix/Africa/Windhoek
posix/Africa/Bissau posix/Africa/Ndjamena posix/Africa/Asmera
posix/Africa/Lome posix/Africa/Ceuta posix/Africa/Blantyre
posix/Africa/Cairo posix/Africa/Tunis posix/Africa/Mbabane
posix/Africa/Porto-Novo posix/Africa/Bamako posix/Africa/Nouakchott
posix/Africa/Maseru posix/Africa/Niamey posix/Africa/Nairobi
posix/Africa/Algiers posix/Africa/Johannesbur posix/Africa/Lagos
g
posix/Africa/Kinshasa posix/Africa/Gaborone posix/Africa/Banjul
posix/Africa/Brazzaville posix/Africa/Sao_Tome posix/Africa/Mogadishu
posix/Africa/Djibouti posix/Africa/Luanda posix/Africa/Casablanca
posix/Africa/Addis_Ababa posix/Africa/Douala posix/Africa/Lusaka
Privileged Threat Analytics
162 Time Zones
posix/Africa/Conakry posix/Africa/Abidjan posix/Africa/Freetown
posix/Africa/Malabo posix/Africa/Dakar posix/Africa/Asmara
posix/Africa/Libreville posix/Africa/Bujumbura posix/Africa/Lubumbashi
posix/Africa/Harare posix/Africa/Kampala posix/Africa/El_Aaiun
posix/Zulu posix/Japan posix/Indian/Maldives
posix/Indian/Antananarivo posix/Indian/Chagos posix/Indian/Reunion
posix/Indian/Mayotte posix/Indian/Christmas posix/Indian/Mauritius
posix/Indian/Kerguelen posix/Indian/Mahe posix/Indian/Cocos
posix/Indian/Comoro posix/NZ-CHAT posix/Eire
posix/UTC posix/Universal posix/EET
posix/Brazil/Acre posix/Brazil/West posix/Brazil/East
posix/Brazil/DeNoronha posix/MST7MDT posix/Mideast/Riyadh87
posix/Mideast/Riyadh89 posix/Mideast/Riyadh88 posix/Libya
posix/EST posix/UCT posix/Atlantic/St_Helena
posix/Atlantic/South_ posix/Atlantic/Canary posix/Atlantic/Cape_
Georgia Verde
posix/Atlantic/Faroe posix/Atlantic/Azores posix/Atlantic/Jan_Mayen
posix/Atlantic/Reykjavik posix/Atlantic/Faeroe posix/Atlantic/Bermuda
posix/Atlantic/Madeira posix/Atlantic/Stanley posix/HST
posix/Hongkong posix/CST6CDT posix/US/Alaska
posix/US/Indiana-Starke posix/US/Central posix/US/Michigan
posix/US/Aleutian posix/US/East-Indiana posix/US/Eastern
posix/US/Pacific-New posix/US/Hawaii posix/US/Mountain
posix/US/Arizona posix/US/Samoa posix/US/Pacific
posix/MST posix/GMT+0 posix/ROC
posix/Singapore posix/Turkey posix/GMT0
posix/Poland posix/Chile/Continental posix/Chile/EasterIsland
posix/Iceland posix/America/Antigua posix/America/Swift_
Current
posix/America/Inuvik posix/America/Juneau posix/America/Porto_
Velho
posix/America/Sao_Paulo posix/America/Cuiaba posix/America/Santarem
posix/America/Buenos_ posix/America/Lima posix/America/Recife
Aires
Privileged Threat Analytics
PTA Implementation Guide 163
posix/America/Lower_ posix/America/Panama posix/America/
Princes Cambridge_Bay
posix/America/Montevideo posix/America/Argentina/ posix/America/Argentina/
Buenos_Aires Salta
posix/America/Argentina/ posix/America/Argentina/ posix/America/Argentina/
San_Juan ComodRivadavia Tucuman
posix/America/Argentina/ posix/America/Argentina/ posix/America/Argentina/
San_Luis Ushuaia Jujuy
posix/America/Argentina/ posix/America/Argentina/ posix/America/Argentina/
Rio_Gallegos Mendoza La_Rioja
posix/America/Argentina/C posix/America/Argentina/ posix/America/Nassau
atamarca Cordoba
posix/America/Shiprock posix/America/Manaus posix/America/Rosario
posix/America/Nome posix/America/Danmarks posix/America/Resolute
havn
posix/America/Rio_Branco posix/America/Vancouver posix/America/
Campo_Grande
posix/America/Ensenada posix/America/Belem posix/America/Rankin_
Inlet
posix/America/Thunder_ posix/America/St_ posix/America/St_Vincent
Bay Thomas
posix/America/North_ posix/America/North_ posix/America/North_
Dakota/ Dakota/ Dakota/Beulah
New_Salem Center
posix/America/Dawson posix/America/Fortaleza posix/America/Monterrey
posix/America/Montserrat posix/America/Sitka posix/America/Atikokan
posix/America/Regina posix/America/Winnipeg posix/America/Paramaribo
posix/America/Rainy_River posix/America/Mazatlan posix/America/Edmonton
posix/America/Port-au- posix/America/Moncton posix/America/Mexico_
Prince City
posix/America/Matamoros posix/America/Nipigon posix/America/Indianapoli
s
posix/America/Los_Angeles posix/America/New_York posix/America/El_
Salvador
posix/America/Coral_ posix/America/Miquelon posix/America/Tortola
Harbour
posix/America/Kralendijk posix/America/Knox_IN posix/America/Goose_
Bay
posix/America/Curacao posix/America/Santa_ posix/America/
Isabel Dawson_Creek
Privileged Threat Analytics
164 Time Zones
posix/America/Tegucigalpa posix/America/Barbados posix/America/Godthab
posix/America/Caracas posix/America/Puerto_ posix/America/Santiago
Rico
posix/America/St_Johns posix/America/St_ posix/America/Aruba
Barthelemy
posix/America/Martinique posix/America/St_Lucia posix/America/Phoenix
posix/America/Yakutat posix/America/Hermosillo posix/America/Kentucky/L
ouisville
posix/America/Kentucky/ posix/America/Bahia_ posix/America/Thule
Monticello Banderas
posix/America/Yellowknife posix/America/Havana posix/America/Scoresbys
und
posix/America/Halifax posix/America/Adak posix/America/Creston
posix/America/Boise posix/America/Grand_ posix/America/Araguaina
Turk
posix/America/Guayaquil posix/America/Belize posix/America/Anguilla
posix/America/Maceio posix/America/Anchorage posix/America/Dominica
posix/America/Costa_Rica posix/America/Chicago posix/America/St_Kitts
posix/America/Pangnirtung posix/America/Louisville posix/America/Toronto
posix/America/Bogota posix/America/Menomine posix/America/Porto_Acre
e
posix/America/Blanc- posix/America/Jujuy posix/America/Bahia
Sablon
posix/America/Santo_ posix/America/Eirunepe posix/America/Indiana/
Domingo Marengo
posix/America/Indiana/ posix/America/Indiana/ posix/America/Indiana/Ve
Petersburg Indianapolis vay
posix/America/Indiana/ posix/America/Indiana/Wi posix/America/Indiana/
Tell_City namac Vincennes
posix/America/Indiana/Kno posix/America/Cayenne posix/America/Virgin
x
posix/America/Guatemala posix/America/Whitehors posix/America/Ojinaga
e
posix/America/Cayman posix/America/Mendoza posix/America/Noronha
posix/America/Cancun posix/America/Glace_ posix/America/Port_of_
Bay Spain
posix/America/Iqaluit posix/America/Fort_ posix/America/Merida
Wayne
Privileged Threat Analytics
PTA Implementation Guide 165
posix/America/Detroit posix/America/Tijuana posix/America/Metlakatla
posix/America/Managua posix/America/La_Paz posix/America/Montreal
posix/America/Jamaica posix/America/Marigot posix/America/Catamarca
posix/America/Cordoba posix/America/Guyana posix/America/Asuncion
posix/America/Guadeloupe posix/America/Denver posix/America/Atka
posix/America/Chihuahua posix/America/Boa_Vista posix/America/Grenada
posix/GMT-0 posix/Kwajalein posix/Arctic/Longyearbyen
posix/PST8PDT posix/Australia/North posix/Australia/ACT
posix/Australia/Lord_Howe posix/Australia/NSW posix/Australia/Darwin
posix/Australia/Currie posix/Australia/Melbourne posix/Australia/Lindeman
posix/Australia/Queensland posix/Australia/Victoria posix/Australia/Canberra
posix/Australia/West posix/Australia/Broken_ posix/Australia/Hobart
Hill
posix/Australia/LHI posix/Australia/Yancowin posix/Australia/Eucla
na
posix/Australia/South posix/Australia/Tasmania posix/Australia/Brisbane
posix/Australia/Adelaide posix/Australia/Sydney posix/Australia/Perth
posix/GB-Eire posix/Europe/Riga posix/Europe/Luxembourg
posix/Europe/Kaliningrad posix/Europe/Andorra posix/Europe/Kiev
posix/Europe/Malta posix/Europe/Lisbon posix/Europe/Sofia
posix/Europe/Samara posix/Europe/Brussels posix/Europe/Prague
posix/Europe/Bratislava posix/Europe/Minsk posix/Europe/Amsterdam
posix/Europe/Paris posix/Europe/Zaporozhye posix/Europe/Chisinau
posix/Europe/Isle_of_Man posix/Europe/Madrid posix/Europe/Istanbul
posix/Europe/Tiraspol posix/Europe/Belgrade posix/Europe/London
posix/Europe/Tallinn posix/Europe/Vilnius posix/Europe/Warsaw
posix/Europe/San_Marino posix/Europe/Podgorica posix/Europe/Copenhagen
posix/Europe/Zurich posix/Europe/Mariehamn posix/Europe/Monaco
posix/Europe/Jersey posix/Europe/Skopje posix/Europe/Gibraltar
posix/Europe/Nicosia posix/Europe/Belfast posix/Europe/Zagreb
posix/Europe/Volgograd posix/Europe/Athens posix/Europe/Berlin
posix/Europe/Budapest posix/Europe/Dublin posix/Europe/Moscow
posix/Europe/Bucharest posix/Europe/Vatican posix/Europe/Stockholm
Privileged Threat Analytics
166 Time Zones
posix/Europe/Oslo posix/Europe/Tirane posix/Europe/Vienna
posix/Europe/Sarajevo posix/Europe/Uzhgorod posix/Europe/Rome
posix/Europe/Guernsey posix/Europe/Ljubljana posix/Europe/Simferopol
posix/Europe/Vaduz posix/Europe/Helsinki posix/Egypt
posix/Navajo posix/PRC posix/Jamaica
posix/ROK posix/GMT posix/Etc/GMT-9
posix/Etc/GMT-2 posix/Etc/GMT+9 posix/Etc/GMT-4
posix/Etc/GMT+8 posix/Etc/GMT+10 posix/Etc/GMT-5
posix/Etc/GMT+1 posix/Etc/GMT+6 posix/Etc/GMT-6
posix/Etc/Greenwich posix/Etc/Zulu posix/Etc/GMT-11
posix/Etc/GMT-7 posix/Etc/GMT-10 posix/Etc/GMT-14
posix/Etc/UTC posix/Etc/Universal posix/Etc/GMT-8
posix/Etc/UCT posix/Etc/GMT+2 posix/Etc/GMT+0
posix/Etc/GMT0 posix/Etc/GMT+3 posix/Etc/GMT+5
posix/Etc/GMT+12 posix/Etc/GMT-3 posix/Etc/GMT-0
posix/Etc/GMT-13 posix/Etc/GMT+4 posix/Etc/GMT-12
posix/Etc/GMT+7 posix/Etc/GMT+11 posix/Etc/GMT-1
posix/Etc/GMT posix/W-SU posix/CET
posix/Cuba posix/Antarctica/McMurd posix/Antarctica/Davis
o
posix/Antarctica/South_ posix/Antarctica/Casey posix/Antarctica/Vostok
Pole
posix/Antarctica/Syowa posix/Antarctica/Rothera posix/Antarctica/Mawson
posix/Antarctica/Macquarie posix/Antarctica/Palmer posix/Antarctica/
DumontDUrville
posix/Pacific/Chuuk posix/Pacific/Noumea posix/Pacific/Saipan
posix/Pacific/Pitcairn posix/Pacific/Marquesas posix/Pacific/Fiji
posix/Pacific/Tahiti posix/Pacific/Majuro posix/Pacific/Funafuti
posix/Pacific/Yap posix/Pacific/Midway posix/Pacific/Palau
posix/Pacific/Rarotonga posix/Pacific/Chatham posix/Pacific/Auckland
posix/Pacific/Guam posix/Pacific/Tarawa posix/Pacific/Truk
posix/Pacific/Apia posix/Pacific/Efate posix/Pacific/Norfolk
posix/Pacific/Nauru posix/Pacific/Johnston posix/Pacific/Wallis
posix/Pacific/Niue posix/Pacific/Ponape posix/Pacific/Kiritimati
Privileged Threat Analytics
PTA Implementation Guide 167
posix/Pacific/Pohnpei posix/Pacific/Enderbury posix/Pacific/Port_
Moresby
posix/Pacific/Galapagos posix/Pacific/Tongatapu posix/Pacific/Gambier
posix/Pacific/Guadalcanal posix/Pacific/Pago_Pago posix/Pacific/Kwajalein
posix/Pacific/Wake posix/Pacific/Fakaofo posix/Pacific/Kosrae
posix/Pacific/Easter posix/Pacific/Samoa posix/Pacific/Honolulu
posix/Portugal CST6CDT US/Alaska
US/Indiana-Starke US/Central US/Michigan
US/Aleutian US/East-Indiana US/Eastern
US/Pacific-New US/Hawaii US/Mountain
US/Arizona US/Samoa US/Pacific
MST GMT+0 ROC
Singapore Turkey GMT0
Poland posixrules right/EST5EDT
right/MET right/WET right/GB
right/Iran right/Mexico/BajaSur right/Mexico/BajaNorte
right/Mexico/General right/Israel right/NZ
right/Asia/Macao right/Asia/Irkutsk right/Asia/Shanghai
right/Asia/Chongqing right/Asia/Anadyr right/Asia/Hovd
right/Asia/Urumqi right/Asia/Harbin right/Asia/Thimphu
right/Asia/Bishkek right/Asia/Dhaka right/Asia/Hong_Kong
right/Asia/Jakarta right/Asia/Vientiane right/Asia/Pyongyang
right/Asia/Baghdad right/Asia/Gaza right/Asia/Samarkand
right/Asia/Tashkent right/Asia/Beirut right/Asia/Oral
right/Asia/Jerusalem right/Asia/Calcutta right/Asia/Tokyo
right/Asia/Taipei right/Asia/Omsk right/Asia/Dushanbe
right/Asia/Kolkata right/Asia/Brunei right/Asia/Dili
right/Asia/Istanbul right/Asia/Baku right/Asia/Ashgabat
right/Asia/Jayapura right/Asia/Colombo right/Asia/Tbilisi
right/Asia/Ulan_Bator right/Asia/Kuching right/Asia/Novosibirsk
right/Asia/Phnom_Penh right/Asia/Novokuznetsk right/Asia/Ujung_Pandang
right/Asia/Thimbu right/Asia/Ashkhabad right/Asia/Bahrain
right/Asia/Vladivostok right/Asia/Kamchatka right/Asia/Seoul
Privileged Threat Analytics
168 Time Zones
right/Asia/Chungking right/Asia/Sakhalin right/Asia/Aqtau
right/Asia/Magadan right/Asia/Kuwait right/Asia/Singapore
right/Asia/Kuala_Lumpur right/Asia/Amman right/Asia/Kathmandu
right/Asia/Krasnoyarsk right/Asia/Rangoon right/Asia/Pontianak
right/Asia/Dubai right/Asia/Yekaterinburg right/Asia/Yakutsk
right/Asia/Aden right/Asia/Aqtobe right/Asia/Qatar
right/Asia/Muscat right/Asia/Nicosia right/Asia/Qyzylorda
right/Asia/Macau right/Asia/Hebron right/Asia/Kabul
right/Asia/Choibalsan right/Asia/Riyadh87 right/Asia/Tel_Aviv
right/Asia/Saigon right/Asia/Yerevan right/Asia/Kashgar
right/Asia/Manila right/Asia/Ulaanbaatar right/Asia/Makassar
right/Asia/Riyadh89 right/Asia/Ho_Chi_Minh right/Asia/Dacca
right/Asia/Bangkok right/Asia/Riyadh right/Asia/Tehran
right/Asia/Damascus right/Asia/Katmandu right/Asia/Karachi
right/Asia/Almaty right/Asia/Riyadh88 right/Canada/East-
Saskatchewan
right/Canada/Central right/Canada/Newfoundla right/Canada/Atlantic
nd
right/Canada/Eastern right/Canada/Yukon right/Canada/Mountain
right/Canada/Pacific right/Canada/Saskatche right/Greenwich
wan
right/Africa/Accra right/Africa/Khartoum right/Africa/Kigali
right/Africa/Bangui right/Africa/Timbuktu right/Africa/Juba
right/Africa/Ouagadougou right/Africa/Dar_es_ right/Africa/Monrovia
Salaam
right/Africa/Maputo right/Africa/Tripoli right/Africa/Windhoek
right/Africa/Bissau right/Africa/Ndjamena right/Africa/Asmera
right/Africa/Lome right/Africa/Ceuta right/Africa/Blantyre
right/Africa/Cairo right/Africa/Tunis right/Africa/Mbabane
right/Africa/Porto-Novo right/Africa/Bamako right/Africa/Nouakchott
right/Africa/Maseru right/Africa/Niamey right/Africa/Nairobi
right/Africa/Algiers right/Africa/Johannesburg right/Africa/Lagos
right/Africa/Kinshasa right/Africa/Gaborone right/Africa/Banjul
right/Africa/Brazzaville right/Africa/Sao_Tome right/Africa/Mogadishu
Privileged Threat Analytics
PTA Implementation Guide 169
right/Africa/Djibouti right/Africa/Luanda right/Africa/Casablanca
right/Africa/Addis_Ababa right/Africa/Douala right/Africa/Lusaka
right/Africa/Conakry right/Africa/Abidjan right/Africa/Freetown
right/Africa/Malabo right/Africa/Dakar right/Africa/Asmara
right/Africa/Libreville right/Africa/Bujumbura right/Africa/Lubumbashi
right/Africa/Harare right/Africa/Kampala right/Africa/El_Aaiun
right/Zulu right/Japan right/Indian/Maldives
right/Indian/Antananarivo right/Indian/Chagos right/Indian/Reunion
right/Indian/Mayotte right/Indian/Christmas right/Indian/Mauritius
right/Indian/Kerguelen right/Indian/Mahe right/Indian/Cocos
right/Indian/Comoro right/NZ-CHAT right/Eire
right/UTC right/Universal right/EET
right/Brazil/Acre right/Brazil/West right/Brazil/East
right/Brazil/DeNoronha right/MST7MDT right/Mideast/Riyadh87
right/Mideast/Riyadh89 right/Mideast/Riyadh88 right/Libya
right/EST right/UCT right/Atlantic/St_Helena
right/Atlantic/South_ right/Atlantic/Canary right/Atlantic/Cape_Verde
Georgia
right/Atlantic/Faroe right/Atlantic/Azores right/Atlantic/Jan_Mayen
right/Atlantic/Reykjavik right/Atlantic/Faeroe right/Atlantic/Bermuda
right/Atlantic/Madeira right/Atlantic/Stanley right/HST
right/Hongkong right/CST6CDT right/US/Alaska
right/US/Indiana-Starke right/US/Central right/US/Michigan
right/US/Aleutian right/US/East-Indiana right/US/Eastern
right/US/Pacific-New right/US/Hawaii right/US/Mountain
right/US/Arizona right/US/Samoa right/US/Pacific
right/MST right/GMT+0 right/ROC
right/Singapore right/Turkey right/GMT0
right/Poland right/Chile/Continental right/Chile/EasterIsland
right/Iceland right/America/Antigua right/America/Swift_
Current
right/America/Inuvik right/America/Juneau right/America/Porto_Velho
right/America/Sao_Paulo right/America/Cuiaba right/America/Santarem
Privileged Threat Analytics
170 Time Zones
right/America/Buenos_Aires right/America/Lima right/America/Recife
right/America/Lower_ right/America/Panama right/America/
Princes Cambridge_Bay
right/America/Montevideo right/America/Argentina/ right/America/Argentina/
Buenos_Aires Salta
right/America/Argentina/ right/America/Argentina/ right/America/Argentina/
San_Juan ComodRivadavia Tucuman
right/America/Argentina/ right/America/Argentina/ right/America/Argentina/
San_Luis Ushuaia Jujuy
right/America/Argentina/ right/America/Argentina/ right/America/Argentina/
Rio_Gallegos Mendoza La_Rioja
right/America/Argentina/Cat right/America/Argentina/ right/America/Nassau
amarca Cordoba
right/America/Shiprock right/America/Manaus right/America/Rosario
right/America/Nome right/America/Danmarksh right/America/Resolute
avn
right/America/Rio_Branco right/America/Vancouver right/America/
Campo_Grande
right/America/Ensenada right/America/Belem right/America/Rankin_Inlet
right/America/Thunder_Bay right/America/St_Thomas right/America/St_Vincent
right/America/North_ right/America/North_ right/America/North_
Dakota/ Dakota/ Dakota/Beulah
New_Salem Center
right/America/Dawson right/America/Fortaleza right/America/Monterrey
right/America/Montserrat right/America/Sitka right/America/Atikokan
right/America/Regina right/America/Winnipeg right/America/Paramaribo
right/America/Rainy_River right/America/Mazatlan right/America/Edmonton
right/America/Port-au- right/America/Moncton right/America/Mexico_City
Prince
right/America/Matamoros right/America/Nipigon right/America/Indianapolis
right/America/Los_Angeles right/America/New_York right/America/El_Salvador
right/America/Coral_ right/America/Miquelon right/America/Tortola
Harbour
right/America/Kralendijk right/America/Knox_IN right/America/Goose_Bay
right/America/Curacao right/America/Santa_ right/America/Dawson_
Isabel Creek
right/America/Tegucigalpa right/America/Barbados right/America/Godthab
right/America/Caracas right/America/Puerto_ right/America/Santiago
Privileged Threat Analytics
PTA Implementation Guide 171
Rico
right/America/St_Johns right/America/St_ right/America/Aruba
Barthelemy
right/America/Martinique right/America/St_Lucia right/America/Phoenix
right/America/Yakutat right/America/Hermosillo right/America/Kentucky/
Louisville
right/America/Kentucky/ right/America/Bahia_ right/America/Thule
Monticello Banderas
right/America/Yellowknife right/America/Havana right/America/Scoresbysu
nd
right/America/Halifax right/America/Adak right/America/Creston
right/America/Boise right/America/Grand_Turk right/America/Araguaina
right/America/Guayaquil right/America/Belize right/America/Anguilla
right/America/Maceio right/America/Anchorage right/America/Dominica
right/America/Costa_Rica right/America/Chicago right/America/St_Kitts
right/America/Pangnirtung right/America/Louisville right/America/Toronto
right/America/Bogota right/America/Menominee right/America/Porto_Acre
right/America/Blanc-Sablon right/America/Jujuy right/America/Bahia
right/America/Santo_ right/America/Eirunepe right/America/Indiana/
Domingo Marengo
right/America/Indiana/ right/America/Indiana/ right/America/Indiana/Vev
Petersburg Indianapolis ay
right/America/Indiana/ right/America/Indiana/Wi right/America/Indiana/
Tell_City namac Vincennes
right/America/Indiana/Knox right/America/Cayenne right/America/Virgin
right/America/Guatemala right/America/Whitehorse right/America/Ojinaga
right/America/Cayman right/America/Mendoza right/America/Noronha
right/America/Cancun right/America/Glace_Bay right/America/Port_of_
Spain
right/America/Iqaluit right/America/Fort_ right/America/Merida
Wayne
right/America/Detroit right/America/Tijuana right/America/Metlakatla
right/America/Managua right/America/La_Paz right/America/Montreal
right/America/Jamaica right/America/Marigot right/America/Catamarca
right/America/Cordoba right/America/Guyana right/America/Asuncion
right/America/Guadeloupe right/America/Denver right/America/Atka
Privileged Threat Analytics
172 Time Zones
right/America/Chihuahua right/America/Boa_Vista right/America/Grenada
right/GMT-0 right/Kwajalein right/Arctic/Longyearbyen
right/PST8PDT right/Australia/North right/Australia/ACT
right/Australia/Lord_Howe right/Australia/NSW right/Australia/Darwin
right/Australia/Currie right/Australia/Melbourne right/Australia/Lindeman
right/Australia/Queensland right/Australia/Victoria right/Australia/Canberra
right/Australia/West right/Australia/Broken_ right/Australia/Hobart
Hill
right/Australia/LHI right/Australia/Yancowinn right/Australia/Eucla
a
right/Australia/South right/Australia/Tasmania right/Australia/Brisbane
right/Australia/Adelaide right/Australia/Sydney right/Australia/Perth
right/GB-Eire right/Europe/Riga right/Europe/Luxembourg
right/Europe/Kaliningrad right/Europe/Andorra right/Europe/Kiev
right/Europe/Malta right/Europe/Lisbon right/Europe/Sofia
right/Europe/Samara right/Europe/Brussels right/Europe/Prague
right/Europe/Bratislava right/Europe/Minsk right/Europe/Amsterdam
right/Europe/Paris right/Europe/Zaporozhye right/Europe/Chisinau
right/Europe/Isle_of_Man right/Europe/Madrid right/Europe/Istanbul
right/Europe/Tiraspol right/Europe/Belgrade right/Europe/London
right/Europe/Tallinn right/Europe/Vilnius right/Europe/Warsaw
right/Europe/San_Marino right/Europe/Podgorica right/Europe/Copenhagen
right/Europe/Zurich right/Europe/Mariehamn right/Europe/Monaco
right/Europe/Jersey right/Europe/Skopje right/Europe/Gibraltar
right/Europe/Nicosia right/Europe/Belfast right/Europe/Zagreb
right/Europe/Volgograd right/Europe/Athens right/Europe/Berlin
right/Europe/Budapest right/Europe/Dublin right/Europe/Moscow
right/Europe/Bucharest right/Europe/Vatican right/Europe/Stockholm
right/Europe/Oslo right/Europe/Tirane right/Europe/Vienna
right/Europe/Sarajevo right/Europe/Uzhgorod right/Europe/Rome
right/Europe/Guernsey right/Europe/Ljubljana right/Europe/Simferopol
right/Europe/Vaduz right/Europe/Helsinki right/Egypt
right/Navajo right/PRC right/Jamaica
Privileged Threat Analytics
PTA Implementation Guide 173
right/ROK right/GMT right/Etc/GMT-9
right/Etc/GMT-2 right/Etc/GMT+9 right/Etc/GMT-4
right/Etc/GMT+8 right/Etc/GMT+10 right/Etc/GMT-5
right/Etc/GMT+1 right/Etc/GMT+6 right/Etc/GMT-6
right/Etc/Greenwich right/Etc/Zulu right/Etc/GMT-11
right/Etc/GMT-7 right/Etc/GMT-10 right/Etc/GMT-14
right/Etc/UTC right/Etc/Universal right/Etc/GMT-8
right/Etc/UCT right/Etc/GMT+2 right/Etc/GMT+0
right/Etc/GMT0 right/Etc/GMT+3 right/Etc/GMT+5
right/Etc/GMT+12 right/Etc/GMT-3 right/Etc/GMT-0
right/Etc/GMT-13 right/Etc/GMT+4 right/Etc/GMT-12
right/Etc/GMT+7 right/Etc/GMT+11 right/Etc/GMT-1
right/Etc/GMT right/W-SU right/CET
right/Cuba right/Antarctica/McMurdo right/Antarctica/Davis
right/Antarctica/South_Pole right/Antarctica/Casey right/Antarctica/Vostok
right/Antarctica/Syowa right/Antarctica/Rothera right/Antarctica/Mawson
right/Antarctica/Macquarie right/Antarctica/Palmer right/Antarctica/
DumontDUrville
right/Pacific/Chuuk right/Pacific/Noumea right/Pacific/Saipan
right/Pacific/Pitcairn right/Pacific/Marquesas right/Pacific/Fiji
right/Pacific/Tahiti right/Pacific/Majuro right/Pacific/Funafuti
right/Pacific/Yap right/Pacific/Midway right/Pacific/Palau
right/Pacific/Rarotonga right/Pacific/Chatham right/Pacific/Auckland
right/Pacific/Guam right/Pacific/Tarawa right/Pacific/Truk
right/Pacific/Apia right/Pacific/Efate right/Pacific/Norfolk
right/Pacific/Nauru right/Pacific/Johnston right/Pacific/Wallis
right/Pacific/Niue right/Pacific/Ponape right/Pacific/Kiritimati
right/Pacific/Pohnpei right/Pacific/Enderbury right/Pacific/Port_Moresby
right/Pacific/Galapagos right/Pacific/Tongatapu right/Pacific/Gambier
right/Pacific/Guadalcanal right/Pacific/Pago_Pago right/Pacific/Kwajalein
right/Pacific/Wake right/Pacific/Fakaofo right/Pacific/Kosrae
right/Pacific/Easter right/Pacific/Samoa right/Pacific/Honolulu
right/Portugal Chile/Continental Chile/EasterIsland
Privileged Threat Analytics
174 Time Zones
Iceland zone.tab America/Antigua
America/Swift_Current America/Inuvik America/Juneau
America/Porto_Velho America/Sao_Paulo America/Cuiaba
America/Santarem America/Buenos_Aires America/Lima
America/Recife America/Lower_Princes America/Panama
America/Cambridge_Bay America/Montevideo America/Argentina/
Buenos_Aires
America/Argentina/Salta America/Argentina/San_ America/Argentina/
Juan ComodRivadavia
America/Argentina/Tucuma America/Argentina/San_ America/Argentina/Ushuai
n Luis a
America/Argentina/Jujuy America/Argentina/Rio_ America/Argentina/Mendo
Gallegos za
America/Argentina/La_Rioja America/Argentina/Cata America/Argentina/Cordob
marca a
America/Nassau America/Shiprock America/Manaus
America/Rosario America/Nome America/Danmarkshavn
America/Resolute America/Rio_Branco America/Vancouver
America/Campo_Grande America/Ensenada America/Belem
America/Rankin_Inlet America/Thunder_Bay America/St_Thomas
America/St_Vincent America/North_Dakota/ America/North_Dakota/
New_Salem Center
America/North_ America/Dawson America/Fortaleza
Dakota/Beulah
America/Monterrey America/Montserrat America/Sitka
America/Atikokan America/Regina America/Winnipeg
America/Paramaribo America/Rainy_River America/Mazatlan
America/Edmonton America/Port-au-Prince America/Moncton
America/Mexico_City America/Matamoros America/Nipigon
America/Indianapolis America/Los_Angeles America/New_York
America/El_Salvador America/Coral_Harbour America/Miquelon
America/Tortola America/Kralendijk America/Knox_IN
America/Goose_Bay America/Curacao America/Santa_Isabel
America/Dawson_Creek America/Tegucigalpa America/Barbados
America/Godthab America/Caracas America/Puerto_Rico
Privileged Threat Analytics
PTA Implementation Guide 175
America/Santiago America/St_Johns America/St_Barthelemy
America/Aruba America/Martinique America/St_Lucia
America/Phoenix America/Yakutat America/Hermosillo
America/Kentucky/Louisvill America/Kentucky/Monti America/Bahia_Banderas
e cello
America/Thule America/Yellowknife America/Havana
America/Scoresbysund America/Halifax America/Adak
America/Creston America/Boise America/Grand_Turk
America/Araguaina America/Guayaquil America/Belize
America/Anguilla America/Maceio America/Anchorage
America/Dominica America/Costa_Rica America/Chicago
America/St_Kitts America/Pangnirtung America/Louisville
America/Toronto America/Bogota America/Menominee
America/Porto_Acre America/Blanc-Sablon America/Jujuy
America/Bahia America/Santo_Domingo America/Eirunepe
America/Indiana/Marengo America/Indiana/Petersb America/Indiana/Indianapo
urg lis
America/Indiana/Vevay America/Indiana/Tell_City America/Indiana/Winamac
America/Indiana/Vincennes America/Indiana/Knox America/Cayenne
America/Virgin America/Guatemala America/Whitehorse
America/Ojinaga America/Cayman America/Mendoza
America/Noronha America/Cancun America/Glace_Bay
America/Port_of_Spain America/Iqaluit America/Fort_Wayne
America/Merida America/Detroit America/Tijuana
America/Metlakatla America/Managua America/La_Paz
America/Montreal America/Jamaica America/Marigot
America/Catamarca America/Cordoba America/Guyana
America/Asuncion America/Guadeloupe America/Denver
America/Atka America/Chihuahua America/Boa_Vista
America/Grenada GMT-0 Kwajalein
Arctic/Longyearbyen PST8PDT Australia/North
Australia/ACT Australia/Lord_Howe Australia/NSW
Australia/Darwin Australia/Currie Australia/Melbourne
Privileged Threat Analytics
176 Time Zones
Australia/Lindeman Australia/Queensland Australia/Victoria
Australia/Canberra Australia/West Australia/Broken_Hill
Australia/Hobart Australia/LHI Australia/Yancowinna
Australia/Eucla Australia/South Australia/Tasmania
Australia/Brisbane Australia/Adelaide Australia/Sydney
Australia/Perth GB-Eire Europe/Riga
Europe/Luxembourg Europe/Kaliningrad Europe/Andorra
Europe/Kiev Europe/Malta Europe/Lisbon
Europe/Sofia Europe/Samara Europe/Brussels
Europe/Prague Europe/Bratislava Europe/Minsk
Europe/Amsterdam Europe/Paris Europe/Zaporozhye
Europe/Chisinau Europe/Isle_of_Man Europe/Madrid
Europe/Istanbul Europe/Tiraspol Europe/Belgrade
Europe/London Europe/Tallinn Europe/Vilnius
Europe/Warsaw Europe/San_Marino Europe/Podgorica
Europe/Copenhagen Europe/Zurich Europe/Mariehamn
Europe/Monaco Europe/Jersey Europe/Skopje
Europe/Gibraltar Europe/Nicosia Europe/Belfast
Europe/Zagreb Europe/Volgograd Europe/Athens
Europe/Berlin Europe/Budapest Europe/Dublin
Europe/Moscow Europe/Bucharest Europe/Vatican
Europe/Stockholm Europe/Oslo Europe/Tirane
Europe/Vienna Europe/Sarajevo Europe/Uzhgorod
Europe/Rome Europe/Guernsey Europe/Ljubljana
Europe/Simferopol Europe/Vaduz Europe/Helsinki
Egypt Navajo PRC
Jamaica ROK GMT
Etc/GMT-9 Etc/GMT-2 Etc/GMT+9
Etc/GMT-4 Etc/GMT+8 Etc/GMT+10
Etc/GMT-5 Etc/GMT+1 Etc/GMT+6
Etc/GMT-6 Etc/Greenwich Etc/Zulu
Etc/GMT-11 Etc/GMT-7 Etc/GMT-10
Etc/GMT-14 Etc/UTC Etc/Universal
Privileged Threat Analytics
PTA Implementation Guide 177
Etc/GMT-8 Etc/UCT Etc/GMT+2
Etc/GMT+0 Etc/GMT0 Etc/GMT+3
Etc/GMT+5 Etc/GMT+12 Etc/GMT-3
Etc/GMT-0 Etc/GMT-13 Etc/GMT+4
Etc/GMT-12 Etc/GMT+7 Etc/GMT+11
Etc/GMT-1 Etc/GMT W-SU
CET Cuba Antarctica/McMurdo
Antarctica/Davis Antarctica/South_Pole Antarctica/Casey
Antarctica/Vostok Antarctica/Syowa Antarctica/Rothera
Antarctica/Mawson Antarctica/Macquarie Antarctica/Palmer
Antarctica/DumontDUrville Pacific/Chuuk Pacific/Noumea
Pacific/Saipan Pacific/Pitcairn Pacific/Marquesas
Pacific/Fiji Pacific/Tahiti Pacific/Majuro
Pacific/Funafuti Pacific/Yap Pacific/Midway
Pacific/Palau Pacific/Rarotonga Pacific/Chatham
Pacific/Auckland Pacific/Guam Pacific/Tarawa
Pacific/Truk Pacific/Apia Pacific/Efate
Pacific/Norfolk Pacific/Nauru Pacific/Johnston
Pacific/Wallis Pacific/Niue Pacific/Ponape
Pacific/Kiritimati Pacific/Pohnpei Pacific/Enderbury
Pacific/Port_Moresby Pacific/Galapagos Pacific/Tongatapu
Pacific/Gambier Pacific/Guadalcanal Pacific/Pago_Pago
Pacific/Kwajalein Pacific/Wake Pacific/Fakaofo
Pacific/Kosrae Pacific/Easter Pacific/Samoa
Pacific/Honolulu Portugal iso3166.tab
Privileged Threat Analytics