BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

PowerBroker for Windows, Best Known Secrets – Collections

Post by Morey Haber October 1, 2012

One of the best-known secrets about PowerBroker for Windows is the ability to logically group rules into Collections. This Best Practice allows you to organize rules based on almost any criteria and treat multiple rules as a single entity. This feature is most useful when:

  • Rules require the same item-level targeting
  • Organizing rules into physical groupings for ease of maintenance or review
  • Creating rule groups based on abstract terms like department, application, or even denied applications or websites
  • Enforcing that all sub-groups or rules inherentthe same action
  • Storing obsolete or temporary rules
  • Staging rules that are used for testing before inserting them into production. (This works best with Item Level Targeting).

Below are sample rule Collections that can be considered for any organization:

  • Operating System Elevations for managing tasks inherent to the OS. Sample rules in this group are for items like modifying the system clock, running defrag.exe, or even adding an ODBC driver.
  • Website Explicit Deny rules are for creating Internet Explorer policies that block specific websites. In this example, rules contain the blocking of websites that are against corporate policy. These rules would be processed regardless of whether the user is on the corporate network or logging on remotely.
  • The Engineering Department Allowed Collection is an abstract collection of rules that utilizes Item Level Targeting to allowapplications like VMware workstation or AutoCad to operate correctly for specific subnets.
  • Discovery is a sample collection with passive rules strictly used to discover applications that are being executed with administrative privileges.

Logically building these groups is a best practice that all organizations should consider as a part of their deployment. Just like you build folders and tree structures in Active Directory, you can do the same with PowerBroker for Windows policy collections.

The ordering of collections and the rules they contain is equally as important as the rules themselves. The order number for each rule and collection is displayed in the Order column of the PowerBroker snap-in user interface. A sample screenshot is below:

 

It is important to note that, a collection and a rule can have the same order number since rules are children of collections. No two collections can have the same order number nor can any two rules within anycollection.

When building collections and rules, the following best practices govern rule-processing order:

  • Within each Group Policy Object (GPO), rules are processed sequentially from highest order number to lowest, and only the first rule that targets an application takes effect.
  • When a rule and a collection have the same order number, the individual rule is processed before the collection.
  • When a rule collection contains a sub-collection, rules in the parent collection are processed first, and then rules in the sub-collection are processed.
  • Rule collections are automatically assigned an order number when they are created. You can change the order number of a collection by selecting the collection in the Group Policy Management Editor and clicking the Move the selected item up or Move the selected item down arrow buttons in the menu bar.

For more information on how to take advantage of collections, please visit our site.

Tags:
, , , , ,

Additional articles

BI-5.1-user-asset-visibility-img

Understanding Who Has Access to What with BeyondInsight v5.1

Today, it’s my pleasure to introduce you to BeyondInsight version 5.1, the latest release of our IT Risk Management platform, which unifies several of our solutions for Privileged Account Management and Vulnerability Management. BeyondInsight v5.1 embodies BeyondTrust’s mission to give our customers the visibility they need to make smart decisions and reduce risk to their…

Post by Morey Haber April 15, 2014
Tags:
, , , , , , , , , , , ,

PowerBroker for Unix & Linux Now Available via Web Services

This week BeyondTrust released a fully functional Web Services interface (REST API) for its PowerBroker for Unix & Linux product.  With this new feature users of the solution will now be able to remotely and securely configure and retrieve data via the API.  The Web Services interface implemented by BeyondTrust is an industry standard that…

Post by Paul Harper April 10, 2014
Tags:
, , , , ,

Heartbleed – When OpenSSL Breaks Your Heart

You’ve likely heard about the recent OpenSSL vulnerability, CVE-2014-0160, dubbed Heartbleed. The main takeaway of this vulnerability is that attackers can use this to obtain things like secret keys used for X.509 certificates, user names and passwords, instant messages, emails, and other highly sensitive information. For a technical analysis of the bug, check out this…

Post by BeyondTrust Research Team April 8, 2014
Tags:
, , ,