BeyondTrust

Security In Context

Bringing you news and commentary on solutions and strategies for protecting your critical IT infrastructure.

Tech Tip: PowerBroker for Windows 6.0 Sneak Peek

Post by Peter Beauregard May 16, 2013

Have you ever wanted to see what activities someone has performed inside one of your line-of-business apps for troubleshooting purposes? Maybe you just want to monitor what activities a network administrator performed on your Exchange Server to track down a configuration change. Well, we’ve got an exciting new feature in the upcoming release of PowerBroker for Windows, version 6.0, called Session Monitoring.

In version 6.0, you will be able to turn on Session Monitoring for any application, or even the whole Windows session, and record any activity that the user performs. By monitoring activities, you can much more easily troubleshoot problems, research configuration changes, or investigate malicious use.

The output that Session Monitoring captures is stored in Retina CS for review, and it captures a slideshow of the user activities, instead of an actual raw video of the screen. The advantages of this technique are:

  1. Better client side performance, it’s totally transparent to the end user
  2. Less storage requirements for recordings, we’re only storing screenshots, not raw video
  3. Easy review of the output, you don’t have to watch hours of video to find a needle in a haystack
  4. Accompanying text output is easily readable

Here’s a screenshot of what the console view looks like:

session-viewer-pbw

To configure policies for Session Monitoring, you simply check a box inside a PowerBroker for Windows rule:

local-computer-pbw

This allows you to record a specific application based on publisher information, hash, path, etc., or you can record every activity performed in the Windows session.

Look for the new release of PowerBroker for Windows 6.0, in early June.

Tags:
, , , , ,

Leave a Reply

Additional articles

BI-Qualys-Connector-IMG1

Getting More Value from QualysGuard Vulnerability Data with BeyondInsight v5.1

If your vulnerability assessment scans can’t produce meaningful and actionable reports, performing a scan does no good for anyone. If you’ve read my other blog posts, you know I have no qualms about stating that BeyondTrust provides the best vulnerability reporting in the industry. Ask your favorite analyst and they’ll tend to agree. Of course,…

Post by Morey Haber April 18, 2014
Tags:
, , , , , , , ,
insider-threat-fed

Mitigating Inside Threats to U.S. Federal IT Environments

Recent high-profile cases have increased the perceived risks that go along with disclosure and usage of confidential information. One of the most difficult security threats to mitigate is an attack from the inside. When an over-privileged user, such as an unhappy current or former employee, contractor, or consultant, begins navigating your network, how will you…

Post by BeyondTrust Software April 17, 2014
Tags:
, , , , ,

Are you a Target? Investigating Security Breaches with Kevin Johnson

Last week, over 1,000 IT security professionals watched as Kevin Johnson, CEO of Secure Ideas, presented his expert opinion on lessons learned from recent, high-profile retail breaches. Here’s a summary of key takeaways from the webcast plus an on-demand recording of the full, 60-minute presentation. Understanding the “why” behind attacks According to Kevin, the primary…

Post by Chris Burd April 17, 2014
Tags:
, , , , ,