CyberArk
The CyberArk Identity Security Platform enables secure access for any identity — human or machine — to any resource or environment from anywhere, using any device. It combines secure SSO, adaptive MFA, lifecycle management, directory services and user behavior analytics for seamless and secure access for all identities. It applies intelligent privilege controls, as well as differentiated controls to secure unique needs and access sensitive data.
CyberArk EPM dashboard is a powerful tool for your endpoints having CyberArk EPM agent installed. It provides you with out of the box dashboards related to event management, policies and Computers as well as Policy audit events. CyberArk Endpoint Privilege Manager provides endpoint privilege security by removing local admin rights, enforcing role-specific least privilege, defending credentials, and protecting from ransomware — all while removing friction for end-users, streamlining their experience, and easing the load on IT Service Desk.
Getting data in
Source | Add-ons and Apps | Guidance |
---|---|---|
CyberArk |
Splunk platform |
Configuration |
CyberArk EPM |
Splunk platform |
Configuration The CyberArk EPM APP is a powerful tool for your endpoints that have a CyberArk EPM agent installed. It provides you with out-of-the-box dashboards related to event management, policies, and computers, as well as policy audit events. The CyberArk EPM App is built on the Splunk Add-on for CyberArk EPM. To use the app, when using the add-on configuration instructions in the document linked to above, be sure to do the following:
Use cases |