Getting Started Overview - Cloud

The following topics provide a guided path through the instance setup and subsequent initial sign-in steps of a cloud Verify Privilege Manager instance.

If you are targeting macOS based endpoints, refer to Getting Started with macOS.

Rollout Recommendation

Familiarize yourself with the concept. IBM Security recommends a phased roll-out between the Application Control and Local Security, for example:

  1. Best Practice: Policy Feedback: Set up learning mode policies on a group of test endpoints to learn about applications running on your endpoint machines (Monitoring Policies (Learning Mode))
  2. Local Security: Begin with Local Security (only) and defining local group membership (Local Security | Manage Local Users)
  3. Application Control: Tailor your policies so that they won't disrupt employee work (Elevation Policies) but will block known malicious applications (Creating Policies | Example: Quarantine Specified Malware). Implement these basic policies across agents in production
  4. Application Control: Continue to tailor policies according to employee roles. Create a "Request Access" system for any unknown applications. (Application Execution Requires Approval (Workflow))
  5. Local Security: Once a workflow has been established between employees and the Verify Privilege Manager Helpdesk, begin managing all local privileged accounts (ex: local admins) on endpoints. (Local Security | Details Tab)

Local Security

Refer to the Local Security documentation pages to learn more about:

Application Control

Refer to the Application Control documentation pages to learn more about:

Integrations

Refer to the Integration documentation pages to learn more about:

Reports & Troubleshooting

Refer to these documentation pages to learn more about:

Catalogs & Reference Guides

Refer to these documentation pages to learn more about: