VP-VA Applications for Verify Privilege Vault
Once you have setup Verify Privilege Vault and Verify Privilege Vault Analytics to work together, you can begin normal operations. During a typical session with VP-VA, you will use various tools, including the tools summarized in the table below.
Name | Description |
---|---|
Dashboard | Displays several key indicators neatly assembled on quick-view tiles |
Privileged Behavior Alerts | Lists VP-VA-issued alerts based on abnormal Secret access and Admin action patterns, according to thresholds you set; includes current alerts and access to retired alerts |
User Watch List | Assembles information about users whose activity accessing Secrets has attracted your specific scrutiny |
Secret Event Clock | Displays temporal patterns and filters data by User, Secret, and IP/location |
Secret Event Graph | Shows users accessing Secrets, designed to reveal anomalous patterns |
Secret Event IP Map | Maps out Secret accesses, aggregated by IP address and location |
Most Active Secrets | Reveals which Secrets have been most accessed |
Most Active Users | Identifies users accessing more Secrets than most other users |
Admin Actions | Contains a suite of analytics on administrative activity, including: Clock, Graph, IP Map, and Most Active Admins and Actions |
Secret Details | Runs down all recent access activity for specific Secrets as well as characteristics of the Secret |
User Details | Allows you to explore in detail information collected about a specific user’s activity |
IP Address Details | Shows IP address activity summary and location information (for Verify Privilege Vault instances that record user IP) |
Enables data query for secrets and allows export for criteria you specify | |
Query | Enables data query for administrator actions and allows export for criteria you specify. |