07WS PAS Install PSM
07WS PAS Install PSM
CyberArk Training
1
OBJECTIVES
2
REVIEW
3
VALUE OF PRIVILEGED SESSION MANAGEMENT
4
CYBERARK PRIVILEGED SESSION MANAGER
Databases
PVWA
HTTPS
1 Windows/UNIX
Servers
SIEM/Syslog
5
CONSIDERATIONS BEFORE INSTALLING
PSM
6
PLANNING CAPACITY
• The amount of storage in the Vault that is required for storing session recordings must be planned
before installation.
• The following considerations will help you determine the amount of Vault storage that you will need.
Consideration Description
Activity in your The number of concurrent sessions that the PSM will create and store
enterprise in the Vault determine the size of your implementation.
Recordings The length of time that recordings will be retained according to your
Retention Period enterprise audit policy
7
PSM SYSTEM REQUIREMENTS
8
PSM SYSTEM REQUIREMENTS
• Running resource-intensive applications like MS SQL Server Manager Studio, Toad, etc., on the
PSM server will result in lower concurrency
• Connections from client machines with more than one HD screen, or with a high-resolution screen
will result in lower concurrency
9
PSM SOFTWARE PREREQUISITES
10
SIZING CALCULATIONS (PSM SERVER)
11
SIZING CALCULATIONS (VAULT SERVER)
• (90 days) x (400 sessions/day) x (180 minutes/session) x (300 KB/minute) + 20GB = 1.96 TB
12
PREREQUISITES
(REMOTE DESKTOP SERVICES INSTALLATION)
13
PREREQUISITES
14
INSTALLATION AUTOMATION
15
INSTALLATION PREREQUISITES – BASIC PSM FUNCTIONALITY
16
INSTALLATION PREREQUISITES – REMOTEAPP
• To take advantage of the RemoteApp feature of PSM, there are additional prerequisites:
• RD Connection Broker
• RD Web Access
• PSM server must be a member of an Active Directory Domain
• Must be a Domain User with local admin rights on the host server when installing Remote Desktop Session
Host role
17
RDS PREREQUISITE INSTALLATION - SCRIPTED
18
REMOTE DESKTOP SERVICES INSTALLATION - SCRIPTED
19
REMOTE DESKTOP SERVICES INSTALLATION - SCRIPTED
20
RDSH PREREQUISITE INSTALLATION - MANUAL
21
SESSION COLLECTION
22
PSM INSTALLATION
23
PSM INSTALLATION INITIAL STEPS
24
PSM RECORDINGS DIRECTORY
25
PVWA CONFIGURATION SAFE - PVWACONFIG
26
VAULT CONNECTION DETAILS
27
VAULT USERNAME AND PASSWORD DETAILS
28
API GATEWAY
• Leave the host name field
blank and click Next >
29
PSM PKI AUTHENTICATION
• If configuring PSM PKI
Authentication, select the
check box and click Next >
30
RESTART
31
VERIFY INSTALLATION
32
VERIFY SERVER ENVIRONMENT
33
PSM INSTALLATION FOLDER AND SERVICE
• Components – This folder
contains the main PSM
configuration files and all
the executable files
required to run the PSM.
• Logs – This folder
contains the PSM activity
log files.
• Recordings – This folder
stores the session
recordings temporarily
until they are uploaded to
the Vault.
• The basic_psm.ini file is
the primary configuration
file for the PSM server.
34
PSM USERS
• These users are created
locally on the PSM Server:
• PSMConnect – used by
end users to launch a
session via the PSM.
• PSMAdminConnect –
used by auditors to
monitor live sessions.
35
VERIFY VAULT ENVIRONMENT
36
PSM SAFES
37
PSM SAFE
38
PSM RECORDING SAFES
39
PSM USERS AND GROUPS
• PSMGW_<MachineName>
• This is the Gateway user
through which the PSM
user will access the Vault
to retrieve the target
machine password.
• PSMApp_<MachineName>
• This user is used by the
PSM for internal
processing.
• The credential files for these
users is PSMGW.ini and
PSMApp.ini respectfully, and
are located on the PSM
server.
40
PSM USERS AND CREDENTIALS
Credentials are retrieved
from the Vault
RDP using PSMConnect
Unix
Administrator
PSMGW_PSM1
PSM1
Auditor
Credentials are retrieved from cred
file on PSM server: “PSMGW.ini “
RDP using PSMAdminConnect
41 41
PSM POST INSTALLATION
42
PSM POST INSTALLATION - SCRIPTED
43
PSM POST INSTALLATION - SCRIPTED
44
HARDENING AND SECURITY
(CONFIGURING RDP OVER TLS)
45
USE RDP OVER SSL
46
USE RDP OVER SSL
47
USE RDP OVER SSL
• Recommended to use a
certificate issued by a
trusted Certificate Authority.
48
USE RDP OVER SSL (TARGET MACHINES)
49
DISABLE PSM USERS’ SCREENSAVERS
50
PRINTERS CONNECTIONS
51
CONFIGURE PSM USER SESSIONS
52
HARDENING AND SECURITY
(HARDEN THE PSM SERVER )
53
PSM HARDENING - SCRIPTED
54
PSM HARDENING - SCRIPTED
55
PSM HARDENING - SCRIPTED
Final Step
56
RUN THE HARDENING SCRIPT AGAIN, IF NEEDED
• PSMHardening.ps1 is the
main hardening script. The
script will set permissions
appropriately on directories
and files.
• Edit PSMHardening.ps1 as
required before running the
script:
• To support Web
Applications, change the
value of parameter
$SUPPORT_WEB_APPLI
CATIONS from $false to
$true
• If the PSMConnect user
has been changed to a
domain user, update
$PSM_CONNECT_USER
to “Domain\PSMConnect”
57
RUNNING THE HARDENING SCRIPT AGAIN
58
ADDING APPLOCKER RULES
59
CONFIGURING APPLOCKER RULES
60
CONFIGURING APPLOCKER RULES
• If Method=“Publisher”
Applocker allows the client
application to launch and
does not check the hash
value
61
RUNNING THE APPLOCKER SCRIPT
• After adding the relevant rules,
run the AppLocker script:
PSMConfigureApplocker.ps1
• By default, after running the
script SQL*Plus will no longer
be allowed to run in the context
of a PSM connection
component on the PSM server.
• Edit
PSMConfigureApplocker.xml to
add SQL*Plus to the list of
allowed applications and run
the script again
• After adding SQL*Plus to the
whitelist, it will be enabled to
run in the context of the PSM-
SQL*Plus connection
component.
62
REGISTER THE PSM
63
REGISTER THE PSM
64
ENABLE AND CONFIGURE PSM
65
ENABLING PSM IN THE MASTER POLICY
PSM can be enabled globally for all accounts assigned to every platform, or selectively for only specific
platforms via exceptions to the Master Policy rule.
66
PSM SERVER CONFIGURATION
67
PSM PLATFORM SETTINGS
68
SUMMARY
69
OBJECTIVES
70
THANK YOU
71