7 total results found
Procedure to deploy PAM
Introduction PAM is the process that determines who has access to what types of information as it creates an integrated view of risk, threats, and controls. Implementing a policy of least privilege minimizes unnecessary privilege allocation to ensure access ...
Description The Network discovery tool will be in charge to scan the networks to find the hosts and retrieve information about user accounts. Network discovery can detect system accounts as well. First of all, you need to create the networks that you want to...
Definition Soffid allows you to define rules to detect commands executed on a server. When a user launches a command defined on a rule, Soffid will detect it. To use that rules you need to define the PAM policies. For more information, you can visit the PAM ...
Definition Privileged Access Management (PAM) policies are a set of guidelines and controls that dictate how privileged access is granted, managed, and audited within an organization. Soffid allows you to define policies, those policies can be made up of sev...