Default policies
This topic describes the default policies that you can deploy on new Sets from v21.8 when you implement EPM to manage organizational applications that are not currently handled by any other policy.
Overview
The Default Policies page provides an immediate view of all current default policies. You can set any of the policies to manage applications with a single click, in most of the relevant modes.
The purpose of Default Policies is to configure behavior of applications that are not covered by “explicit” application policies (Trusted Sources, Application Groups, Advanced Policies, etc.).
The EPM agent only applies one single action to an application when it is launched. Therefore, different parts of the behavior configuration are structured into hierarchy, and are based on the commonly recommended practice of EPM deployment.
The default policies are divided into Commonly used and Additional policies.
Commonly used policies include all the default policies that a new EPM customer usually implements, in order of priority and best practice.
First, deploy the Detect privileged unhandled applications policy (gradually expanding the group of endpoints where it is applied), then (immediately after or simultaneously) activate the Ransomware Protection policy. After deploying these policies to protect all your endpoints, gradually activate the Control unhandled applications downloaded from the internet policy and/or the Control unhandled applications policy.
The Additional policies tab includes two modes for special scenarios:
Scenario |
Additional policy |
---|---|
All is allowed |
Elevate unhandled applications |
All is forbidden |
Block unhandled applications |
These modes override the configurations set in any of the previous policies when they apply to (target) the same computers and users.
You can edit the default policies if you have the relevant permission. All the policies are displayed on the Default Policies page, but those that you cannot set or edit appear disabled.
When the EPM Set is created, all the default policies are in Off mode . However, after upgrade, any default policies that have been modified maintain their status and do not need to be reset.
Privilege management policies
The privilege management default policies determine how EPM monitors unhandled applications on endpoints and protects your environment from ransomware.
After creating the initial trusted sources and specifying which applications run with elevated privileges, you can define policies to monitor applications that are not yet managed by an EPM policy, also known as unhandled applications. All events are collected and displayed in the Manage events page.
These policies supervise various unhandled application events, including the following:
-
Launch events on Windows and macOS.
-
Execute sudo Linux commands.
-
Installation events on Windows.
-
Attempts to access the internet, intranet, network shares and memory of other processes on Windows and macOS.
Monitoring becomes effective for after a process is restarted. For example, access to network shares through Windows Explorer are only monitored after the next logon.
-
Activities on Microsoft Windows programs.
-
Activities on applications installed before the EPM agent was installed.
You can activate any of the privilege management policies in one click to apply the default policy settings. Alternatively, you can edit these policies and customize them for your organizational needs.
-
In the Policy line, click the mode to apply.
Policies
Detect
Restrict
Block
On/Off
Platform
Commonly used
Detect privileged unhandled applications
-
-
-
ü
Windows, macOS, Linux
Protect against ransomware
ü
ü
-
-
Windows
Control unhandled applications downloaded from the internet
ü
ü
ü
-
Windows
Control unhandled applications
ü
ü
-
-
Windows, macOS
Additional
Elevate unhandled applications
-
-
-
ü
Windows, macOS, Linux
Block unhandled applications
-
-
-
ü
Windows, macOS
-
Click Yes to accept the default settings.
Detect privileged unhandled applications
This policy detects privileged applications that are not managed by any other policy, which cannot run due to a lack of administrative privileges.
For more details, see Detect privileged unhandled applications.
Setting |
Description |
---|---|
Off |
Allows applications to run normally, with no policy or detection. |
On |
Applications run in detect mode. This does not restrict, block or elevate unhandled applications. |
Policy settings defined in this policy also apply to the computers and users targeted by other common Privilege Management policies:
|
Protect against ransomware
This policy detects or protects against ransomware, a malicious software that holds data files hostage while hackers demand payment to restore access. It is disabled when the Block unhandled applications policy is set to "On".
For more details, see Protect against ransomware.
Setting |
Description |
---|---|
Detect |
Detects unauthorized access to sensitive files by unhandled applications. This mode does not restrict unauthorized access and does not prevent ransomware attacks. |
Restrict |
Restricts unauthorized access to sensitive files by unhandled applications. This mode does not block or elevate unhandled applications, but it does prevent ransomware attacks. |
Policy settings defined in this policy also apply to the computers and users targeted by other common Privilege Management policies:
|
Control unhandled applications downloaded from the internet
This policy controls and monitors events triggered by installation and launch of applications downloaded from the internet that are not currently managed by any other policy. It also controls access to the internet, intranet, network shares and memory of other processes.
For more details, see Control unhandled applications downloaded from the Internet.
Setting |
Description |
---|---|
Detect |
Monitors activities of applications, but does not apply any restrictions. |
Restrict |
Allows applications downloaded from the internet to run with limited capabilities. |
Block |
Prevents applications downloaded from the internet from being run. Users cannot read, copy, or move these files. |
When applied to target machines, this policy merges with the Detect privileged unhandled applications and Protect against ransomware policies. |
Control unhandled applications
This policy controls and monitors events triggered by installation and launch of unhandled applications. It also controls access to the internet, intranet, network shares and memory of other processes.
For more details, see Control unhandled applications.
Setting |
Description |
---|---|
Detect |
Monitors activities of unhandled applications, but does not apply any restrictions. |
Restrict |
Allows unhandled applications to run with limited capabilities. |
When applied to target machines, this policy merges with the Detect privileged unhandled applications and Protect against ransomware policies. |
Elevate unhandled applications
This policy elevates privileged applications that are not managed by any other policy.
For more details, see Elevate unhandled applications.
Setting |
Description |
---|---|
Off |
Applications that are not managed by any EPM policy will run normally. This depends on other policies that EPM applies. |
On |
Applications that are not managed by any EPM policy will run in elevated mode. |
This policy overrides the commonly used Privilege Management policies for the same target computers and users. |
Block unhandled applications
This policy blocks applications for which no explicit behavior has been defined in Application policies. Unmanaged applications that are currently running will be terminated silently.
For more details, see Block unhandled applications.
Settings |
Description |
---|---|
Off |
Applications that are not managed by any EPM policy can be launched and will run normally. This depends on other policies that EPM applies. |
On |
Prevents applications that are not managed by any EPM policy from being launched. |
This policy overrides the commonly used Privilege Management policies for the same target computers and users. |
Privilege threat protection policies
The privilege threat protection default policies protect against threats to environments that retain user passwords, which are often similar to users' corporate passwords.
You can activate any of the privilege threat protection policies in one click to apply the default policy settings. Alternatively, you can edit these policies and customize them for your organizational needs.
-
In the Policy line, click the mode to apply.
Policies
Detect
Restrict
Block
On/Off
Platform
Commonly used
Protect against credentials theft and lateral movement
ü
-
ü
-
Windows
Create credential lures to detect and deceive attackers
ü
-
ü
-
Windows
-
Click Yes to accept the default settings.
Protect against credentials theft and lateral movement
This policy protect against threats to Microsoft Windows operating systems, Web browsers, and remote access and IT applications.
For more details, see Protect against credential theft.
Setting |
Description |
---|---|
Detect |
Monitors threat protection events. |
Block |
Prevents potential threats from being run. |
Create credential lures to detect and deceive attackers
This policy create lures in endpoints to deceive attackers and report them. Activities that are detected from this policy are displayed as attacks in the Threat Protection Inbox.
For more details, see Implement privilege deception.
Setting |
Description |
---|---|
Detect |
Monitors credential lures and activities performed by attackers with those fake credentials. |
Block |
Terminates processes that tried to authenticate with the fake credentials. |
Local Privileged Accounts Management policies
You can activate any of the Local Privileged Accounts Management policies in one click to apply the default policy settings. Alternatively, you can edit these policies and customize them for your organizational needs.
-
In the Policy line, click the mode to apply.
Policies
Detect
Restrict
Block
On/Off
Platform
Commonly used
Remove local administrators
-
-
-
ü
Windows, macOS, Linux
Rotate credentials of local privileged user accounts
-
-
-
ü
Windows, macOS
-
Click Yes to accept the default settings.
Remove local administrators
This policy enforces the least privilege principle through control over users who have administrator permissions on target computers.
For more details, see Remove local administrators.
Setting |
Description |
---|---|
Off |
Does not manage users and groups in the local administrators group. |
On |
Removes users and groups from the local administrator group, except specific sets of of users/groups defined by the EPM administrator. |
Rotate credentials of local privileged user accounts
This policy manages credentials by changing them at regular intervals. EPM can integrate with PVWA to manage credentials that are not always accessible from the network.
For more details, see Credentials Rotation.
Setting |
Description |
---|---|
Off |
Deactivates all credential rotation policies. |
On |
Applies all credential rotation policies. |
Set default policies
-
From the CyberArk Endpoint Privilege Manager Management Console, expand Policies, then select Default Policies.
The Default Policies page displays the policies and the modes you can set.
-
Set the default policies to apply. Each time you set a default policy, a message similar to this appears:
-
Click Yes to set the policy, using the default policy options and targets.
Edit a policy
In either the Commonly used or the Additional tab, in the policy row, click Edit.
Deactivate a policy
In either the Commonly used or the Additional tab, in the policy row, click Off.
Summary status
View the activities related to policies in the following pages.
Page |
What you can see and do |
---|---|
View the activities related to each policy and details of each activity. |
|
View the activities related to each policy and, where relevant, take action to apply a policy to protect endpoints immediately. |