Configure audits

In PSM, you can further refine the settings for your audit.

  1. In PVWA, click ADMINISTRATION and then click Platform Management to display a list of supported target account platforms.

  2. Select the platform to configure, then click Edit; the settings page for the selected platform appears.

  3. Expand UI & Workflows, and right-click Privileged Session Management.

  4. From the pop-up menu, select Add Audit Settings; a new parameter is added to the Privileged Session Management settings.

  5. Right-click Audit Settings and select the audit settings you want to disable or customize from the pop-up menu.

    SQL Level Audit

    To disable or customize SQL Level Audit for PSM-Toad and PSM-SQLPlus connection components using this platform:

    1. Right-click Audit Settings and select Add SQL Level Audit from the pop-up menu.

    2. By default, SQL level auditing is enabled for the supported connection components.

    3. To disable auditing for these components, set the value of Enable to No in the Properties list.

    4. Configure advanced properties to determine how PSM manages audit records. For more information about these properties, refer to References.

    SSH Keystrokes Audit

    To disable or customize SSH Keystrokes Audit for PSM-SSH, PSMP-SSH or PSM-Telnet connection components using this platform:

    1. Right-click Audit Settings and select Add SSH Keystrokes Audit from the pop-up menu.

    2. By default, SSH keystrokes auditing is enabled for the supported connection components.

    3. To disable auditing for these components, set the value of Enable to No in the Properties list.

       

      This configuration affects SSH Keystrokes Audits in both PSM and PSM for SSH.

    4. To audit SSH keystrokes, PSM uses the shell prompt of the target system to understand text that was entered by the end-user. As different systems and devices have different prompts, you can configure the regular expression that represents the shell prompt so that PSM is able to recognize the text entered by the user.

      In addition, you can configure whether the session continues without an audit, or is terminated if the shell prompt is not recognized.

      • To configure the regular expression, use the ShellPromptForAudit parameter.

      • To configure whether the session continues without an audit, or is terminated if the shell prompt is not recognized, use the TerminateOnShellPromptFailure parameter.

    5. Configure advanced properties to determine how PSM manages audit records. For more information about these properties, refer to References.

    Windows Events Audit

    To disable or customize Windows Events Audit for all connection components using this platform:

    1. Right-click Audit Settings and select Add Windows Events Audit from the pop-up menu.

    2. By default, Windows events auditing is enabled for the supported connection components.

    3. To disable auditing for these components, set the value of Enable to No in the Properties list.

    4. Configure additional properties to determine how PSM manages audit records. For more information about these properties, refer to References.

    Universal Keystrokes Audit

    To disable or customize Universal Keystrokes Audit for all connection components using this platform:

    1. Right-click Audit Settings and select Add Keystrokes Audit from the pop-up menu.

    2. By default, universal keystrokes audit is enabled for the supported connection components except PSM-RDP.

    3. To disable auditing for any component, set the value of Enable to No in the Properties list.

    4. To enable these recordings for other platforms, set the value of Enabled to Yes.

    5. Configure advanced properties to determine how PSM manages audit records. For more information about these properties, refer to References.

  6. To save your changes, do one of the following:

    • Click Apply to save the new parameter values and stay in the platform settings page.
    • Click OK to save the new parameter values and return to the System Configuration page. The changes are applied after the period of time specified in the ConfigurationRefreshInterval parameter.

Configure Windows events text recording and Windows events auditing

On the target machine, PSM requires the following:

  • A share called admin must be available on the target server.

  • Make sure the SERVER Windows service is running.

  • In the firewall, open TCP port 445.

  • The account used to access the target machine must belong to the Administrators Group.

 

To enable Detailed Session Auditing, PSM installs a service named CAInvokerService.exe on the target machine. The service starts when a new session is initiated, and stops immediately after the session is established.

Filter SQL command audits

PSM can filter SQL command audits that are recorded during PSM-Toad and PSM-SQLPlus connections to minimize unwanted audit records, reducing the number of audit records stored in the Vault and increasing server performance. Filters can be created at system level to apply to all SQL commands issued through PSM connections, or at platform level to apply to SQL commands issued through connections that are linked to a specific platform.

You can define lists to filter commands that are recorded according to the following criteria:

Commands to audit

An allowlistis a list of SQL commands that are included in the command audit records. All other commands are not included. By default, all commands that are issued during privileged sessions are audited. However, after you create an allowlist, only the listed commands are audited, if they do not appear in the denylist.

Commands not to audit

A denylistis a list of SQL commands that are excluded from audit records. All other commands are included.

By defining denylists and allowlists, you assert granular control over audit records in the Vault and determine exactly which commands are audited. These lists are created in audit filter rules as regular expressions which define specific commands. You can create as many rules as you require for denylists as well as allowlists, as well as lists that combine them both.

 

Denylist:

By default, PSM includes a single denylist that excludes the multiple commands that are issued automatically at the start of each Toad session. These commands are predetermined as part of the Toad setup, and are not relevant to the privileged session, other than to start it. This denylist excludes these commands from the session audit, and reduces the number of audit records stored in the Vault.

 

Allowlist:

The following example describes an example of when you would require an allowlist: You wish to audit all DDL queries such as ‘update’, ‘insert’, and ‘delete’ so that you know who issues these commands, when, and from which station. However, you don’t need to audit other commands that are issued. You can create an allowlist that contains these commands, ensuring that every time these specific commands are issued during the privileged session, they are audited.