Get Started with ETM Identity
ETM Identity helps organizations identify identity-related risks, monitor their security, and take steps to prevent threats. It is an integral part of a zero-trust security approach, which considers identities the main defense line.
Prerequisites
- ETM License
- ETM Identity License
- VM, PA application subscription
- Active Directory–specific policies and controls need to be configured in the Policy Audit application (optional).
ETM Identity Setup Journey
The following is an overview of using ETM Identity at a glance.
Step 1: Install the ETM Identity Agent
Install the ETM Identity Agent (Windows Agent 6.2.4.23) on the Domain Controller. To know more details on how to install the agent, refer to Cloud Agent Online Help.
Step 2: Activate ETM Identity
Open the Cloud Agent UI and activate ETM Identityfor domain controller. Refer to the Cloud Agent Online Help.
Step 3: Access ETM Identity in ETM as Cyber Risk Posture Management
- Log in to the ETM application.
- Navigate to the Cyber Risk Posture Management section where the ETM Identity is available.
- Once activated, the default ETM Identity dashboard is visible.
Step 4: View Asset Inventory
- The inventory section displays server assets where Active Directory services is installed.
Non-Windows servers do not appear in the inventory.
Step 5: Monitor Risks Automatically
After installing an Agent, the user interface may take several hours to update. Refresh your browser periodically to ensure you see the most up-to-date details. The first scan starts as soon as the ETM Identity module is activated on the agent.
- ETM Identity scans every 4 hours by default (customizable).
- Vulnerabilities are detected from both AD and server assets. Vulnerabilities identified by the agent during scans, provides an accurate view of the target environment.
- Misconfigurations are identified from AD only. Misconfiguration are based on policies and controls configured in Policy Audit application.
Step 6: View Attack Path Analysis
- Use the Attack Path Analysis feature to visualize potential attack routes.
- Follow remediation instructions to mitigate risks.