Getting Started with Analytics
Analytics on the Delinea Platform empowers PAM (Privileged Access Management) owners to prevent, detect, and stop breaches by continually monitoring alerts across the organization to identify early signs of threats. By analyzing platform audit logs, the system provides predefined security monitoring based on events such as secret usages, login activities, session launches, and more.
The analytics engine establishes a behavioral baseline for each user and identifies deviations from regular patterns. This enables detection of suspicious behavior and authentication breaches in near-real-time.
Analytics covers platform events and Secret Server Cloud events (if fully integrated via Platform Upgrade Center). On-premises installations are not supported.
Step 1: Configure Alert Settings and Add Trusted IPs
Before the analytics engine can effectively identify anomalous behavior, you should configure your organization's trusted IP addresses. This prevents false positives from legitimate corporate network activity.
-
Navigate to the Settings page.
-
Under Identify protection, select Alert settings.
-
Select the Threat tab.
-
Click Edit to customize the alert parameters
-
Add your organization's trusted IP addresses or CIDR ranges to the whitelist.
-
Include all corporate office ranges, VPN exit points, and known remote work locations.
-
Save changes to ensure alerts like User performed an activity from an abnormal location do not trigger for legitimate access.
Rationale
The analytics engine uses IP addresses to determine anomalous locations. By adding trusted IPs, you reduce noise from legitimate corporate activity while maintaining detection capability for actual threats.
Step 2: Define Crown Jewel Secrets
Crown Jewel secrets are your organization's most critical credentials that require enhanced monitoring. Access to these secrets will automatically generate alerts regardless of baseline behavior.
-
Select Settings from the left navigation..
-
Under Identify protection, select Alert settings.
-
Select the Threat tab.
-
Click Edit to customize the alert parameters
-
Identify secrets containing your most sensitive credentials (domain admin, production database, cloud provider root accounts, etc.).
-
Obtain the Secret IDs from Secret Server (visible in the secret's URL or details page).
-
Add the Secret IDs to the Crown Jewel secrets configuration.
-
Save the configuration.
Alert Behavior
The rule Access to crown jewel secrets triggers every time any user accesses a secret designated as a crown jewel, enabling immediate visibility into high-value credential usage.
Step 3: Review Generated Alerts
After initial configuration, allow the analytics engine time to establish baselines (minimum 10-14 days for most behavioral alerts). Then review the generated alerts to understand what the system tracks.
Select Threat Center from the left navigation to view the Alerts page.
You will encounter the following Alert types.
| Category | Alert Examples |
|---|---|
| Behavioral Alerts |
Login on weekend, Abnormal location, Irregular session, Suspicious user agent, Inactive user performed action |
| Activity Spikes | Abnormal spike in secrets view, session launches, file transfers, platform/SSC admin actions |
| Authentication | Rapid brute force, Stealthy brute force, MFA bombing, Atypical travel, Login to disabled account |
| Secret Access | Crown jewel access, User-rare secret access, Rare secret access in tenant, Suspicious platform action |
Action Items
Review each alert type and resolve alerts as appropriate. Unresolved alerts contribute to user risk scores. Click the Alert Name to view details and investigation context.
Step 4: Create Risk-Based Identity Policies
The analytics feature calculates a risk score for each user (Low, Medium, High, Critical, or N/A). You can leverage these scores to enforce adaptive MFA (Multi-Factor Authentication) requirements based on user risk level.
-
Select Access from the left navigation, then select Identity policies.
-
Create a new policy or select an existing policy to modify.
-
Select the Authentication tab.
-
In the Authentication Rules section, click Edit, then Add Rule.
Provide a descriptive Name (e.g., "High Risk Users - Enhanced MFA").
Select or create an Authentication profile requiring stronger MFA. For Authentication conditions, specify the risk levels (e.g., High, Critical) that should trigger this rule.
Click Add, then Save.
Recommended Policy
Create a policy requiring high/critical risk users to authenticate only from corporate IP ranges and complete MFA. This provides adaptive security that increases protection when risk is elevated without impacting normal users.
For Federated Users
Enable the Apply additional MFA after federation option and create a dedicated group for IdP-based identities to ensure risk-based controls apply to federated logins.
Step 5: Integrate with Security Operations via Webhooks
Analytics cases and alerts can be forwarded to SIEM (Security Information and Event Management) solutions via webhooks. This enables centralized security monitoring, correlation with other security events, and automated response workflows.
-
Select Settings from the left navigation.
-
Under General settings, select Webhooks.
-
Select Create Webhook.
Enter the Endpoint URL from your SIEM or SOAR platform.
In the Triggers section, configure event types to include analytics alerts and cases.
Click Save.
-
Click Verify Webhook to test the connection.