Audit
Delinea Insights provides the core services for security and analytics. These include:
AI-Driven Auditing (AIDA)
This feature is currently available only to customers participating in a Public Preview. For details, see Public Preview
AIDA (AI-Driven Audit) automatically reviews privileged SSH and RDP recordings with computer vision and large language model (LLM) analytics. It turns hours of video into a searchable audit trail, pinpointing elevated commands and risky behavior so PAM, security and audit teams can find answers in seconds.
Data Privacy and Processing
Delinea uses Azure Computer Vision (ACV) and Azure OpenAI, both services provided by Microsoft, to enhance our offerings. Key data handling and privacy features include:
-
Regional Data Hosting: All data is hosted and processed within the same region that you have selected for your cloud operation, ensuring compliance with regional data handling regulations.
-
Data Deletion After Processing: When Azure Computer Vision and Azure OpenAI finish processing data from a Delinea Platform session recording, the data is immediately deleted from Azure and not retained by Microsoft. This ensures that evaluation data is handled securely and transiently.
-
No AI Training with Customer Data: Delinea does not use customer recordings or data to train AI models. We are committed to ensuring that customer data is used strictly for the purpose of delivering the services requested and maintaining privacy and integrity.
Session Recording
-
The Session Recording page lists every captured session, live or completed and shows which ones have already been analyzed by AIDA. For analyzed sessions, you’ll see AI-generated labels, and a one paragraph summary. A label filter lets you instantly surface sessions containing specific actions (e.g., Privilege Elevation or IAM).
-
See Analyzing a Recording with AIDA for details regarding analyzed sessions.
-
Recordings and analysis are based on three synchronized data streams:
-
Visual frame OCR – High resolution screen shots processed with OCR to read on-screen text (commands, output, file paths, SQL queries, etc.)
-
Keystroke log – Time stamped command input with window focused context
-
Process trace – Background processes spawned during the session for full situational awareness.