Computers Inventory
The platform's Computers inventory provides an asset-centric view of all computers discovered using the Secret Server The Delinea secrets vault. Delinea Secret Server is an enterprise-grade secrets storage vault for securely storing, managing, and controlling access to privileged credentials and other sensitive data. See Secret Server on Platform, Secret Server Cloud (SSC), and Secret Server on Premises (SSOP) for distinctions. discovery service in one place—the Inventory page. From there you can efficiently manage and initiate remote sessions on your computer assets. To learn more about Secret Server
The Delinea secrets vault. Delinea Secret Server is an enterprise-grade secrets storage vault for securely storing, managing, and controlling access to privileged credentials and other sensitive data. See Secret Server on Platform, Secret Server Cloud (SSC), and Secret Server on Premises (SSOP) for distinctions.’s discovery service, see Secret Server
The Delinea secrets vault. Delinea Secret Server is an enterprise-grade secrets storage vault for securely storing, managing, and controlling access to privileged credentials and other sensitive data. See Secret Server on Platform, Secret Server Cloud (SSC), and Secret Server on Premises (SSOP) for distinctions. Discovery.
Currently, the default platform user role does not provide permissions to view the Computer inventory. To allow users to view inventory, an administrator must create a custom role with permissions to view the inventory (View Computers - delinea.assets/computer/view) and launch PRA A feature of Delinea Platform that enables secure remote access to computers that is audited and session recorded. Formerly Remote Access Service (RAS). sessions into the assets, and then assign the role to appropriate users and groups.
Inventory is available only for Platform instances connected to Secret Server The Delinea secrets vault. Delinea Secret Server is an enterprise-grade secrets storage vault for securely storing, managing, and controlling access to privileged credentials and other sensitive data. See Secret Server on Platform, Secret Server Cloud (SSC), and Secret Server on Premises (SSOP) for distinctions. Cloud. It is not available for customers using the platform with Secret Server
The Delinea secrets vault. Delinea Secret Server is an enterprise-grade secrets storage vault for securely storing, managing, and controlling access to privileged credentials and other sensitive data. See Secret Server on Platform, Secret Server Cloud (SSC), and Secret Server on Premises (SSOP) for distinctions. On Premises.
Viewing Your Computers Inventory
Follow the procedures below to access a computer asset's basic and detailed information or launch a session into an asset.
Once Secret Server The Delinea secrets vault. Delinea Secret Server is an enterprise-grade secrets storage vault for securely storing, managing, and controlling access to privileged credentials and other sensitive data. See Secret Server on Platform, Secret Server Cloud (SSC), and Secret Server on Premises (SSOP) for distinctions. discovery has been enabled and configured, you can view your Computers inventory through the platform interface by selecting Inventory from the left navigation panel, then selecting Computers. The Inventory page displays a table with each computer asset in a row, and columns displaying basic information including the computer name, type, and domain. To adjust what data columns are displayed, click the column options icon just above the table on the right, and select or deselect boxes next to the column labels.
Searching Your Inventory
Using Query Builder
The query builder is an advanced search mechanism that allows users to create complex searches based on the information available.
Drilling into Details
If you click any empty space in a computer asset row, a panel opens on the right displaying details about the computer, such as the computer type, domain, DNS name, Active Directory OU, client version, and zone. The panel also displays links you can click to view more details or launch a remote session.
To see even more details, click the Details link in the panel. A page appears with more information about the selected computer. You can reach the same detail page by clicking the computer's name in the Inventory list. On the computer details page, the Details tab shows additional information, such as the preferred site and date the computer joined the zone. The Policies tab (available to PCS Privilege Control for Servers (PCS) carries the PAM capabilities of the Delinea Platform into the individual servers and computer endpoints in your corporate network. customers only) shows which PCS
Privilege Control for Servers (PCS) carries the PAM capabilities of the Delinea Platform into the individual servers and computer endpoints in your corporate network. policies include this computer as a target. See Step 9: Set Up PCS Policies.
If you want to launch (log A record of background events typically related to systems, performance, outages, etc. A log is typically consumed by IT/Ops to help them ensure that things are running optimally and delivered according to the appropriate SLA. in to) a computer asset, click one of the launch options on the panel: Launch with Secret
A piece of information that is stored and managed in the Delinea Secret Server vault. Typical secrets include privileged passwords on routers, servers, applications, and devices. Files can also be stored in secrets, such as private key files, SSL certificates, license keys, network documentation, Microsoft Word or Excel documents, and more. Secrets are derived from secret templates., Launch with My Account, or Launch with Manual Credential.
Launch with Secret
You can log A record of background events typically related to systems, performance, outages, etc. A log is typically consumed by IT/Ops to help them ensure that things are running optimally and delivered according to the appropriate SLA. on to any target system on the Delinea Platform by leveraging a vaulted credential from Secret Server
The Delinea secrets vault. Delinea Secret Server is an enterprise-grade secrets storage vault for securely storing, managing, and controlling access to privileged credentials and other sensitive data. See Secret Server on Platform, Secret Server Cloud (SSC), and Secret Server on Premises (SSOP) for distinctions.. When selecting this option, vaulted credentials associated with that machine will appear and you will be prompted to select a secret
A piece of information that is stored and managed in the Delinea Secret Server vault. Typical secrets include privileged passwords on routers, servers, applications, and devices. Files can also be stored in secrets, such as private key files, SSL certificates, license keys, network documentation, Microsoft Word or Excel documents, and more. Secrets are derived from secret templates. to launch with.
Launch with My Account
You can log A record of background events typically related to systems, performance, outages, etc. A log is typically consumed by IT/Ops to help them ensure that things are running optimally and delivered according to the appropriate SLA. in to an enrolled Linux system with the same account you use to log
A record of background events typically related to systems, performance, outages, etc. A log is typically consumed by IT/Ops to help them ensure that things are running optimally and delivered according to the appropriate SLA. in to the Delinea Platform, either from the platform or by using a native application that uses SSH, SCP, or SFTP.
Launch with Manual Credential
Selecting Launch with Manual Credential allows you to launch manually in to a target system with a valid username and password. Depending on how authentication Authentication is a way for a user to prove that they are still the person they claimed to be during the identification phase by inputting something a person knows, such as a password or security question; something a person has, such as a token, smartcard, ID card, or cryptographic key; or something a person "is," using biometric data such as a fingerprint or facial scan. rules and authentication profiles
On the Delinea Platform, an authentication profile specifies the authentication challenges required to log in to the platform and the length of time that must elapse before a user is prompted for authentication again. are configured for the system and account, you might be required to respond to additional authentication challenges
A mechanism on the Delinea Platform to challenge a user attempting to log in. Examples include password, phone call, email confirmation code, and security questions. before logging
A record of background events typically related to systems, performance, outages, etc. A log is typically consumed by IT/Ops to help them ensure that things are running optimally and delivered according to the appropriate SLA. on.
Disabling Active Inventory
To disable the inventory view, take the following steps:
-
Click Settings from the left navigation, then select Administration below Secret Server
The Delinea secrets vault. Delinea Secret Server is an enterprise-grade secrets storage vault for securely storing, managing, and controlling access to privileged credentials and other sensitive data. See Secret Server on Platform, Secret Server Cloud (SSC), and Secret Server on Premises (SSOP) for distinctions..
-
On the Secrets
A piece of information that is stored and managed in the Delinea Secret Server vault. Typical secrets include privileged passwords on routers, servers, applications, and devices. Files can also be stored in secrets, such as private key files, SSL certificates, license keys, network documentation, Microsoft Word or Excel documents, and more. Secrets are derived from secret templates. Administration page, click Platform Integration below Tools & Integrations. The Platform Integration page opens to the Configuration tab.
-
Click Edit.
-
Next to Forward Inventory Data to Platform, deselect the box. This action will prevent your tenant from incorporating newly detected computers. It will not impact any previously discovered computers.
PCS Policies
To meet your compliance requirements, you can assign policies precisely tailored to individual computers, ensuring that each asset operates securely and efficiently within your infrastructure. To learn more about assigning machine level policies, see PCS Policies.
For related content, see Using Computer Collections