Creating Discovery Rules
Discovery account rules automatically create secrets or send emails when local accounts that match the rule criteria are discovered.
Discovery dependency rules automatically add discovered dependencies to existing secrets when rule criteria are met—no secrets are created.
Creating Local Account Rules
Discovery account rules are search queries against the accounts found by discovery (and visible in the discovery network view). When these rules are created and run, accounts that match rules can be automatically imported as secrets. When matches are found, email notifications can also be sent out. The rule order determines the rule application order. Drag rules to reorder them. Rules can specify a combination of the domain or OU, the computer name and the account name.
To create a rule:
-
Click Admin > Discovery. The Discovery Sources tab of the Discovery page appears:
-
Click the Configuration tab:
-
Click the Import Rules button. The Discovery Rules page appears:
Notice that a "import everything found" rule already exists.
The rule order determines the order in which the rules are applied. Drag rules to reorder them. -
Click the Create Rule button. The Rule page of the New Rule wizard appears:
-
Type the name for the new rule in the Name text box.
-
Type a description in the Description text box. At a minimum, leave the suggested log on account name as is.
-
Ensure the Active check box is selected.
-
Click the Next button. The Source page of the wizard appears:
-
Click the Discovery Source link to select a discovery source or container (folder). The Discovery Source or Container popup appears:
When you click a domain or subfolder with no children, the popup automatically disappears, and the information you chose appears on the Source tab:
-
If you want the rule to apply to children of what you chose, ensure the Include Children check box is selected.
-
Click the Scan Template dropdown list to select an output scan template. For a standard discovery configuration, without scripted scanners, there should only be one option here. If you added multiple local account scanners, then you can select one of their output scan templates. This limits the rule to the output results of scanners with the listed output template.
-
(Optional) Filter when the rule applies:
Using a discovery rule as a search filter only applies to accounts that are found on computers in the OUs included in the discovery scan. To change those settings, modify the AD source to include more OUs or the entire domain.-
(Optional) Type any computer name substring to filter the rule in the Computer Name Contains text box.
-
(Optional) Either if you want to add any of the following parameters to the computer name portion of the rule (one must apply), click to select the unlabeled AND/OR dropdown list and select OR. Or if you want to mandate using any of the following parameters in addition to the computer name portion of the rule (all must apply), select AND.
-
(Optional) Type any account name substring to filter the rule in the Account Name Contains text box.
-
(Optional) If you chose to use it, type any OS name substring to filter the rule in the Operating System Name Contains text box.
The AND/OR dropdown can radically change your results, so carefully think it through. The OS name is ANDed by default—it cannot be ORed.
-
-
Click the Next button. The Secret tab appears:
This is where you add creating secrets as accounts are discovered to the rule.
Your previous choice of scan template (on the Source tab) alters the follow-on parameters on this tab. -
Click the Secret Type dropdown list to select the secret template the new secret will originate from.
-
Click the Folder link to select a folder for the new secret to belong to.
-
Click the New Secret Permissions dropdown list to select whether you want secrets to copy (standalone) or inherit (change with the folder) the permissions from the folder.
-
Type the naming convention for the new secret in the Secret Name text box. You may use dependency tokens for the name. We automatically suggest a naming convention based on the hostname and username.
-
Click the Site dropdown list to select the Secret Server local installation or a distributed engine to run the rule from.
-
Click the Next button. The Password tab appears:
-
Click to select I know the current password selection button if you do not want Secret Server to change the account password when the secret is created. If you want Secret Server to change it, choose the other option.
-
If you chose to change the password, addional selection buttons appear:
Remote password changing must be enabled to change the password. -
Either click the I want to choose… selection button if you want all the new secrets to have the same password, which you can later change. Or Click the I want a new random password… selection button to have Secret Server create a strong password for the secret.
-
Click the Next button. The Import Password tab appears:
For the random password choice, you see:
-
If you chose a random password:
- Type the new password for the account used to take over the accounts for the password change in the New Password text box. This is not the password for the created secret.
- Click the Password Type dropdown list to select a password template.
- Click the folder link to select the existing secrets to use for taking over the accounts.
- For Unix Rules, select the password type command set for taking over the account. You can hold your cursor over the eye icon to see the commands to be used to change the password.
-
Type the password to use in the Current Password text box.
-
Click the Next button. The Password Changing tab appears:
If you do not have RPC enabled, you will see this instead:
-
Click to select the password changing selection button to choose whether you want to access the accounts with a secret credential or a privileged account. If you choose the latter, you will be prompted to select a secret for that account.
-
Click the Next button. The Alerts tab appears:
-
Click to select the Send Email Alert for Accounts Found check box. Additional controls appear:
-
Click to select the Subscribed Users selection button to choose who receives an email alert. If you select Notify Subscribed User(s) a text box appears for you to add email addresses. Other wise Secret Server discovery admins receive one.
-
Click the Finish button. The rule is created.
Creating Dependency Rules
Dependency rules automatically add dependencies (Windows services, schedule tasks, application pools) to existing secrets. You can receive email notifications of linkages by adding an event subscription in the Event Subscriptions page. Rules can specify a combination of the domain or OU.
-
Click Admin > Discovery. The Discovery Sources tab of the Discovery page appears:
-
Click the Configuration tab:
-
Click the Import Rules button. The Discovery Rules page appears:
-
Click the Dependency Rules tab:
-
Click the Create Rule button. The New Rule page appears:
-
Click the Discovery Source link to select a discovery source or container (folder). The Choose Org Unit popup appears:
When you click a domain or subfolder with no children, the popup automatically disappears.
-
Click the Scan Template dropdown list to select an output template.
-
Click the Dependency Template dropdown list to select a dependency template.
-
Click the Site dropdown list to select the Secret Server local installation or a distributed engine to run the rule from.
-
Click the Privileged Account link to choose a secret for the scanning account.
-
Click to select the Windows Services: Restart on Change check box if you want the services restarted after discovery.
-
Click the OK button.