Management Show Security PasswordsMinimum Password LengthSet rules for local user accounts regarding the length of passwords. Default Password ExpirationSet rules for local user accounts regarding how often passwords expire. Account Lockout AfterSet the number of times an incorrect password can be entered before the account is locked out. Require Complex PasswordsSet rules for local user accounts regarding the complexity of passwords. Enable Password ResetAllow users with configured email addresses to reset passwords. The link provided in password reset emails are valid until one of the following events occurs:
Account Lockout DurationSet how long a locked-out user must wait before being allowed to reattempt login. Alternatively, require an admin to unlock the account. Representative ConsoleTerminate Session If Account Is In UseIf a user tries to log in to the representative console with an account already in use, a checked Terminate Session box disconnects the previous connection in order to allow the new login. Enable Saved LoginsAllow or disallow the representative console to remember a user’s credentials. Log Out Idle Representative AfterSet the length of time after which an inactive user is logged out of the representative console to free the license for another user. Enable Warning and Logout Notification on Idle TimeoutSet if a user should receive a prompt before being logged out due to inactivity. The first notification occurs 30 seconds before logout and the second when logout has occurred. Default Representative Console Authentication MethodSelect the default authentication method. The authentication method selected here will be automatically selected on the logon page when the representative logs in to the representative console the next time after the setting is changed. Representatives can select a different method if needed. You can change the setting at any time. However, you must log off the representative console and log on again to see the change. Remove Representative from Session After InactivityThis option effectively pushes a user out of a session after the period of inactivity you select. This helps BeyondTrust customers meet compliance initiatives with inactivity requirements. The user is notified 1 minute prior to removal and may reset the timeout. A user is considered active in a session if any files are being transferred, whether through the file transfer tab or the chat interface, or if they click the mouse or press a key in the session tab. Mouse movement by itself does not count as activity. As soon as activity stops, the inactivity timer begins. Allow Mobile Representative Console and Web Rep Console to ConnectGive users the option of accessing remote systems through the representative console app for iOS and Android, as well as through the web rep console, a browser-based representative console. Display Thumbnail View in the Representative ConsoleWhen supporting a customer with multiple monitors, this option allows user to see thumbnail images of all available displays. These thumbnail images are not recorded in session recordings. Uncheck this box to show rectangles rather than thumbnails. Allow Representatives to Take Remote ScreenshotYou can allow users to capture screenshots of the remote desktop from the representative console. Allow Representatives to Control the Customer Client WindowEnabling this setting allows the representative to act as the user in the customer client window, including typing in the chat area, sending files, and interacting with links and buttons. When this setting is disabled, the representative's control of the customer client window is limited to moving and minimizing it. When requesting to elevate, allow credentials to be enteredWhen elevating a session to have administrative rights, allow users to enter credentials manually, inject them from a password vault, or provide them through a virtual smart card. This allows users to use authorized privileged credentials to elevate the context of the customer client. Once elevated, the customer client will run in the context of the local system. Allow Reboot with Cached Login CredentialsIn a support session running with administrative rights on a remote Windows™ computer, this allows a representative to reboot the remote machine without the customer's assistance by having the customer enter login credentials prior to the reboot. These credentials can be saved for the duration of the support session, allowing the machine to automatically log in when rebooted multiple times. Clipboard Synchronization ModeClipboard Synchronization Mode determines how users are allowed to synchronize clipboards within a screen sharing session. The available settings are as follows:
You MUST restart the software on the status page for this setting to take effect. Admins can prevent representatives from accessing the clipboard, can allow reps to send data to the endpoint, or can allow reps to have access in both directions (send and receive data). These settings control which clipboard icons the representative sees in the representative console when Manual mode is selected, as well as how the synchronization flows in Automatic mode. Granular control of access to the clipboard can be set for session policies and group policies, as well as granted to specific representatives. Please see the links below for each particular case: Session KeySession Key LengthThe Session Key Length can be set to any number of characters between 7 and 20. One Time Use Session KeyIf One Time Use Session Key is checked, a session key cannot be used more than once to create a support session. Maximum Session Key TimeoutMaximum Session Key Timeout sets the longest time for which a session key may remain valid. From the representative console, a user can set the lifetime of each generated session key up to but no longer than the time defined on this page. If the customer does not use the session key within the allotted time, the key expires, and the user must issue a new session key in order to run a session. Public PortalForce Public Site to Use HTTPSAdditional security can be obtained with Force Public Site to Use SSL (https). Using HTTPS forces the internet connection to your public support portal to be SSL-encrypted, adding an additional layer of security to prevent unauthorized users from accessing accounts. Block External Resources, Inline Scripts, and Inline Styles on the Public SitePrevent your public site from loading external resources, running inline scripts, or displaying inline styles. This option is effected by sending the Content-Security-Policy (CSP) HTTP header with a value of default-src 'self'. The CSP header tells the browser to ignore resources such as images, fonts, style sheets, scripts, frames, and other subresources from outside its own origin domain. It also ignores inline scripts and styles, whether included in the head or body of the page. This also affects inline scripts and styles added dynamically at runtime from JavaScript. Any resources you wish to use must be uploaded to the B Series Appliance at Public Portals > File Store. You should not enable this option if you have customized your public site template to use inline scripts, inline styles, or resources external to your BeyondTrust site. Enable Streamlined Session StartAttempt to start sessions using ClickOnce or Java. If this option is unchecked, the customer client must be manually downloaded and run. Disable Public Site IndexingCheck Disable Public Site Indexing to prevent search engines from indexing public sites hosted by your B Series Appliance. MiscellaneousDays to Keep Logging InformationIn Days to Keep Logging Information, you can set how long logging information should be stored on the B Series Appliance. This information includes the session reporting data and recordings. The maximum duration for which session reporting data and recordings can be retained on a B Series Appliance is 90 days. This is the default value in a new installation. It is possible that session recordings for some sessions within the retention time frame are not available. This could be caused by disk space constraints or the Days to Keep Logging Information setting. The BeyondTrust Appliance B Series runs a maintenance script every day that ensures disk usage does not exceed 90%. Should this be exceeded, the script begins deleting session recordings based on a formula until the disk usage is less than 90%. If the Days to Keep Logging Information setting was recently changed, the new setting may take up to 24 hours to go into effect. If data or recordings must be retained beyond the configured limit, BeyondTrust recommends using the Integration Client or the Reporting API.
This feature is available only to customers who own an on-premises BeyondTrust Appliance B Series. BeyondTrust Cloud customers do not have access to this feature. Enter a password in the Inter-appliance Communication Pre-shared Key field to establish a trusted relationship between two B Series Appliances. Matching keys are required for two or more B Series Appliances to be configured for features such as failover or clustering. The key must contain at least 6 characters and contain at least one uppercase letter, one lowercase letter, one number, and one special character. Days to Keep Jump Item Logging InformationChoose how long Jump Item reporting data will be accessible from the appliance. Because data is purged only once a day, it may actually be accessible for up to 24 hours beyond what is selected here. Enable Chat History RecoveryCheck this box so that if a session is interrupted and then resumed, the chat window will recover the chat messages. Require Remote Support Client Verification During Elevation AttemptsYou must provide remote support client verification during elevation. SSL Certificate ValidationYou can require SSL Certificate Validation to force BeyondTrust software - including representative consoles, customer clients, presentation clients, and Jump Clients - to verify that the certificate chain is trusted, that the certificate has not expired, and that the certificate name matches the B Series Appliance hostname. If the certificate chain cannot be properly validated, the connection is not allowed. If certificate verification has been disabled and is then enabled, all consoles and clients automatically upgrade the next time they connect. Note that LDAP connection agents are not automatically upgraded but must be reinstalled for this setting to take effect. When SSL Certificate Validation is enabled, security checks in addition to BeyondTrust’s built-in security are performed to validate the SSL certificate chain being used to secure communications. It is highly recommended that you do enable SSL validation. If certificate validation is disabled, a warning message appears on your administrative interface. You can hide this message for thirty days. To enable SSL certificate validation, you must provide your SSL certificate to BeyondTrust so that the certificate can be embedded within your BeyondTrust software. For more information, please see SSL Certificates and BeyondTrust Remote Support. Network Restrictions
Determine which IP networks should be able to access /login, /api, and the representative console on your BeyondTrust Appliance B Series. If you enable network restrictions, you can also enforce the networks on which representative consoles may be used. Define network rules for the following interfaces:Admin Interface (/login) and API Interface (/api)
Desktop and Mobile Representative Console
Web Console (/console)
For more information, please see Web Rep Console Guide. Define your network restrictions:Enter network address prefixes, one per line. Netmasks are optional, and they can be given in either dotted-decimal or integer bitmask format. Entries that omit a netmask are assumed to be single IP addresses.
This feature is available only to customers who own an on-premises BeyondTrust Appliance B Series. BeyondTrust Cloud customers do not have access to this feature. Set the ports through which your /login interface can be accessed. Proxy ConfigurationConfigure a proxy server to control the dataflow for information sent from the B Series Appliance. This applies to outbound events and API calls. Proxy ProtocolConfigure HTTP or HTTPS proxy types for outbound connectivity from the B Series Appliance. Enable Proxy ConfigurationCheck the box to enable the outbound proxy settings. Proxy HostEnter the IP address or hostname of your proxy server. Proxy PortEnter the port your proxy server uses. The default port is 1080. Proxy Username and PasswordIf your proxy server requires authentication, enter a username and password. TestClick Test to ensure configuration settings are entered correctly. The current test result is displayed in the Last Test Result area. Error messages indicate where configuration settings must be corrected. |