- 필수 기능
- 시작하기
- Glossary
- 표준 속성
- Guides
- Agent
- 통합
- 개방형텔레메트리
- 개발자
- Administrator's Guide
- API
- Datadog Mobile App
- CoScreen
- Cloudcraft
- 앱 내
- 서비스 관리
- 인프라스트럭처
- 애플리케이션 성능
- APM
- Continuous Profiler
- 스팬 시각화
- 데이터 스트림 모니터링
- 데이터 작업 모니터링
- 디지털 경험
- 소프트웨어 제공
- 보안
- AI Observability
- 로그 관리
- 관리
Supported OS
Delinea Privilege Manager - Overview
Delinea Privilege Manager - Application Control Events
Delinea Privilege Manager - Local Security Events
Delinea Privilege Manager is an endpoint least privilege and application control solution for Windows and macOS, capable of supporting enterprises and fast-growing organizations at scale. Local Security and Application Control are the two major components of Delinea Privilege Manager.
This integration supports the following types of logs:
View detailed insights into these logs using the out-of-the-box dashboards. The integration also includes ready-to-use Cloud SIEM detection rules for enhanced monitoring and security.
To install the Delinea Privilege Manager integration, run the following Agent installation command followed by the steps below. For more information, see the Integration Management documentation.
Note: This step is not required for Agent version >= 7.63.0.
Linux command
sudo -u dd-agent -- datadog-agent integration install datadog-delinea-privilege-manager==1.0.0
By default, log collection is disabled in the Datadog Agent. To enable it, modify the datadog.yaml
file::
logs_enabled: true
Add the following configuration block to your delinea_privilege_manager.d/conf.yaml
file to start collecting your logs.
See the sample delinea_privilege_manager.d/conf.yaml for available configuration options. The appropriate protocol (either TCP or UDP) should be chosen based on the Delinea Privilege Manager syslog forwarding configuration.
type
to tcp
.type
to udp
. logs:
- type: <tcp/udp>
port: <PORT>
source: delinea-privilege-manager
service: delinea-privilege-manager
Notes:
PORT
: The port should be the same as the one provided in the Configure syslog message forwarding from Delinea Privilege Manager section.Navigate to Admin > Configuration and select the Foreign Systems tab.
Click on Syslog to open the syslog configurations page, then click on the Create button.
Provide a configuration name and the syslog server address (either TCP or UDP)
host: IP address where your datadog-agent is running.
port: Port number to send syslog messages.
Click on the Create button. Confirm the details added and return to the Admin Menu.
After adding a new Syslog connection, navigate to Admin > Tasks to send logs to your Syslog Server.
Expand the Server Tasks > Foreign Systems folders, select SysLog, then click Create.
From the Template drop-down, select the Send Application Action Events to Syslog template.
Add a Name for this task (set to Application Action Events) and Event Name (set to Application Action Events), and specify the Event Severity (0-Lowest, 10-Highest), or keep it as is.
From the SysLog System drop-down, select your SysLog server foreign system (configured above).
Provide a value for Security Ratings Provider if required, or leave it as is.
Click Create.
Note: Do not alter the Data source, and ensure the Replace spaces toggle is disabled, as any changes to these parameters will directly impact the functionality of the Delinea Privilege Manager integration.
Once created, scroll down to the Schedule section and click on the New Schedule button. Provide the following details:
Click on the Save Changes button available on the upper-right corner of the page.
This process configures the Syslog forwarding task for Application Action Events. For other types of events mentioned in the table below, create new tasks for each event with respective template and event name, and follow all the above steps.
Note: In step 4, make sure to set the Name for the task and the Event Name according to the selected template, as specified in the table below. The Event Name is essential to the functionality of the Delinea Privilege Manager Pipeline and must be provided exactly as specified.
Template | Event Name | Name |
---|---|---|
Send Application Action Events to Syslog | Application Action Events | Application Action Events |
Send Application Justification Events to Syslog | Application Justification Events | Application Justification Events |
Send Change History Events to Syslog | Not Applicable | Change History Events |
Send Newly Discovered File Events to Syslog | Newly Discovered File Events | Newly Discovered File Events |
Send Password Disclosure Events to Syslog | Password Disclosure Events | Password Disclosure Events |
Send Bad Rated Application Action Events to Syslog | Bad Rated Application Action Events | Bad Rated Application Action Events |
Run the Agent’s status command and look for Delinea Privilege Manager
under the Checks section.
Format | Event Types |
---|---|
CEF | Application Action Events, Bad Rated Application Action Events, Application Justification Events, Password Disclosure Events, Newly Discovered File Events, Change History Events |
The Delinea Privilege Manager integration does not include any metrics.
The Delinea Privilege Manager integration does not include any events.
The Delinea Privilege Manager integration does not include any service checks.
Permission denied while port binding:
If you see a Permission denied error while port binding in the Agent logs:
Binding to a port number under 1024 requires elevated permissions. Grant access to the port using the setcap
command:
sudo setcap CAP_NET_BIND_SERVICE=+ep /opt/datadog-agent/bin/agent/agent
Verify the setup is correct by running the getcap
command:
sudo getcap /opt/datadog-agent/bin/agent/agent
With the expected output:
/opt/datadog-agent/bin/agent/agent = cap_net_bind_service+ep
Note: You must run the setcap
command every time you upgrade the Agent.
Data is not being collected:
Ensure traffic is bypassed from the configured port if the firewall is enabled.
Port already in use:
If you see the Port <PORT_NUMBER> Already in Use error, see the following instructions. The following example is for port 514:
Can't start UDP forwarder on port 514: listen udp :514: bind: address already in use
. This error occurs because, by default, Syslog listens on port 514. To resolve this error, take one of the following steps:For further assistance, contact Datadog support.
Delinea Privilege Manager - Overview
Delinea Privilege Manager - Application Control Events
Delinea Privilege Manager - Local Security Events