Professional Documents
Culture Documents
Course Description
The PowerBroker for Unix & Linux Foundations Course Outline
Training is designed for the IT security Introduction
professional tasked with installation, Product Overview
administering, monitoring and reporting on The classroom lab environment
PowerBroker for Unix & Linux.
Students learn how to install the products Architecture and installation
components, identify and edit configuration Understand the key components of the
files, create policy for privilege delegation, PowerBroker for Unix and Linux solution
install the components needed for I/O log
Install all components on a Linux host
review, and use the Analytics and Reporting
Lab Exercise: Install all components
from within BeyondInsight.
Configuring basic policy
Prerequisites Identify the key configuration files
There are no prerequisites for this course, but Create and verify a new policy
the student should have hands on experience of Lab Exercise: Configuration and Policy
general networking environments and
operating systems. Privilege Delegation
Policy precedence and order of processing
Privilege delegation use cases
Who Should Attend Lab Exercise: Privilege Delegation
This course is for network managers, system
administrators, security administrators, systems Auditing and Logging
professionals, and consultants who are charged Understand the auditing and logging
with the configuration, and day-to-day capabilities
management of PowerBroker for Unix & Linux Review event logs
in a variety of network environments, and who Use the replay utility to investigate I/O log
are responsible for administration of this activity
product in the enterprise environment. Lab Exercise: Auditing and Logging
BeyondInsight Integration
Delivery Method Configure BeyondInsight and PowerBroker
This course is available in the following delivery for Unix & Linux integration
methods: Configure Solr for I/O log indexing and
Web-based training (WBT) – Self-paced search
Instructor-led training (ILT) – 2 days Review PowerBroker for Unix & Linux audit
Virtual Instructor-led training (VILT) – 15 data from BeyondInsight
hours over 3 days. Lab Exercise: BeyondInsight Integration
© 2016 BeyondTrust Corporation. All rights reserved. BeyondTrust, BeyondInsight and PowerBroker are trademarks or
registered trademarks of BeyondTrust in the United States and other countries. Microsoft, Windows, and other marks are the
trademarks of their respective owners
Analytics and Reporting
Understand how to use the Analytics and
Reporting within BeyondInsight coupled
with PowerBroker for Unix & Linux data
Lab Exercise: Analyzing PowerBroker for
Unix & Linux data with Analytics and
Reporting
Policy structure
Create roles
Set users, groups, hosts
Set logging commands and limits
Allow deny
Authentication
Additional authentication methods
Lab exercise: Implementing external
authentication with RADIUS
Failover
High availability features
High availability architecture
Configuring failover
Lab Exercise: Failover implantation for
multiple systems
Product integrations
Using Password Safe with PowerBroker for
Unix & Linux for privilege delegation
Authentication with PBIS
Lab Exercise: Handing off an SSH session to
PBUL
© 2016 BeyondTrust Corporation. All rights reserved. BeyondTrust, BeyondInsight and PowerBroker are trademarks or
registered trademarks of BeyondTrust in the United States and other countries. Microsoft, Windows, and other marks are the
trademarks of their respective owners