Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 8 Next »

Before you can randomize passwords, configure the Local User Inventory to populate resources (and to be able to match the password with the resource). If you are setting up the Password Randomization Policy for the first time, set the interval (the frequency that the Password Randomization Policy is run) between 1 and 7 days. If you have a frequently changing environment, such as a test environment, make the interval shorter. Randomizing passwords at regular intervals ensures that passwords can't be exploited to gain access to valuable network resources. If you have a highly sensitive environment, where users aren't being added or removed a lot, then increase the interval length.

To Randomize Passwords

  1. From the Arellia Security Management Console, go to the Policies tab.
  2. Navigate to Arellia / Local Security / Policies / Randomize Administrator Password.
  3. The Randomize Administrator Password window is divided into three parts: Settings, Schedules, and Applied To. From Settings, choose the type of User account, the minimum password length, how to use characters in the password, and whether to log the new randomized password at the server.
  4. From Schedules, configure a schedule when the password randomization command will occur.
  5. From Applied To, configure either Targets or Resources to apply password randomization.
To Create a Schedule for the Password Randomization Command

Scheduling Password Randomization Command

When dealing with many machines, administrators can create a schedule to randomize passwords on target machines. This saves time manually having to run the password randomization command on a machine-by-machine basis.

  1. From Schedules, select New Schedule.
  2. Add filters to the New Schedule using the following filter values.
To Select Which Computers to Apply the Password Randomization Command
  1. From Applied To, select Computers.
  2. Name the Targeted Computer.
  3. From Filtering Rules, create or select a pre-configured filter.
  4. Add rule.
  5. Apply the rule to a Resource.
  6. Administrators can search for a resource, or view which resources match these rules.
  7. Click Save or Cancel.
  • No labels