About documentation
Layout themes of the Admin Panel
Introduction
System overview
Session Monitoring & Recording
Secret Management
Just-in-Time (JIT) Access
Single Sign-On (SSO)
Agentless Convenient Access
AI-Powered Prevention
Productivity Analyzer
Rapid Deployment
Compliance Support
Available GUI Languages
Supported protocols
HTTP
Modbus
MS SQL (TDS)
MySQL
RDP
SSH
Telnet 3270
Telnet 5250
Telnet
VNC
X11
TCP
Secret Checkout
Deployment scenarios
Connection modes
User authentication methods and modes
Security measures
Data encryption
Backups
Permissions
Sandboxing
Reliability
Cluster configuration
Data model
Dashboard
Widgets
Adding, customizing and removind dashlets
Hard drives status information
User Portal (Access Gateway)
Third-Party Licenses
System deployment
Requirements
Hardware overview
System initiation
Virtual machine
Quick start
SSH
Prerequisites
Configuration
Establishing connection
Viewing user session
SSH in bastion mode
Prerequisites
Configuration
Establishing connection
Viewing user session
RDP
Prerequisites
Configuration
Establishing an RDP connection with a remote host
Viewing user session
RDP in bastion mode
Prerequisites
Configuration
Establishing an RDP connection with a remote host
Viewing user session
Telnet
Prerequisites
Configuration
Establishing a telnet connection with the remote host
Viewing user’s session
Telnet 5250
Prerequisites
Configuration
Establishing a telnet connection with the remote host
Viewing user’s session
MySQL
Prerequisites
Configuration
Establishing connection with a MySQL database
Viewing user session
MS SQL
Prerequisites
Configuration
Establishing connection with a MS SQL database
Viewing user session
HTTP
Prerequisites
Configuration
Connecting to remote resource
Viewing user session
VNC
Prerequisites
Configuration
Establishing connection
Viewing user session
User authentication against external LDAP server
Prerequisites
Configuration
Users
Creating a user
Editing a user
Blocking a user
Unblocking a user
Deleting a user
Time access policy
Authentication failures counter
Roles
Users synchronization
Two-factor OATH authentication with Google Authenticator
Protocols Supporting OATH Authentication Method
Configuring the OATH Authentication Method
Servers
Creating a server
Creating an HTTP server
Creating a Modbus server
Creating a MS SQL server
Creating a MySQL server
Creating an RDP server
Creating an SSH server
Creating a Telnet server
Creating a Telnet 3270 server
Creating a Telnet 5250 server
Creating a VNC server
Creating a TCP server
Editing a server
Blocking a server
Unblocking a server
Deleting a server
Pools
Creating a pool
Deleting a pool
Remote applications
Adding remote application
Connecting to remote application via Access Gateway
Deleting remote application
Accounts
Creating an account
Creating an
anonymous
account
Creating a
forward
account
Creating a
regular
account
Editing an account
Blocking an account
Unblocking an account
Deleting an account
Managing security alerts
Triggering password change
Ignoring security alert
Listeners
Creating a listener
Creating a HTTP listener
Creating a Modbus listener
Creating a MySQL listener
Creating an RDP listener
Creating an SSH listener
Creating a MS SQL listener
Creating a Telnet listener
Creating a Telnet 3270 listener
Creating a Telnet 5250 listener
Creating a VNC listener
Creating a TCP listener
Editing a listener
Blocking a listener
Unblocking a listener
Deleting a listener
Safes
Creating a safe
Editing a safe
Blocking a safe
Unblocking a safe
Deleting a safe
Discovery
Creating a rule
Creating a scanner
Manage accounts
Password changers
Password changer policy
Defining a password changer policy
Editing a password changer policy
Deleting a password changer policy
Custom password changers
Defining a custom password changer
Editing a custom password changer
Deleting a custom password changer
Connection modes
SSH
LDAP
Telnet
WinRM
Setting up password changing on a Unix system
Plug-ins
Developing plug-ins
Development environment
Plugin structure
Preparing plug-ins for deployment
Uploading plug-ins
Policies
AI module-based policy
Regular expression-based policy
Downloads
Sessions
Files
Account activity in the Access Gateway
Access requests
Awaiting requests
Active requests
Archived requests
Sessions
Filtering sessions
Defining filters
Managing user defined filter definitions
Full text search
Viewing sessions
Pausing connection
Terminating connection
Joining live session
Sharing sessions
Commenting sessions
Sessions’ retention lockdown
Exporting sessions
Export Session File Formats
Deleting sessions
OCR processing sessions
Session data replication
Timestamping selected sessions
Cancelling sessions timestamping
Require approval for access
Approving pending user requests
Declining pending requests
AI sessions processing
Content models
Session scoring
Quantitive models
Reports
Productivity
Overview
Sessions analysis
Activity comparison
Administration
System
Date and time
SSL certificates
Deny new connections
SSH access
Sensitive features
System update
Updating system
Restoring previous system version
Deleting upgrade snapshot
License
Hotfix
Diagnostics
Configuration encryption
Default domain
Password complexity
Single Sign On
Setting up Fudo Enterprise for SSO
Single Sign On in Admin Panel
Single Sign On in User Portal
Setting up domain controller
Setting up user workstations
Password changers - active cluster node
Cluster Password Changers
Network settings
Network interfaces configuration
Managing physical interfaces
Defining IP address using system console
Setting up a network bridge
Setting up virtual networks (VLANs)
Setting up LACP link aggregation
Labeled IP addresses
Routing configuration
DNS configuration
ARP table configuration
Notifications
Artificial Intelligence
Configuring models trainers
Behavioral analysis models
Trusted time-stamping
Certificate-based authentication scheme
Authentication
External authentication server definition
OATH authentication definition
SMS authentication definition
DUO authentication definition
OpenID Connect authentication definition
External passwords repositories
CyberArk Enterprise Password Vault
Thycotic Secret Server
Resources
RDP/VNC login screen configuration
User portal
login screen configuration
System version restore
System restart
SNMP
Configuring SNMP
Configuring SNMPv3 TRAP
SNMP MIBs
Getting SNMP readings using
snmpwalk
Fudo Enterprise specific SNMP extensions
Backups and retention
System backup
Data retention
External storage
Configuring external storage
Expanding external storage device
Exporting/importing system configuration
Exporting system configuration
Importing system configuration
Cluster configuration
Initiating cluster
Adding cluster nodes
Editing cluster nodes
Deleting cluster nodes
Redundancy groups
Events log
External syslog servers
Exporting events log
Changing encryption passphrase
Integration with CERB server
System maintenance
Backing up encryption keys
Monitoring system condition
Health Check
API Health Check
Call Home
Data Collected by Call Home Service
The Benefits of Using Call Home
Enable/Disable Call Home
Hard drive replacement
Resetting configuration to default settings
Reference information
RDP connections broker
Log messages
Footer Information
Fudo Officer 1.0
Configuration
Managing session requests
Settings
AAPM (Application to Application Password Manager)
Compiling
fudopv
tool
Python
Virtual environment
Fetching dependencies
Package creation script
Deploying
fudopv
without compiling source files
Using
fudopv
API interface
Authentication methods
Static password
Token
Ticketing systems
Client applications
PuTTY
Microsoft Remote Desktop
TightVNC Viewer
SQL Server Management Studio
Troubleshooting
Booting up
Connecting to servers
Logging to administration panel
Session playback
Cluster configuration
Trusted timestamping
Support mode
Frequently asked questions
Glossary
API Documentation
Access Gateway
PDF
PL
Fudo Enterprise 5.3
Start
»
Index
Index
A
|
C
|
D
|
E
|
F
|
H
|
L
|
M
|
N
|
O
|
P
|
R
|
S
|
T
|
U
|
V
|
W
|
X
A
AAPM
account
accounts
Active Directory
AD
administration
configuration export/import
anonymous safe
API
users
ARP
AUROC
Azure
C
CERB
CIDR
configuration
AI
Network configuration
,
[1]
notifications
users synchronization
connection mode
bastion
gateway
proxy
transparent
creating
servers
D
data retention
deleting
servers
deployment scenario
bridge
forced routing
DHCP
DNS
DUO
E
editing
servers
,
[1]
Efficiency Analyzer/Productivity Analyzer
external authentication server
F
False Positive Rate
Fingerprint
fudopv
H
heartbeat
hot-swap
HTTP
protocol
protocols
servers
L
LDAP
listener
M
Modbus
protocol
protocols
servers
MS SQL
servers
MS SQL (TDS)
protocol
protocols
MySQL
protocol
protocols
servers
N
Network configuration
IP labels
network interface configuration
network configuration
routing
O
OATH
OCR
Okta
OpenID Connect
P
password changer
passwords repository
policy
protocol
HTTP
MS SQL (TDS)
Modbus
MySQL
RDP
SSH
TCP
Telnet
Telnet 3270
Telnet 5250
VNC
X11
secret
protocols
HTTP
MS SQL (TDS)
Modbus
MySQL
RDP
SSH
TCP
Telnet
Telnet 3270
Telnet 5250
VNC
X11
secret
PSM
(Privileged Session Management)
Public key
R
RADIUS
RDP
protocol
protocols
servers
RDP connections broker
,
[1]
redundancy group
S
safe
secret
protocol
protocols
server
servers
HTTP
MS SQL
Modbus
MySQL
RDP
TCP
Telnet
Telnet 3270
Telnet 5250
VNC
creating
deleting
editing
,
[1]
ssh
sessions
commenting
filtering
play and preview
shared session
SMS
SSH
protocol
protocols
ssh
servers
SSH access
Static password
Syslog
T
TCP
protocol
protocols
servers
Telnet
protocol
protocols
servers
Telnet 3270
protocol
protocols
servers
Telnet 5250
protocol
protocols
servers
Threat Probability
time policy
timestamp
True Positive Rate
U
user
users
API
access rights
roles
users synchronization
configuration
V
VLAN
VNC
protocol
protocols
servers
W
WWN
X
X11
protocol
protocols