Add-on for Privileged User Monitoring on Linux and Unix Systems
Exercise full control over privileged sessions and remote access across your *nix infrastructure. Simply use this free add-on to enable a connection through Netwrix Auditor’s RESTful API, and start collecting data from
your Linux, Unix, BSD and Mac OS-based devices today.
This add-on works only in combination with Netwrix Auditor,
so make sure you have Netwrix Auditor installed.
Gain visibility into temporary privilege elevation in your Linux and
Stay in complete control of what users who run SUDO commands are doing. The actionable information
includes who-what-when-where details, so you can promptly detect and respond to improper behavior
privileged accounts, as well as failed
attempts at privilege elevation.
Detect improper access to your critical server infrastructure and
Improve user accountability, data security and operational stability by gaining complete visibility
into user logons, session starts and ends in your critical Unix-like systems performed by anyone
using an OpenSSH remote connection.
Preserve consolidated audit trails securely in a centralized
Easily aggregate data into a single audit trail for simplified analysis, and keep that trail for as
long as needed in a reliable, two-tiered storage that allows quick access to activity records
during security and compliance investigations.
Want more help getting started with the add-on? Read the
Want more help getting started with the
Read the Quick-Start Guide.
Review detailed instructions for installing the Add-on for Privileged User
Monitoring on Linux and Unix Systems.
Learn how to configure the add-on properly.
Start getting complete visibility into targeted, one-time privilege elevation
activities and OpenSSH remote connections across your Linux and Unix environment.