Endpoint Security
You can use Endpoint Security as an identity source for Identity and Trust.
Prerequisites:
-
A valid Endpoint Security license. For more information, see the Endpoint Security EPMaaS Administration Guide > and go to Getting Started > Managing Licenses.
-
The Threat Hunting feature enabled in Endpoint Security. For more information, see the Endpoint Security EPMaaS Administration Guide > and go to Forensics Data > Threat Hunting.
Endpoint Security users who use Identity and Trust can establish a direct integration between these two services. This integration enables Identity and Trust to retrieve detailed information from Endpoint Security, including user attributes and associated activity data.
Through this connection, administrators can seamlessly extend Identity and Trust’s capabilities to users already defined in Endpoint Security. These capabilities include centralized access to login credentials, detailed tracking of connected user devices, identification of associated IP addresses, and other critical identity management features.
To connect Endpoint Security to Identity and Trust:
-
Go to the Identity and Trust and select Integrations from the menu bar.
-
On the Integrations page, locate the Endpoint Security card and click Connect.
The status of the Endpoint Security card is now Active and integrated with Identity and Trust.
To monitor the Endpoint Security integration:
|
Card Status |
Description |
Action Required |
|---|---|---|
|
Inactive |
The Endpoint Security service is available but not connected to Identity and Trust. |
Connect the Integration to enable full functionality. |
|
Active |
The Endpoint Security service is active and operating with a valid license. |
No action needed unless there is a change in the service. |
|
Action Required |
Indicates a problem occurred during the integration connection process. |
Click the Connect to retry connecting the integration. |
|
Disconnected |
The Threat Hunting feature is missing from the Endpoint Security service. |
Enable the Threat Hunting feature in Endpoint Security to restore functionality. See the Endpoint Security EPMaaS Administration Guide > and go to Forensics Data > Threat Hunting. |
|
License Expired |
The license for Endpoint Security has expired. |
Renew the license to restore the integration. See the Endpoint Security EPMaaS Administration Guide > and go to Getting Started > Managing Licenses. |
To disable the Endpoint Security integration:
-
Navigate to the Endpoint Security integration card and click the card options.
-
Select Disconnect.
The Endpoint Security card status now shows the Endpoint Security as Inactive.