CyberArk DNA User Guide
CyberArk DNA User Guide
May 2019
Table of Contents
CyberArk DNA™ 5
Considerations 6
Privileged Access Security Status 7
Hard-coded and Embedded Application Credentials 7
Credential Theft 8
Cloud Users and Instance Keys 8
Database Accounts 8
Privilege Escalation 9
Granular, Flexible, Easy to Use 9
Reporting and Visualizing Threats 9
Agentless and Light 11
Install DNA 12
System Requirements 13
General Requirements 13
Windows Requirements 14
Unix/Linux Requirements 18
Installation 22
Use DNA 23
Run DNA 24
Understand the DNA User Interface 26
The DNA user interface 26
The DNA Workflow 27
Perform a Scan 28
Select Sources for Discovery 28
Set up a DNA Scan 29
Run a Scan 36
View the Scan Results 39
Upload Accounts 41
Use DNA Reports 45
Understand DNA Reports 46
Executive Summary Dashboard 46
What are SSH Keys? 55
What is Pass-the-Hash? 56
What is Insecure Privilege Escalation? 57
Windows and Unix Scans 58
Domain Scan 67
SSH Key Trusts 71
Database Scan 78
Hard-Coded Credentials 80
Cloud Users 82
Cloud Instances 83
Scan Errors 83
The Organizational Pass-the-Hash Vulnerability Map 84
CyberArk DNA™
The IT security landscape keeps changing and, thus, the tools and techniques that are
used to defend organizations must also change to compensate and adapt to these
changes. No longer can organizations exclusively rely on preventive security
technologies, such as firewalls, anti-virus, and standard configurations of user
authentication systems. Now organizations need more agile tools to sufficiently protect
them from today’s most sophisticated attacks and operate with modern operation tools
(DevOps tools). The reality is that focused, well-funded, and expert attackers can
circumvent all of the commonly used preventive security systems. Privileged accounts
are built-in vulnerabilities throughout your infrastructure and are what most attackers
look for. Unprotected, unmonitored privileged accounts are the weapon of choice for
most of attackers. To compensate for this general weakness, organizations must
enhance their detection, investigative, and response capabilities.
CyberArk Discovery and Audit™ (DNA) is an innovative discovery and audit tool that
automatically scans an organization’s network, typically a complex, manual process,
for the following:
■ Data related to privileged and non-privileged accounts
■ Hard-coded and embedded application credentials on workstations, servers,
MSSQL databases, and DevOps
■ Potential credential theft risks, including Golden Ticket, Pass-the-Hash, Pass-the-
Ticket and Overpass-the-Hash attacks
■ SSH key exposure
■ Privilege escalation risks
The easy-to-use scanner automatically discovers and analyzes any privileged and
non-privileged account within servers and desktops as defined by the user, then
generates a report and visual organizational map that evaluates the privileged account
security status in the organization. A simple three-step procedure leads to better and
more efficient risk management around privileged accounts.
In this section:
Considerations
Privileged Access Security Status
Hard-coded and Embedded Application Credentials
Credential Theft
Cloud Users and Instance Keys
Database Accounts
Privilege Escalation
Granular, Flexible, Easy to Use
Reporting and Visualizing Threats
Agentless and Light
Considerations
In order to provide accurate and meaningful results for the security team, the DNA tool
uses powerful methods or technologies that mimic those used by attackers. Before
running DNA, it is strongly recommended that deploying organizations assess the
related legal requirements both under data protection and telecommunication laws as
well as any other applicable laws and regulations on their own behalf. We recommend
that IT security personnel verify that corporate employment policies or local laws do not
prohibit the scanning or analysis of data streams for network security purposes,
because the tool involves scanning, locating and analyzing corporate access
credentials.
CyberArk’s DNA scanner is a certificate-signed tool that does not require agents to be
installed on target systems, making it non-intrusive to the IT environment. However,
these network activities may trigger alerts in security applications and tools designed to
detect anomalous network traffic, so Security Operations Teams may need to be
alerted in advance so that the security work is coordinated and does not disrupt or
distract from ordinary security monitoring or management of alerts.
Credential Theft
DNA assesses the current and potential risk of Golden Ticket, Pass-the-Hash, Pass-
the-Ticket and Overpass-the-Hash attacks, a form of credential theft. DNA identifies
stored hashes of privileged domain accounts on machines, producing a visual map of
machines that are vulnerable to the above mentioned attacks.
Database Accounts
DNA scans MSSQL databases to discover all privileged or non-privileged users on
SQL or Windows/Active Directory.
Note:
DNA can scan databases on MSSQL 2012 and 2016, but does not scan SQL
databases on clusters.
On any target machine, the DNA may discover multiple MSSQL instances, each used
in several databases and each with its own users (database-level object). An account
may be either an SQL login account or a Windows login account, and each may have
one or more users even though each user can only access one database.
The results of the database accounts scan are only displayed in the Database Scan
sheet, and are not represented in the Executive Summary.
Privilege Escalation
DNA discovers and flags potential excessive privileges that have been escalated on
Unix and Linux.
The assignment of account privileges can be error-prone on Unix and Linux machines,
where the root account is the only privileged account by default, and escalating
account privileges is typically and commonly done using an un-centralized sudoers
configuration file. Since the sudoers configuration file was not designed for cyber-
security, the process of escalating account privileges may result in excessive
privileges for accounts. DNA detects these excessive privileges and exposes the
risk.
1The Golden Ticket vulnerability is only shown in the Pass-the-Hash map if there is
indication of a potential attack.
You can use these maps to focus on the machines and accounts that require
immediate attention to help mitigate the threat quickly.
1Target device properties are scanned in read-only mode, except when scanning for
SSH keys on Windows without Cygwin.
Install DNA
System Requirements
General Requirements
This section describes the minimum requirements for running CyberArk DNA.
Operating System
Windows 8/8.1
Windows 10
License
DNA requires a license. The DNA license includes an expiration date, and limits the
number of Windows machines and the number of Linux/Unix machines that can be
scanned per scan, both when scanning from an Active Directory and from an imported
file. This version of DNA is backwards compatible to support older license versions.
Note:
DNA does not support scanning Active Directory domain controllers.
Private PuTTY
Note:
DNA is not compatible with Microsoft Office 2007.
.NET Framework
Make sure that .NET Framework is installed.
Windows Requirements
The section describes the minimum operating system requirements for scanning
Windows machines with DNA.
Note:
A user who is not a domain Administrator must be a domain user and must
belong to the Administrators group or to a group nested within the Administrators
group.
Workstations Windows 8
Windows 10
Supported protocols
The following protocols are supported when accessing the Active Directory:
LDAP
LDAPs
Network protocols
Windows File and Printer Sharing
Windows (WMI)
Note:
When enabling the Windows (WMI) protocol in your environment, make sure the
Windows Management Instrumentation service startup type is set to Automatic.
For more information about the ports that DNA uses to access remote machines, refer
to Ports used by DNA, page 153.
Scan for embedded and hard-coded credentials on IIS servers
Prerequisites Make sure that the machine where DNA runs and all scanned
machines are configured for Administrative shares (e.g. C$, etc.).
Note:
To discover Scheduled Tasks on Windows 2012/2016/2019, the CyberArk Scanner (CPM)
must be installed on Windows 2012.
To discover IIS Application Pools accounts, IIS Directory Security (Anonymous Access)
accounts and COM+ Applications accounts, IIS7.5 or 8.5 must be installed.
On Windows machines DNA discovers private SSH keys and public SSH
where Cygwin is installed:
keys
Prerequisites
To enable DNA to discover all the private SSH keys on the machines to scan, the
user who will perform the scan must have access to all these keys.
Note:
By default, DNA doesn't scan single core machines for private SSH keys. This can be
changed by setting the SSH Keys scan parameters in the DNA.exe.config file. For more
information, refer to Configuration Parameters, page 125.
Supported AWS
Platforms
AWS Inspector
Prerequisites Make sure that the machine where DNA runs can access the AWS
console via API.
Prerequisites
Make sure that OpenSSH is installed within Cygwin.
To discover public SSH Keys on Windows, make sure that Cygwin is installed in
your environment.
To scan a Windows machine that has Cygwin installed, the following packages
and commands must be installed in Cygwin:
Packages:
Note:
■ To make sure the SSH Server is running and available, run the "ssh localhost"
command. At the prompt, specify your password. If a new command line is now
displayed, your SSH server is listening on the standard SSH port.
■ The SSH Server must support password, SSH key, or keyboard interactive
authentication, which can be configured in the /etc/ssh/sshd_config file. For
more information, refer to Log Error Messages, page 122, in Troubleshooting.
■ By default, machines with a single core CPU will not be scanned for private
SSH keys. This can be changed by configuration parameters in the
DNA.exe.config file. For more information, refer to Configuration Parameters, page
125.
Unix/Linux Requirements
This section describes the minimum requirements for scanning a Unix/Linux
environment with DNA.
Note:
These credentials are not relevant to IBM Virtual I/O Server or IBM Hardware Management
Console platforms. For information about credentials that are required to scan these
machines, refer to the relevant information at the end of the Unix/Linux Requirements
section.
User with root permissions for It is possible to configure DNA to scan with users who
Unix/Linux/Mac authenticate with a password, as well as SSH Keys
Users other than root DNA requires the use of sudo to run commands.
Hence, the administrative user account(s) configured
to scan with DNA must have permissions to run sudo
on the scanned Unix/Linux/Mac machines. For more
information, see Configure Root Permissions Using
the Sudoers File, page 135.
IBM HMC machines An hscroot user or any user with the hmcsuperadmin
task role.
Solaris Intel and Solaris SPARC 9, 10, 11. For known limitations, refer to Known
Behavior and Limitations, page 143.
AIX 5.3, 6.1, 7.1
SUSE 10
CentOS 7
Oracle Linux 5
Note:
By default, machines with a single core CPU that run Unix/Linux versions will not be
scanned for private SSH keys. This can be changed by configuration parameters in the
DNA.exe.config file. For more information, refer to Configuration Parameters, page 125.
Note:
On Java application servers, DNA only discovers JDBC datasources
Note:
On WebLogic, DNA only discovers WAR applications
diffie-hellman-group-exchange-sha1
diffie-hellman-group14-sha1
diffie-hellman-group1-sha1
Package Prerequisites
To be able to scan a Unix/Linux environment with DNA, the following packages or
commands must be installed:
lastlog command This command retrieves the last login date of an account.
The command is not required on AIX systems and
Solaris
Note:
■ To find out if a specific command is installed, run the "which" command.
For example, if sudo is installed, the "which sudo" command will return the full path of
the sudo command. If sudo is not installed, the “which” command will return: no sudo
in /usr/bin /etc /usr/sbin /usr/ucb /usr/bin/.
■ To make sure the SSH Server is running and available, run the "ssh localhost"
command. At the prompt, specify your password. If a new command line is now
displayed, your SSH server is listening on the standard SSH port.
■ The SSH Server must support password, SSH Key, or keyboard interactive
authentication, which can be configured in the /etc/ssh/sshd_config file. For more
information, refer to Log Error Messages, page 122, in Troubleshooting.
Sudo Replacements
DNA supports the following sudo-replacement solutions:
■ CA Privileged Identity Manager/ControlMinder – This solution contains the sesudo
command.
■ Centrify Access Manager/DirectAudit - This solution contains the dzdo command.
AD-Bridge support
DNA supports the following AD-Bridge solutions:
■ Centrify Access Manager/AD Bridge
■ Quest (OneIdentity) vastool
Installation
DNA installation
1. From the DNA installation package that you will receive from your CyberArk
representative, copy the CyberArk DNA zip file to the machine you want to scan
from.
2. Extract the contents of the zip file to any directory on your local hard drive.
Note:
Make sure you have full read and write permission for the chosen directory
Use DNA
Run DNA
Note:
Running DNA might trigger SIEM system alerts due to the way it scans your network.
3. Read the license agreement and select the checkbox to accept its terms, then click
OK; the CyberArk DNA window appears with the License Required pop-up on top.
At the bottom left of the CyberArk DNA window, Unlicensed Version is displayed.
To be able to use DNA, you need a license. The DNA license includes an
expiration date and limits the number of Windows machines and the number of
Unix/Linux machines that can be scanned per scan, both when scanning from an
Active Directory and from an imported file.
4. In the License Required pop-up, click Browse and find the DNALicense.xml file,
then choose the file.
Note that at the bottom left of the CyberArk DNA window, Unlicensed Version has
been replaced by information about the license, the licensee and the remaining
number of days until the license expires.
Context-sensitive Help Area – Click “What’s this?” to display help about each
section.
Step Description
Discovery Determine the sources that DNA will use to perform discovery. DNA
can be configured to scan the assets contained in a specified Active
Directory, or the machines listed in a specific file, or both.
Setup Configure the basic setup of the scan, depending on the sources you
selected in the Discovery step. Once you have provided this
information, you can start scanning.
Scan View live data about the scan in progress. When scanning is
complete, you can view statistical information about the scan and
access the scan report.
Perform a Scan
You can perform a privileged account scan using the following three-step procedure,
explained in the sections below:
Select sources
1. Select one or all of the following options:
Source Description
Active DNA will scan the assets contained in the Active Directory that you
Directory specify in the Setup window.
Note:
■ DNA uses these credentials to connect to the Active Directory’s
Organizational Unit (OU) and the target machines.
■ To connect to the OU, read permission is required.
■ To scan both Windows and Unix/Linux/Mac machines via an Active
Directory Bridge solution, the credentials must have both of the following
permissions:
■ Local administrative permission for Windows
2. In the What to scan? Section, specify the target machines to scan for privileged
accounts.
a. Select the Active Directory’s Organizational Unit (OU) to scan. Use Browse to
find the relevant OU and select it, then click OK; the scanner will scan the
selected OU and all of its sub-OUs.
Note:
On Unix/Linux devices, DNA will always scan both workstations and servers
Note:
DNA uses these credentials to connect to the AWS console using the AWS API.
To run an AWS scan, the user related to the access key provided needs the open read
policy. For more specific permissions please refer to the technical FAQ guide.
Select the required region to scan. By default, all regions are scanned.
AWS has a limitation when scanning certain regions, such as AWS
GovCloud (US) or China (Beijing).
Check this option to enumerate the EC2 instances and EC2 key pairs in the
selected region.
AWS Inspector security findings:
Check this option to list AWS Inspector information on the selected region
for all EC2 instances that have the Inspector agent installed.
Selecting this option will sum all high severity security finding in the
scanned EC2 instances.
3. If you configured DNA to scan from a file as well as from AWS, click Next to
proceed to the Setup scanning from a file window. Otherwise, click Start Scan.
Note:
■ When scanning from a file, make sure that none of the passwords in the imported file
contain the file delimiter character, since this might cause the account to be locked
out. By default, the delimiter character is a comma “,”. For more information, refer to
Imported File Issues, page 117, in Troubleshooting.
■ To accurately identify machines as “Workstation” or “Server”, make sure that the user
who will perform the scan is a Domain user. For more information, refer to Scan
Limitations, page 143.
The Setup scan from IP page enables you to setup DNA to:
■ Scan machines that are not connected to an Active Directory
■ Scan an entire network range
■ Scan a specific list of machines
■ Scan machines by authenticating to them using an SSH Key. For more
information, refer to Import a File, page 139.
Note:
DNA cannot authenticate to Windows machines with Cygwin using SSH Keys.
If you specify that DNA will scan from an Active Directory as well as from a file, some
machines may be duplicated. In this case, DNA will omit the duplicates. Click Back to
return to the Setup scanning from the Active Directory window.
2. To download a CSV template that you can use to create your CSV file, click Click
to download CSV template.
For more information about importing a file, refer to Import a File, page 139.
3. Click Start Scan.
Run a Scan
Once you have provided the information required in the Discovery and Setup windows,
you can start scanning.
If the credentials you specified above have both local administrative and root
permissions, you can scan both Windows and Unix/Linux devices in a single scan.
If the specified credentials have only local administrative or root permission, you
must scan Windows and Unix/Linux devices in two separate scans, using the
relevant credentials for each operating system.
AWS results are only relevant if you selected the AWS scan and entered the
AWS access key credentials.
Database scanning results will be available if the supplied credentials have the
appropriate permissions on the MS SQL servers.
Note:
Only enabled accounts (as opposed to disabled or “locked-out”
accounts) can have a non-compliant status.
When running an AWS scan, the following AWS Scan Results information is added:
AWS EC2 instances - The total number of EC2 instances found in the selected
region.
AWS EC2 Key pairs - The total number of EC2 Key Pairs found on the discovered
EC2 instances.
AWS IAM Users - The total number of IAM users found in the AWS console.
AWS IAM Access Keys - The total number of access keys found on each
discovered IAM user.
If only the AWS scan is selected, this information will appear on its own. However, if the
AWS scan is selected together with other scans, this information will appear alongside
all the information from the other scans.
This window displays the final scanning data. For more information about the displayed
scanning data, see Run a Scan, page 36.
You can now open the Discovery and Audit Report, or start a new scan.
■ To access the reports and maps, click Open Report.
■ To start a new scan, click New Scan; the Setup window appears; the same user
credentials and OU or region that were used in the previous scan will be used and
will appear in the relevant fields. CyberArk DNA will generate a new report name
with the current date and time in the Report name field. To start the scan, click
Start Scanning.
■ To upload discovered accounts, click Upload Accounts at the top of the
DNA window. For further information, refer to Upload Accounts, page 41.
■ After running a scan using an import file, a warning message recommends that
you delete the imported file as it contains credentials in it.
Upload Accounts
After DNA discovers accounts in your enterprise, you can initiate an onboarding
process to upload accounts listed in the DNA DB file to the Pending Accounts page in
the PVWA.
Upload accounts
1. In the DNA window, click Upload accounts. The Upload accounts window
appears.
2. When you initiate this at the end of a scan, the Import DNA data file will be filled
with the relevant data file of the scan that just ended.
If this is initiated at a different time (not immediately after a scan), under Import
DNA data file, click Browse to select the DNA DB file reports that include the
accounts to onboard to the Pending Accounts.
3. Under PVWA connection details, specify the Vault user who will run this process,
their Vault password, and the URL of the PVWA to which the accounts will be
uploaded (for example: https://MyServer.mydomain.com/PasswordVault).
Note:
This process only uploads accounts that do not have dependencies.
4. Under Select the accounts to upload, select the type of accounts in the DNA
report that will be uploaded.
5. Click Upload; the DNA uploads the relevant accounts to the Pending Accounts
page in the PVWA.
6. If any errors occurred during the upload, after the upload is finished, a link to an
error log is displayed so that you can view all the errors that happened during the
process.
7. To provision these accounts in the Vault, log onto the PVWA. For more information,
refer to Pending Accounts in the Privileged Access Security Implementation Guide.
Note:
If Automatic Onboarding Rules have been created, they will be applied to
the uploaded accounts. This is relevant to version v10.2 and above.
DNA scans your organization’s network, then generates a report and visual
organizational maps that evaluate the privileged account security status in your
organization.
This chapter describes the DNA report, the organizational Pass-the-Hash Vulnerability
map, the organizational SSH Keys Trusts map, and explains how to use these tools to
expose security threats in your organization.
In this section:
Understand DNA Reports
The Organizational Pass-the-Hash Vulnerability Map
The SSH Keys Trusts Map
Use DNA Reports to Expose Security Threats
Sharing DNA Report Data with CyberArk
Logging
Note:
You cannot view the report file using Microsoft Excel Viewer
Note:
The results of the database accounts scan are only displayed in the Database
Scan sheet, and are not represented in the Executive Summary.
Area Summarizes
Machine/Account The scan, the accounts that were discovered and their
Data compliance status. For more information, refer to
Machine/Account Data.
Area Summarizes
SSH Keys Discovery the SSH keys discovery scan, their usage, and their
compliance status. For more information, refer to SSH
Keys Discovery, page 51.
Cloud Asset The cloud discovery scan, their type and their compliance
Discovery status. For more information, refer to Cloud Asset
Discovery, page 53
Machine/Account Data
This area displays a summary of the scan, the machines that were scanned, and the
accounts that were discovered.
Scan date The date and time the scan was performed.
Created by The display name of the user logged on to the machine where
CyberArk DNA is run.
LDAP path The LDAP path used to identify the accounts to scan.
Note: If the scan was performed on accounts listed in an
imported file, the displayed LDAP path will be N/A.
Windows object type The type of objects selected for scanning. For Windows, this
can be Accounts (privileged accounts and non-privileged
accounts) or Service Accounts (embedded Windows
credentials) or both.
Unix machine types The type of machines selected for scanning. On Unix/Linux
machines, this is always Servers and Workstations.
Unix object type The type of objects selected for scanning. For Unix/Linux, this
is Accounts (privileged and non-privileged accounts).
Machines Scanned – A bar chart that shows the number and percentage of
Windows and Unix/Linux devices scanned, displayed by operating system. The
number of machines scanned per operating system is displayed below the chart.
Note:
This number includes both machines that were completed successfully and those
where the scan completed with issues
Accounts Discovered – A bar chart that shows the number of accounts detected
on Windows and Unix/Linux devices, displayed by operating system. Privileged
and non-privileged accounts are displayed in different colors. The number of
privileged and non-privileged accounts detected per operating system is displayed
below the chart.
Note:
This number does not include non-privileged account members of the Domain Users
group
Domain Service Accounts Discovered – A bar chart that shows the number of
domain accounts that have the SPN attribute set and the machines that are
affected by these SPN. The number of Privileged SPN accounts includes the
unique number of users in the domain for each registered Service. A user can
appear on several machines and with several registered Services.
Risk Status – A set of pie charts that reflect the following:
Compliant/non-compliant accounts
Privileged/non-privileged accounts
Non-privileged Accounts that are accessed by users in any group not defined as
privileged.
For more information, refer to Account Category in “windows and unix scans’
Accounts Accessible using SSH Keys – A bar chart that shows the unique number
of discovered privileged and non-privileged Unix and Windows accounts that can
be accessed using the discovered SSH Keys. The total number of these accounts
is displayed below the chart.
SSH Keys Trusts Map – Display a visual representation of the machines in your
organization that can potentially be accessed using SSH keys. To display the
map, click OPEN TRUSTS MAP. For more information, refer to Focus on a
Specific Machine, page 94.
Compliance Status – A set of pie charts that reflect the percentage of compliant
and non-compliant SSH keys and accounts discovered during the scan. The exact
number of compliant and non-compliant keys is displayed below each chart.
Note:
SSH Keys are compliant if their key age is lower than or equal to the maximum key
age defined in the SSHKeyMaxAgeInDays parameter in the DNA Configuration file.
For more information, refer to DNA Configuration, page 125
Alternatively, compliant SSH Keys must meet the defined strength (length and
algorithm). For more information about these criteria, refer to SSH Key Compliance
Criteria, page 148.
Note:
SSH Keys are non-compliant if they do not meet one or more of these criteria
Active threats – These threats indicate stored privileged account hashes that may
currently be leveraged against vulnerable machines and cause risk to your
organization.
Inactive threats – These threats indicate privileged account hashes that were
previously stored on a machine posed a risk to your organization at that time.
Mitigated with Privileged Access Security – With Privileged Access Security it is
possible to manage Privileged account passwords and frequently change them,
turning hashes from Active to Inactive. The data in this section simulates the
organization’s threat status with the use of one-time passwords on all privileged
accounts.
Note:
This simulation does not include discovered service account hashes, since they are
always stored on the scanned machine. The threat of service account hashes should
be mitigated using segmentation and least-privilege security strategy
Note:
This map also includes a Golden Ticket attack indication if DNA finds this
vulnerability.
displays the amount of high severity security findings on scanned EC2 Instances.
What is Pass-the-Hash?
The “What is Pass-the-Hash” sheet explains how Pass-the-Hash attacks work and
how DNA helps you assess the current and potential risk of Pass-the-Hash attacks in
your organization.
The rows highlighted in yellow indicate accounts that are non-compliant with the
company’s current password policy. Accounts are determined non-compliant if
they are older than the maximum account password age specified in the
AccountMaxPasswordAgeInDays parameter. For more information, refer to DNA
Configuration, page 125, in Configuration Parameters, page 125.
The rows highlighted in pink indicate accounts that are vulnerable to a Pass-the-
Hash attack.
Public SSH Keys data. DNA discovers public SSH keys using the authorized keys
file used by the OpenSSH server. For more information, refer to the relevant
explanations in the table below.
Insecure Privilege Escalation details about each Unix account. For more
information, refer to the relevant explanations in the table below.
The following indications help you identify accounts that are at risk:
The rows highlighted in yellow indicate accounts whose password is non-
compliant with the company’s current password policy or whose SSH key is non-
compliant. SSH Keys are non-compliant if they do not meet one or more of the
following criteria:
The age of the SSH Keys is lower than or equal to the maximum key age
defined in the SSHKeyMaxAgeInDays parameter in the DNA Configuration
file. For more information, refer to DNA Configuration, page 125, in
Configuration Parameters, page 125.
The SSH Keys meet the defined strength (length and algorithm). For more
information about these criteria, refer to SSH Key Compliance Criteria, page
148.
The rows highlighted in pink indicate accounts whose privileges have been
escalated insecurely.
The tables below explain the statistics included in the Scan Summary/Scan Details
area.
SCAN SUMMARY
Statistic Description
Total machines The total number of machines identified in the specified OU and all
identified of its sub-OUs.
Machines scanned The total number of machines scanned successfully, and the
successfully percentage.
Machines failed The total number of machines for which at least one but not all
partially types of scans failed due to errors, and the percentage.
identified
Unique accounts The total number of unique accounts identified in the scan.
identified
SCAN DETAILS
Statistic Description
Date The current date and time, in the following format: day, month,
date, year, time. For example: June 12, 2014 10:33 AM
Created by The display name of the user logged on to the machine where
CyberArk DNA is run.
LDAP path The LDAP path used to identify the accounts to scan.
Note: If the scan was performed on accounts listed in an
imported file, the displayed LDAP path will be N/A.
Column Specifies
Machine Name The name of the current machine about which information was
retrieved.
Column Specifies
(Windows only)
Account Name The login name of the account about which information was
retrieved.
Local Mapped The local account to which the Active Directory account is
Account mapped. If no local account is mapped, N/A is displayed.
(Unix only)
Account Display The account display name as it appears in the account properties.
Name Usually contains a combination of the first and last name of the
user.
Column Specifies
Account Group The name of the local group of which the account is a member.
■ If the account does not belong to any local group, N/A is
displayed.
■ For privileged accounts that were discovered in the sudoers
file, *Sudoers file* is displayed.
■ For privileged accounts that were discovered on HMC
machines, *hmcsuperadmin task role* is displayed.
■ For privileged accounts that were discovered on VIO
machines, *vios.oemsetupenv authorization* is displayed.
Privileged Domain The name of the domain group(s) that are a member of the local
Group group stated in the Account Group column and that the user is a
member of in the domain. If there is more than one group the
group names are separated by semi-comma (';').
In case the user is a direct member of the local group, the value of
this column will be N/A
Pass-the-Hash: Whether or not this account hash was found on any other machine
Vulnerable and this machine is, therefore, vulnerable to a Pass-the-Hack
(Windows only) attack. Possible values are:
■ Yes – This account hash was found on another machine,
making this machine vulnerable.
Column Specifies
Pass-the-Hash: Whether or not a hash for this account was found on this machine.
Hash Found Possible values are:
(Windows only) ■ Yes – A hash for this account was found on this machine.
■ No – A hash for this account was not found on this machine.
■ Previously – A hash for this account was once stored on this
machine. It no longer poses a threat, but constitutes a
potential threat.
Threat cause The reason(s) why the hash was stored on this machine. Possible
(Windows only) values are:
■ Local login
■ Scheduled task was run
■ Windows Service was run
■ Machine unlocked
■ IIS authentication/Powershell script run
■ Remote command execution
■ Remote login via RDP
■ Local offline login
Service Account The type of service account identified. Possible values are:
Type ■ Windows Service
(Windows only) ■ Scheduled Task
■ IIS Application Pool
■ IIS Anonymous Authentication
■ IIS Virtual Directory
■ IIS Configuration Redirection
■ IIS Authentication with ASP.NET Impersonation For a
detailed description of embedded Windows credentials, refer
to Embedded and Hard-Coded Credentials, page 149.
Column Specifies
Account State The current state of an account. This field contains one of the
following four values, based on priority (from high to low): 1 =
Disabled (Password) 2 = Locked out (Password) 3 = Expired
(Password) 4 = Enabled
Column Specifies
Expires This indicates that the user will not be required to change their
password based on the domain password policy.
Credential Type The type of credential that was found. Possible values are:
(Windows Only) ■ Password
■ Hash
■ Password and Hash
■ None
Password Age The current account password age, in days. This will appear as a
fraction if the age is less than one day.
Insecure Privilege The lines in the sudoers file that enable users other than the root
Escalation user to bypass predefined rules. These lists are error-prone and
may give excessive privileges for accounts.
Insecure Privilege The reason why the identified configuration could be insecure. It
Escalation: may be either of the following:
Reason ■ The sudoers configuration file attempts to restrict the
execution of commands using a denylist. However, it is bad
practice to use denylists, since they are prone to human error
and can be bypassed.
■ The sudoers configuration file attempts to restrict the
execution of commands using an allowlist with wildcards.
However, it is bad practice to use the “*” wildcard, since it can
be bypassed.
Password Last Set The date and time the password was last set. For more
information, see Known Behavior and Limitations, page 143.
Last Login Date Displays the last date and time that the account was used for
login. This value can be affected by local logins as well as remote
logins, for example, using an SSH key to connect to a Unix
machine.
■ Local accounts on Windows and Unix – The last date and time
the account was used to log into the current machine.
■ On Windows – If the account has never logged on to the
machine, the value will be “Never”.
■ Domain accounts on Windows machines:
■ If ScanPassTheHash is enabled - The last date and time
the account was used to log into the scanned machine.
■ If ScanPassTheHash is disabled - The last date and time
the account was used to log into any machine in the
domain.
■ By default, Pass-The-Hash scanning is not supported on
single core machines. Therefore, for accounts on single
core machines, DNA will always show the last date and
Column Specifies
time the account was used to log into any machine in the
domain. This can be changed by setting the Pass-The-
Hash scan parameter in the DNA.exe.config file. For more
information, refer to Configuration Parameters, page 125.
■ Note: When DNA did not discover any indication of a login, the
Last Login Date value will be “Never, based on logs”.
■ Domain accounts on Unix machines – The last date and time
the account was used to log into the current machine.
■ Local Service accounts on Windows – The last date and time
the account was used to log into the current machine or that
the account was used to run the service.
■ Domain Service accounts on Windows – The last date and
time the account was used to log into any machine in the
domain or that the account was used to run the service.
For more information, see Known Behavior and Limitations, page
143. Note: If the dates of the “Last Login Date” and the “Key Last
Used” columns are identical, the last logon was done with an SSH
key.
Account Expiration The date and time on which the account is configured to expire.
Date
Number of Keys The number of public SSH keys found for this account on this
Found machine. Note: When multiple SSH keys are found, details of the
SSH key that poses the most risk is displayed. To view a list of all
the SSH keys that were found, display the SSH Key Trusts sheet.
Last Key Update The most recent date and time when the SSH key was last
Date updated. DNA uses the operating system file timestamp to
determine the date of the public SSH key.
■ On Unix/Linux machines and on Windows machines where
Cygwin is installed, DNA uses the last modification date.
■ On Windows machines where Cygwin is not installed, DNA
uses the creation date.
Key Age (at least) The number of days since the public SSH key was last updated.
DNA uses the “Last Key Update Date” value to calculate the “Key
Age” value. The OpenSSH authorized keys file may contain
multiple public SSH keys, and since its last modification date
reflects its most recent update, it is not possible to determine the
exact age of each key in the file. Therefore, the age that is
presented for all public SSH keys in the file should be considered
to be at least this age, although it could be older than this.
SSH Key The algorithm used to create the SSH Key pair. *
Algorithm
Column Specifies
Comment
Command Run on The command that will be run after connection using this SSH Key
Login (if relevant). *
Key Fingerprint The fingerprint of the discovered SSH key. The public and private
keys of the same trust have the same fingerprint. *
Details If CyberArk DNA was unable to scan a remote machine, this field
will contain an error indication, such as “Network path not found”
or “Access denied”.
Note:
When multiple SSH keys are found for a single account, only the details of the SSH key
that poses the most risk is displayed. You can see how many SSH keys were found for this
account in the ‘Number of Keys Found’ column. To view a list of all the SSH keys that were
found, display the SSH Key Trusts sheet
Domain Scan
The DNA Domain scan results contains information about Domain users' Service
Principal Name (SPN). Each row in the report represents a domain service account
with a SPN of a specific machine. An account can appear more than once on the same
machine or on several machines, depending on the number of services that it is
registered to.
The Scan Summary/Scan Details area at the top of the report offers an at-a-glance,
high level overview of the scan results.
The rows highlighted in yellow indicate accounts that are non-compliant with the
company’s current password policy. Accounts are determined non-compliant if they
are older than the maximum account password age specified in the
Statistic Description
Total machines The total number of machines identified that have SPN related to
identified them..
Total service The total number of domain service accounts identified in the
accounts identified scan.
Unique service The total number of unique domain service accounts identified in
accounts identified the scan.
SCAN DETAILS
Statistic Description
Date The current date and time, in the following format: day, month,
date, year, time. For example: June 12, 2014 10:33 AM
Created by The display name of the user logged on to the machine where
CyberArk DNA is run.
Column Specifies
Machine Name The name of the current machine about which information was
retrieved.
Account Name The login name of the account about which information was
retrieved.
Column Specifies
Account Type This field specifies the domain name of the account.
Account Category ■ Service Account – Indicates that the account is used to run
a Kerberos registered service. The service name is
displayed in the Service Account description column.
Service Account The type of service account identified. This is Service Principle
Type Name (SPN).
Service Account The name of the service as described in the SPN of the domain
Description account.
Account State The current state of an account. This field contains one of the
following four values, based on priority (from high to low):
■ 1 = Disabled (Password)
■ 2 = Locked out (Password)
■ 3 = Expired (Password)
■ 4 = Enabled
Password Age The current account password age, in days. This will appear as
a fraction if the age is less than one day.
Password Last Set The date and time the password was last set. For more
information, see Known Behavior and Limitations, page 143.
Last Login Date Displays the last date and time that the account was used for
login. This value displays the last date and time the account
was used to log into any machine in the domain or that the
Column Specifies
Account Expiration The date and time on which the account is configured to expire.
Date
Note:
Private OpenSSH SSH keys that are protected by a passphrase can never be correlated to
their public SSH keys since they are encrypted, but they should not be considered “orphan”
keys. Private PuTTY SSH keys that are passphrase-protected can be correlated to their
public SSH keys, since they include the unencrypted public key
The Scan Summary/Scan Details area at the top of the report offers an at-a-glance,
high level overview of the scan results.
For the SSH Key Trusts sheet, the rows highlighted in pink indicate orphan private
SSH keys (that do not use a passphrase). Orphan private SSH keys constitute bad
practice in SSH key management, since their public SSH key counterpart is missing.
Orphan private SSH keys can be used to re-create their public SSH key counterpart,
which will then be used to establish and configure new SSH key trusts “under the
radar”.
The tables below explain the statistics included in the Scan Summary/Scan Details
area.
SCAN SUMMARY
Statistic Description
Machines scanned The total number of machines scanned successfully, and the
successfully percentage.
Machines failed partially The total number of machines for which at least one but not
all types of scans failed due to errors, and the percentage.
Total accounts identified The total number of accounts identified in the scan.
Unique accounts The total number of unique accounts identified in the scan.
identified
Total service accounts The total number of service accounts (embedded Windows
identified credentials) identified in the scan.
(Windows only)
SCAN DETAILS
Statistic Description
Date The current date and time, in the following format: day,
month, date, year, time. For example: June 12, 2012 10:33
AM
LDAP path The LDAP path used to identify the accounts to scan.
Note: If the scan was performed on accounts listed in an
imported file, the displayed LDAP path will be N/A.
Object types The type of objects selected for scanning. This can be a
combination of accounts (embedded and hard-coded
credentials), privileged accounts and non-privileged
accounts.
Column Specifies
Source Machine The name of the machine where the private SSH key was
found.
Source Account The name of the account that has access to the private SSH
key that was found. This is determined using the file
permissions as well as the directory that the key resides in.
Target Machine The name of the machine where the public SSH key was
found.
Target Account The name of the account to which the detected SSH key
enables access. This is determined using the permissions
that are granted to the authorized keys file.
Column Specifies
Account State The current state of an account. This field contains one of
the following four values, based on priority (from high to low):
1 = Disabled 2 = Locked out 3 = Expired 4 = Enabled
Column Specifies
Orphan SSH Key? If a pair of SSH keys were once deployed in your
environment but one of the key pair could not be found
during the scan, this indicates which single key was
discovered.
Key Last Used The date and time when the SSH key trust was last used.
This information is taken from the syslog on the OpenSSH
server. If no usages were discovered by DNA, the value will
show “Never, based on logs”.
■ The syslog includes the IP address of the source
machine and the fingerprint of the SSH key. However, it
does not contain account names and, therefore, it is not
possible to determine without doubt which source
account was used. DNA correlates the use of SSH keys
based on the account that currently has permission to
the key that was used, based on the fingerprint.
■ The discovered trust may be newer than the discovered
Key Last Used date, since the data is extracted from the
syslog, which contains historic data. It is possible that
trust was previously used, then deleted, and then put in
place again.
■ The syslog includes the IP address of the source
machines and the fingerprint of the SSH key. However, it
is possible that DNA will encounter an IP address of a
machine that was not scanned. In this scenario, this will
be marked in the ‘Source Machine’ column with “(from
SSH log)”, and the following message will appear in the
“Details” column: “DNA discovered the use of an SSH
key from a Source Machine that was not scanned. It is
possible that the IP has changed since use or that the
machine was not scanned by DNA. See troubleshooting
for more details.”
Last Trust Update Date The date when the trust between a private and public SSH
key was established. DNA uses the operating system file
timestamp to determine this value.
■ On Unix/Linux machines and on Windows machines
where Cygwin is installed, DNA uses the last
modification date.
Column Specifies
Trust Age (at least) The number of days that have passed since the SSH key
trust was established. DNA uses the “Last Trust Update
Date” value to calculate the “Trust Age (at least)” value.
Since the most recent date of the two timestamps of the
private and public SSH keys is used, the Trust Age should
be considered to be at least this age, and could be older than
this.
■ On Unix/Linux machines and on Windows machines
where Cygwin is installed, DNA uses the last
modification date to determine the public and private
SSH key age.
■ On Windows machines where Cygwin is not installed,
DNA uses the creation date to determine the private
SSH key age.
■ The OpenSSH authorized keys file may contain multiple
public SSH keys and, since its last modification date
reflects its most recent update, it should be considered
to be at least this age, although it could be older than
this.
■ When DNA correlates a trust between a private SSH key
and a public SSH key, their dates are compared. The
more recent date of the two values is presented in the
“Trust Age (at least)” column. This date reflects the
closest value to the number of days since the SSH Trust
was established.
Key Age (at least) The number of days since the private and/or public SSH key
was created or last updated. DNA uses the “Last Key
Update Date” value to calculate the “Key Age (at least)”
value. DNA uses the operating system file timestamp to
determine this value.
■ On Unix/Linux machines and on Windows machines
where Cygwin is installed, DNA uses the last
modification date to determine the public and private
SSH key age.
■ On Windows machines where Cygwin is not installed,
DNA uses the creation date to determine the private
SSH key age.
■ The OpenSSH authorized keys file may contain multiple
public SSH keys and, since its last modification date
reflects its most recent update, it is not possible to
determine the exact age of each key in the file.
Therefore, the age that is presented for all public SSH
keys in the file, should be considered to be at least this
age, although it could be older than this.
■ When DNA correlates a trust between a private SSH key
and a public SSH key, their dates are compared. The
Column Specifies
Command Run on Login The command that is configured to run after the keys have
established a connection, if any.
Private Key Type The type of private SSH key that was detected. This column
displays one of the following values:
■ OpenSSH
■ PuTTY
Private Key Path The path and filename of the private SSH key.
Public Key Path The path and filename of the public SSH key.
Key Fingerprint The fingerprint of the discovered SSH key. The public and
private keys of the same trust have the same fingerprint.
Database Scan
DNA uses the Windows credentials of a domain user that has the sysadmin server
role to log onto the target machine and discover users in MSSQL databases for local
SQL or Windows/Local or domain users. The scan detects both privileged and non-
privileged users.
The table below explains the columns included in the Database Scan sheet.
Column Specifies
Instance name The name of the specific instance of the DB in the server.
Account name The name of the entity that can connect to the Server.
Context Whether the account is on the context of the server or the database.
User name The name of the entity that can connect to the database itself. If a
login has several users, each user will have a separate line in the
report.
Database name The name of the database. There may be only one database per
user.
A login that has any database role other than public, or has
any permission other than connect sql
Column Specifies
Roles A list of the database/instance roles (either of the login or the user)
that this account belongs to, separated by ';'.
Permissions A list of all the permissions of the login/user separated by ';' that this
user has over the database.
Hard-Coded Credentials
The Hard-Coded Credentials sheet displays the DNA scan results for hard-coded
credentials discovered in files stored on machines in your enterprise. Each row in the
report represents a credential that was discovered.
Applications use credentials to establish connections to a remote target machine or
system. On WebSphere and WebLogic servers, DNA discovers such hard-coded
credentials in data sources and on IIS servers. For Ansible Playbooks, DNA discovers
hard-coded credentials in tasks, variables and other areas of the playbook. If a
machine cannot be scanned, its name and type is displayed with an error indication.
For more information, refer to Embedded and Hard-Coded Credentials, page 149.
If the scan does not find any hard-coded credentials, this sheet will not be created.
The table below explains the columns included in the Hard-coded Credentials sheet.
Column Specifies
Machine Name The name of the current machine about which information
was retrieved.
Application Server The name of the application server where the account was
discovered. Possible values are:
■ IIS version
■ WebSphere version
■ WebLogic version
■ Ansible
Application Name The name of the application that uses the discovered
credentials. For credentials that are not linked to any
application, eg, in IIS, ‘Credentials not in use by any
application’ will be displayed.
Site Name The name of the IIS website where the hard-coded
credentials are stored. For credentials discovered on
Column Specifies
Account Name The user name of the credential about which information
was retrieved.
Hard-Coded in File The name of the file in which the credentials are hard-
coded.
Credentials discovered on WebSphere are either
stored in a security.xml or server.xml file.
Hard-Coded Credential The credentials that are hard-coded and its location in the
file. The password itself is replaced by asterisks.
Target System Address The IP address or DNS of the target system where the
discovered account will be used.
N/A – Indicates that the credentials were discovered in an
Ansible playbook.
Target System Type The type of system where the discovered account will be
used. Possible values are:
■ Database
■ Web
■ Active Directory
■ N/A – Indicates that DNA didn’t recognize the target
system type from the connection string, or that the
credentials were discovered in an Ansible playbook.
Cloud Users
The Cloud Users sheet displays the DNA scan results for Cloud Users and Access
Keys discovered in AWS scans. Each row in the report represents a credential that
was discovered, either an IAM user or an Access Key.
IAM Access Keys are related to an IAM user and have the same permissions as them.
Discovering all the IAM users, their policies and other privileged relevant data helps in
assessing the risk with each IAM user or Access Key. Privileged users in the AWS
console can have devastating results if not managed and monitored correctly
according to a password policy.
For more information, refer to Configure AWS Scan Policies, page 136
If the AWS scan is not selected, this sheet will not be created.
Cloud Instances
The Cloud Instances sheet displays the DNA scan results for Cloud Instances
discovered in AWS scans. Each row in the report represents an EC2 Instance with
relevant details about the instance and key pair (if found). A key pair for an instance
should be used only for certain cases. An instance that has a public DNS is more
vulnerable and exposed to attacks.
If AWS Inspector scan was selected and AWS Inspector data is available on the
scanned instances, additional data about the instance findings will be displayed.
For more information, refer to Configure AWS Scan Policies, page 136
If the AWS scan is not selected, this sheet will not be created.
Scan Errors
The final sheet in the Discovery and Audit Report is the Scan Errors sheet. This sheet
contains basic scan errors, such as connectivity errors, DNS errors and OS detection
errors. The errors are listed in the Details column of each row.
The errors that are listed in this sheet are also stored in the scan log file which is
created for each scan. For more information, refer to Logging, page 107.
Overview
When you open a map, the Summary is displayed in the right pane.
Vulnerable The total number of machines that were scanned and are displayed
machines on the map and the breakdown of machines that expose your
network to Golden Ticket and Pass-The-Hash attacks and
vulnerabilities.
The number of total machines is not the sum of Machines
causing vulnerabilities and Vulnerable machines because these
two groups overlap. Machines can both cause vulnerabilities and
can be vulnerable.
Note:
All machines that are part of a Golden Ticket or Pass-the-Hash attack are
displayed. If a machine is not vulnerable or does not cause a vulnerability, it is
not displayed. Therefore, it is possible for a machine to be included in the report,
but not appear on the map.
Mini Map
At the bottom right of the map, the mini-map can be used to zoom in/out and move
around the main map.
Machine When you select a machine name, the right pane shows
information that is specific to that machine:
■ Vulnerability status – If the scanned machine is vulnerable to
a Golden Ticket attack, a message is displayed at the top of
the summary pane.
■ Status of exposure to attacks – The total number of
privileged account hashes found on the selected machine is
displayed with a breakdown of the number of privileged
account hashes found on the selected machine that expose
You can view possible Golden Ticket attacks in the Organizational Vulnerability Map of
your scanned network in either of the following ways:
■ Select the Domain Controller. If your network is vulnerable to a Golden Ticket
attack, arrows point to all machines that put the network at risk of a Golden Ticket
attack.
Or,
■ Select any machine. If a hash is discovered on the selected machine that can be
exploited for a Golden Ticket attack, an arrow points to the Domain Controller.
Auto-zoom
When the Organizational Trust Map is displayed, the machine where the most non-
compliant SSH Keys are stored will be zoomed onto, making it easy to focus on the
machine that most requires immediate attention.
Overview
When you open a map, the Summary is displayed in the right pane.
Total SSH Key The total number of SSH Key pairs found on all machines on the map.
pairs
Total SSH Key The total number of SSH connections that can be established from an
trusts account on one machine to another account on a different machine in
the map.
Note:
All machines where SSH Keys are stored are displayed. If an SSH Key is not
stored on a machine, it is not displayed in this map.
Mini Map
At the bottom right of the map, the mini-map can be used to zoom in/out and move
around the main map.
SSH Key To view all SSH Key exposures involving a certain machine, click its
exposures name.
Direction The directional arrows represent the direction in which an SSH Key
trust can be used to access another machine.
The machine on the originating side of the arrow is the machine
where the private SSH key that enables access is stored.
The machine on the target side of the arrow is the machine
where the corresponding public SSH key is stored and,
therefore, can be accessed.
Machine When you select a machine name, the right pane shows information
that is specific to that machine:
Private SSH Keys found – The number of private SSH keys
found on the selected machine. Additional information describes
how many accounts can be accessed on other machines in the
map using these SSH keys.
Public SSH Keys found – The number of public SSH keys found
on the selected machine. Additional information describes how
many accounts can be accessed from other machines in the
map using these SSH keys.
Orphan Private/Public SSH Keys found – The number of orphan
private/public SSH keys found on the selected machine.
Account Scan
Scenario 1: How many non-compliant privileged accounts do I have?
In the Executive Summary
In the Compliance Status section, the TOTAL NON-COMPLIANT chart shows the
percentage of non-compliant privileged and non-privileged accounts, as shown
below:
This displays a list of all local privileged accounts that can access servers. The Last
Login Date column shows the last date and time that the account was used to log into
the correlated machine.
This information shows when the account was last used to log into each machine.
Scenario 5: Do my servers have ‘backdoor’ accounts? How do I find all local
privileged non built-in accounts?
1. Filter the Account Category column to show only Privileged Shared/Local records.
These are the local privileged accounts, such as Administrator.
2. Filter the Machine Type column to show only Server.
3. In Account Description, clear Built-in account for administering the
machine/domain.
This displays a list of all local non built-in privileged accounts that can access servers.
The accounts may have been:
■ Left unintentionally by decommissioned applications. They may be leveraged
maliciously as ‘backdoors’ to the advantage of attackers.
■ Created by malware.
■ Created by a third-party contractor without informing IT. Contractors may create
such local privileged accounts to aid in their work while not considering security
implications.
Local privileged accounts are considered high risk due to their enhanced permissions.
Scenario 6: Which non-privileged accounts can access my servers?
1. Filter the Account Category to show only Non-privileged Shared/Local and Non-
privileged Personal/Domain records.
2. Filter the Machine Type column to show only Server.
This displays a list of all non-privileged accounts that can potentially log into the
organization’s servers.
It is bad practice to allow personal or shared non-privileged users to log into servers.
Other scenarios recommend that you refer to the SSH Keys: Organizational Trust Map
that is described in detail in Focus on a Specific Machine, page 87.
For all SSH Key row in the SSH Key Trusts sheet, get the unique Key Fingerprint
to see the unique number of SSH Key pairs detected.
The total number of accessible accounts is the number of unique target accounts
that can be accessed using these keys.
Only target accounts are "Accessible". Source accounts enable access to target
accounts.
Scenario 1: How many Privileged account hashes were found and, as a result,
how many vulnerable machines are there?
In the Executive Summary Dashboard
In the Credential Theft Vulnerability section, do the following:
In the Pass-the-Hash: Active Threats section, the number of the unique privileged
account hashes, and the total number of machines on which the hashes were
found is displayed.
On the right, in the Vulnerability Status section, the pie chart shows the
percentage of vulnerable machines in the entire organization, as a result of the
Active Threats described on the left.
The percentage of vulnerable machines points out the magnitude of the Golden Ticket
and Pass-the-Hash problem.
In the Organizational Vulnerability Map
In the Executive Summary Dashboard, in the Credential Theft Vulnerability section, do
the following:
1. Click OPEN MAP then, In the dialog, choose the map file to open.
2. On the right pane of the Organizational Vulnerability Map, the number of Machines
causing vulnerabilities, Vulnerable machines and Privileged account hashes found
is specified.
In the Windows Scan Sheet
■ Filter the Pass-the-Hash: Vulnerable to show only records with Yes.
All vulnerable privileged accounts are displayed. Privileged accounts are vulnerable on
a specific machine because the Privileged account hash was found on another
machine.
■ Filter the Pass-the-Hash: Hash Found to show only records with Yes.
All privileged accounts whose hashes were found on a certain machine are displayed.
Scenario 2: Which machines cause a vulnerability on a certain machine? Which
machines are made vulnerable due to a certain machine?
In the Organizational Vulnerability Map
In the Executive Summary Dashboard, in the Credential Theft Vulnerability section, do
the following:
1. Click OPEN PTH MAP. In the dialog, choose the map file to open.
2. Use the Search field to find a machine to be analyzed, or click any machine on the
map.
The map shows all machines that cause a vulnerability on this machine, and/or all
machines that are made vulnerable due to this machine. See the legend at the bottom
left of the map for more information.
1. Filter the Pass-the-Hash: Hash Found to show only records with Yes.
This displays a list of all privileged accounts whose hash has been found, sorted by the
number of machines on which they cause a vulnerability.
The first account on the list causes the most vulnerabilities in the organization, and so
on.
Scenario 4: What if Privileged Access Security were implemented in my
organization? How would that help me mitigate Pass-the-Hash?
In the Executive Summary Dashboard
In the Credential Theft Vulnerability section, do the following:
■ In the Pass-the-Hash: Mitigated with Privileged Access Security section, a “before
and after” simulation is given.
This shows the number of active privileged account hashes before implementing
Privileged Access Security and after implementing the use of one-time passwords for
all privileged accounts found by DNA.
Scenario 5: Which workstation may be a starting point for a Pass-the-Hash
attack?
In the Windows Scan sheet
1. Filter the Pass-the-Hash: Hash Found to show only records with Yes.
This displays a list of all workstations on which Privileged hashes have been found.
Workstations are often the first step in a Pass-the-Hash attack, since they are the most
susceptible to APTs.
Scenario 6: Which Privileged account hashes were once stored, no longer
cause vulnerabilities, but constitute an underlying threat?
In the Executive Summary Dashboard
in the Credential Theft Vulnerability section, do the following:
■ In the Pass-the-Hash: Inactive Threats section, the number of unique privileged
accounts hashes, and the total number of machines on which privileged account
hashes were stored previously is displayed.
Hashes are deleted by Windows in certain scenarios, such as when logging off or
restarting the machine.
In the Windows Scan sheet
1. Filter the Pass-the-Hash: Hash Found to show only records with Previously.
2. Filter the Account Category to show only Privileged Shared, Privileged Personal,
and Service Account records.
3. Filter the Account Type to show only domain records.
This displays a list of all privileged accounts whose hash has been previously stored on
the machine, but is no longer stored. Hashes are removed in certain scenarios, such
as when logging off or restarting the machine.
These privileged hashes may become an imminent threat the next time they are used.
Scenario 7: Why are hashes stored on my servers?
1. Filter the Pass-the-Hash: Hash Found to show only records with Yes.
2. Filter the Machine Type to show only records with Server.
3. Filter the Account Category to show only Privileged Shared, Privileged Personal,
and Service Account records.
4. Filter the Account Type to show only domain records.
This displays a list of all servers on which Privileged hashes have been found. The
Threat Cause column shows the reasons that hashes have been stored on the server.
For example: Remote command execution, Remote login via RDP.
Scenario 8: How many machines are exposed to credentials theft?
In the Executive Summary
■ In the DETECTED CREDENTIALS: VULNERABLE MACHINES graph, you can
see the number of machines that are vulnerable to credentials theft.
In the Scan Report
■ In the Windows Scan sheet, filter the Credential Type column to include
Password, Hash and ‘Password and Hash’.
■ The unique number of Machine names is the number of machines that are
exposed to credentials theft techniques.
3. To view the obfuscated database you can use any SQLite viewer.
1. Run a scan.
Logging
During each scan, the DNA creates log files in the DNA\Log folder to monitor DNA
activity and status during that scan.
At the end of the scan, these log files are stored in a zip file called DNA_Package_
Logs_YYYY-MM-DD_hh_mm_ss-PM/AM.zip. This zip file includes the entire DNA\Log
folder.
For example, a zipped file of a scan that began on March 10, 2016, at 10.00pm would
be called DNA_Package_Logs_2016-03-10_10_00_00-PM.zip.
You can send this zipped file to your CyberArk representative for analysis and
troubleshooting.
Troubleshooting
The troubleshooting options in this chapter guide you through the main issues that may
occur when using DNA.
Errors reported by DNA always start with the letters DNA, for example “DNAPR188E”.
Errors that do not start with these letters may have been returned by the operating
system or certain libraries. In such cases, it is recommended to search online for the
error string.
For more information, contact your CyberArk support representative.
In this section:
Scanning Issues
Imported File Issues
Report Issues and Messages
Log Error Messages
Scanning Issues
the SSHCommandExecutionTimeoutInSeconds
parameter.
2. Rerun DNA and check the results. If needed, increase
timeout value again.
■ keyboard-interactive
■ Make sure that the scanning user is allowed to connect
via SSH to the target machine.
■ Make sure that the scanning machine is not blocking
SSH outgoing connections, and that port 22 is not
blocked by a firewall (Windows Built-in firewall or any
other 3rd party firewall software/hardware).
To check the above, try to logon to your target machines with
PuTTY or any other preferred SSH client.
Possible Reason ■ The scanning user doesn't have administrative privileges
(Windows machines) on the target machine.
■ Windows File and Printer Sharing is not enabled on the
target machine or another network protocol is blocked by
a firewall.
Possible Solution ■ Make sure that all network protocols are enabled on all
(Windows machines) the target machines to scan and that firewalls do not
block this type of traffic. For more information, refer to
Windows Requirements, page 14.
■ Make sure that the scanning account has administrative
privileges on the target machines (i.e., is a member of
the built-in Administrators group).
■ The UAC on the target machine may block the local
administrator login. Try to run the scan with the Domain
administrator’s credentials.
Problem The following error message is displayed in the log and the
Scan error sheet: “Cannot start scanning machine
{machine address}. Machine is unavailable. Ping
request timed out."
Possible Reason A machine did not respond to a ping request.
Possible Solution ■ It is possible that the scanned machine is configured not
to respond to ping requests. If so, in the DNA
configuration file, set PingMachineBeforeScan to No,
Or,
1. If you specified a machine name, make sure that the DNS
record corresponds to the machine to scan.
2. 3Make sure that the DNA can communicate with the DNS
machine.
3. Try to ping the machine through the command line.
Problem DNA failed to discover MS SQL instances with the following error:
Problem When scanning using the File Import method, the following errors
occurred while trying to retrieve information from the Active
Directory:
■ Unable to retrieve account information due to lack of domain
credentials.
■ Unable to retrieve group information due to lack of domain
credentials.
Possible Reasons The domain address is missing from the "Domain (optional)"
column.
Possible Solutions To scan with a domain account, specify the domain address in the
"Domain (optional)" column.
To scan with a local account, leave the "Domain (optional)" column
empty. DNA will assume that this is a local credential and will not
try to connect to the Active Directory domain.
Possible Solutions Make sure that password values in the imported file, which contain
the same character as the delimiter specified in the
ScanFromFileCsvDelimiter parameter, are properly escaped, as
explained below:
■ Password values that contain the delimiter value, should be
surrounded by double quotes. By default, the delimiter value is
a comma.
■ Password values that contain double quotes should be
surrounded by double quotes and each literal double quote
should be escaped by adding another double quote that
immediately precedes it.
Note: Any field can be quoted, but only fields that contain the
delimiter character or quotes MUST be quoted.
For example:
Original text Escaped text
test test
Problem The report shows a Password Age of 0 for all Unix/Linux accounts.
Possible Reasons ■ The “shadow” file was not read successfully on all Unix/Linux
machines.
■ DNA may have encountered errors while scanning.
Possible Solutions ■ Make sure the credentials supplied to DNA have root
privileges when using the sudo command on the local
scanned machines.
■ Check the console log for errors.
Problem The report shows an error when scanning the machine from which
DNA is run.
Possible Reasons Service account scans are not supported on the machine where
CyberArk DNA is running. For more information, see Known
Behavior and Limitations, page 143. The following error appears in
the DNA Report: “User credentials cannot be used for local
connections”.
Possible Solutions To scan the specified machine, run DNA from a different machine.
Problem When users open the DNA report, the following message appears:
“Excel found unreadable content in [FILENAME]. Do you want to
recover the contents of the workbook? [...]”.
Possible Reasons The size of the Excel file was reached due to very long DNA
results.
Possible Solutions Repair the Excel file to solve the problem. If it does not, try limiting
the scan to a smaller OU to decrease the length of the results.
Problem When users open the DNA report, the following message appears:
“Unable to resolve one or more group members. Cannot access
trusted domain”
Possible Reasons CyberArk DNA cannot access a trusted domain or another domain
in the forest to resolve all the group members.
Problem The following error message is displayed in the log and the Scan
error sheet to indicate that a machine did not respond to a ping
request: “Cannot start scanning machine {machine address}.
Machine is unavailable. Ping request timed out."
Possible Reasons The machine is down, or failed to respond to the ping request for
another reason.
Possible Solutions ■ Make sure the machine is up and connected to the network.
■ Make sure that the ICMP protocol is not blocked in the
machine firewall or in your environment.
Problem The following error message is displayed in the trace log of the
machine: "No suitable authentication method found to complete
authentication."
Possible Reasons In the scanned machine, the relevant authentication method was
not configured.
Possible Solutions Configure SSH Server password authentication support in the
/etc/ssh/sshd_config configuration file, as follows:
1. Logon to your host. This can be done locally or by using your
preferred SSH2 client, for example PuTTY.
2. Specify the following command:
vi /etc/ssh/sshd_config
Problem The following error message is displayed in the log and the Scan
error sheet to indicate that DNA could not log onto a specific
database: “Failed to logon to <DB_Version> on <Machine_Name>
using username <Supplied_Username>. Error: <Return error from
the DB>"
Possible Reasons The supplied credentials aren't strong enough to scan the
database.
Possible Solutions Use credentials that will enable you to access the database and
scan it.
Appendices
In this section:
Configuration Parameters
Configure Root Permissions Using the Sudoers File
Configure AWS Scan Policies
Configure Audit Policy
Import a File
Known Behavior and Limitations
SSH Key Compliance Criteria
Embedded and Hard-Coded Credentials
Discover Public SSH Keys
Ports used by DNA
Configure Logging for ‘Key Last Used’ Data
Configuration Parameters
DNA Configuration
CyberArk DNA allows you to configure various parameters in the DNA.exe.config
configuration file, which is located in the same directory as the DNA.exe file. The table
below describes the configurable parameters.
TraceLogActive
Description Whether or not a trace log will be written when the tool is run.
LogPath
Description The default path to which the trace and console logs are
written.
ReportPath
Description The default path to which reports are written. [DNA Path]
refers to the location DNA is run from.
You can also specify an absolute path, for example:
C:\MyDNA\MyReports
MaxThreadNumber
Default Value 10
AccountMaxPasswordAgeInDays
Default Value 90
SSHExpectInputTimeoutInSeconds
Description The maximum time, in seconds, DNA will wait for a shell
prompt after running a command.
Default Value 60
SSHCommandExecutionTimeoutInSeconds
Description The maximum time, in seconds, DNA will wait for an SSH
command to execute. When an SSH command times out,
DNA will continue to run the next command. This parameter
must be configured in correlation to the
DistributedScansTimeoutInSeconds, which can override it
and should be set to at least ten times greater than this value.
SSHPort
Description The port that DNA will use to connect to target machines
using SSH.
Default Value 22
PassTheHashTimeFrameInDays
Description The timeframe in days for which DNA will retrieve data, when
scanning for Pass-the-Hash vulnerabilities, including Golden
Ticket attack vulnerabilities.
Default Value 90
ScanFromFileCsvDelimiter
Description The CSV delimiter of the import file. The default delimiter is
",". This is a hidden parameter that can be changed to any
other supported CSV delimiter.
DeleteDB
AccountTypeScanFilter
AccountCategoryScanFilter
ScanWindowsServices
ScanScheduledTasks
ScanPassTheHash
ScanDomainServices
DistributedScans
Description Whether or not DNA will dedicate a process for each target
machine scan and terminate after a timeout. When this
parameter is set to “All”, DNA will use multiple processes by
creating a separate process for each target machine scan,
and will timeout after a preconfigured amount of time, set in
the DistributedScansTimeoutInSeconds parameter. When
this parameter is set to “None”, DNA will run in a centralized
manner and will not use a separate process for every target
machine. This configuration might cause a failure in one of the
target machines which will cause DNA to be unresponsive.
The number of machines that can be scanned concurrently in
each of the aforementioned configurations is set in the
MaxThreadNumber parameter.
DistributedScansTimeoutInSeconds
Description The maximum time, in seconds, that DNA will wait for a
distributed scan to execute. This parameter overrides the
following parameters and therefore must be configured in
correlation to their values:
■ SSHCommandExecutionTimeoutInSeconds – For best
practice, the DistributedScansTimeoutInSeconds
parameter must be at least ten times higher than the
SSHCommandExecutionTimeoutInSeconds parameter.
■ WindowsCommandExecutionTimeoutInSeconds – For
best practice, the DistributedScansTimeoutInSeconds
parameter must be at least 300 seconds higher than the
WindowsCommandExecutionTimeoutInSeconds
parameter.
WindowsCommandExecutionTimeoutInSeconds
Description The maximum time, in seconds, DNA will wait for a Windows
command to execute. When a Windows command times out,
DNA will stop scanning the current Windows machines, since
it is highly likely that the rest of the commands will also time
out. It is recommended to increase the default value of the
WindowsCommandExecutionTimeoutInSeconds parameter,
UseLDAPS
Default Value No
PingMachineBeforeScan
PingIntervals
Description The number of intervals that DNA will wait for the Ping
command to run.
This is a hidden parameter.
Default Value 4
PingTimeoutInMilliseconds
DistributedWMI
Default Value No
DistributedWMITimeoutInSeconds
Description The maximum time, in seconds, that DNA will wait for a
distributed WMI query to execute.
ScanVulnerableCredentials
ScanSSHKeysOnUnix
Description Whether or not DNA will scan for SSH Keys on Unix
machines.
ScanPrivAndPubSSHKeysOnWindowsViaCygwin
Description Whether or not DNA will scan private and public SSH keys on
machines where Cygwin is installed.
ScanPrivSSHKeysOnWindowsNotViaCygwin
Description Whether or not DNA will scan for private SSH keys on
machines where Cygwin is not installed. DNA uses a
proprietary method of scanning endpoints, which is different
from the read-only protocols and APIs that DNA uses
regularly for all other scans. During the scan, DNA copies mini
agents from the scanning machine to each scanned machine.
These mini agents scan the Windows machine locally for
private SSH keys and then securely communicate the
information back to the scanning machine. Once the mini
agent has completed its task, it ends all processes and
deletes itself from the scanned machine. To verify that no
processes or files have been left on the scanned machine, the
scanning machine remotely verifies that the processes have
been completed successfully. Note: In the case of a power or
network outage, the processes may not have fully succeeded,
and files might be left over on the scanned machines. For
more information about the steps required to clean up these
machines, refer to Scanning Issues, page 110, in
Troubleshooting, page 109.
Default Value No
SSHKeyScanPathsOnUnix
Description The path where DNA will search for private SSH keys on Unix
machines.
SSHKeyScanPathsOnWindows
Description The path where DNA will search for private SSH keys on
Windows machines.
SSHKeyMaxAgeInDays
DiscoverSSHKeysInBinaryFiles
Description Whether or not DNA will discover private SSH keys in binary
files.
This parameter is only relevant when scanning Unix machines
and Windows machines with Cygwin, not when scanning
Windows machines without Cygwin.
Default Value No
SSHScanSingleCore
Default Value No
DNAExecSSHScanSingleCore
Default Value No
PassTheHashScanSingleCore
Default Value No
AWSRequestTimeoutInSeconds
Description The maximum time, in seconds, DNA will wait for an AWS
command to execute. When an AWS command times out,
DNA will stop scanning the current AWS machines, since it is
highly likely that the rest of the commands will also time out.
Default Value 20
Hard-Coded Credentials
ScanHardCodedCredentialsInIIS
ScanHardCodedCredentialsInWebSphere
WebSphereInstallationPaths
Default Value
/opt/IBM/WebSphere/AppServer /usr/IBM/WebSphere/AppS
erver
ScanHardCodedCredentialsInWebLogic
WebLogicInstallationPaths
ScanHardCodedCredsInDevOpsTools
AnsiblePlaybookScanPathsOnUnix
Description The default Unix path where DNA will search for Ansible
Playbooks.
Acceptable Values Full path of folder on Unix. Separate multiple values with a
space delimiter.
AD Bridge Integration
ScanADBridge
Description Whether or not DNA will scan all machines for domain
accounts.
Note: This is a hidden parameter.
Acceptable Values ■ Yes – DNA will scan all machines for local and domain
accounts.
■ No – DNA will scan all machines for local accounts only.
ScanDatabase
Description Whether or not DNA will scan MSSQL databases for SQL or
Windows/Active Directory databases users.
Unix/Linux-Specific Configuration
When scanning Unix/Linux devices, CyberArk DNA uses various parameters in the
UnixPrompts.ini configuration file. This file is located in the same directory as the
DNA.exe file, and can be customized if certain scenarios occur. For details, see
Troubleshooting, page 109.
The table below describes the configurable parameters.
Parameter Description
The following parameters enable DNA to support Unix/Linux flavors for which the
required files are located in non-standard folders. If DNA does not find a file in the
default path, it will use the relevant path parameter to search for it.
Specify the parameters in the table below in the Paths section of the UnixPrompts.ini
file. In each parameter, specify the full path, including the file name, as shown in the
following example:
[Paths]
sudoerPath=/usr/local/etc/sudoers
Parameter Description
Note:
DNA supports the sudo-replacement solutions that are listed in Sudo Replacements, page 22
To configure root permissions for the administrative user account configured to scan
with DNA:
Platform Command
Note:
For more information, see the section about how to scan using least privilege permissions
in the CyberArk DNA™ Technical FAQ guide.
The built-in policy that allows IAM scans is called IAMReadOnlyAccess. The following
example shows a possible policy document.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"iam:GenerateCredentialReport",
"iam:GenerateServiceLastAccessedDetails",
"iam:Get*",
"iam:List*"
],
"Resource": "*"
}
]
}
"Action": [
"ec2:DescribeInstances",
"ec2:DescribeKeyPairs"
],
"Resource": "*"
}
]
}
The built-in policy that allows EC2 scans is called AmazonEC2ReadOnlyAccess. The
following example shows a possible policy document.
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "ec2:Describe*",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "elasticloadbalancing:Describe*",
"Resource": "*"
},
{
"Effect": "Allow",
"Action": [
"cloudwatch:ListMetrics",
"cloudwatch:GetMetricStatistics",
"cloudwatch:Describe*"
],
"Resource": "*"
},
{
"Effect": "Allow",
"Action": "autoscaling:Describe*",
"Resource": "*"
}
]
}
Note:
If the Security Policy is defined in more than one location, conflicts are resolved by an order
of precedence described in: http://technet.microsoft.com/en-us/library/jj966254.aspx#BKMK_
ApplySecSettings
Import a File
DNA can import a file that specifies which Windows or Unix/Linux machines in your
organization it will scan. The imported file must include a list of machines and the
administrative credentials for each machine.
When setting up a scan for Windows machines, specify the user(s) who will be used to
scan and their password(s).
When setting up a scan for Unix/Linux machines, specify the user(s) who be used to
scan and their password(s) or SSH Key(s). For more information, refer to Scan
Unix/Linux machines using a Password or an SSH Key, page 140.
Note:
DNA v5 does not support file import formats from previous versions
File Format
To be imported into DNA successfully, the file must meet the following requirements:
■ The file must be in CSV format. To download a CSV template that you can use to
create your CSV file, in the Setup scanning from a file window, click the link Click
to download CSV template.
■ It must include the following columns, in this order:
■ Server name/IP – The DNS name or IP address of a machine.
■ Username – The username to be used for scanning the machine.
■ Password – The user’s password. Specify either the password or the SSH key
in the “SSH Key” column, but not both.
■ Domain – The domain address, if the account is a domain account. This is
optional.
■ SSH Key – The filename of the private SSH key that will authenticate the user
and enable them to connect to a remote machine. For information about where
to store the private SSH key, refer to Scan Unix/Linux machines using a
Password or an SSH Key, page 140. Specify either the private SSH key or the
user’s password in the “Password” column, but not both.
■ It is also possible to use a passphrase-protected SSH Key. If you choose to do
so, specify the passphrase in the “Passphrase” column.
■ DNA supports the following private keys in OpenSSH format:
■ RSA
■ DSA
■ The following encryption algorithms are supported:
■ DES-EDE3-CBC
■ DES-EDE3-CFB
■ DES-CBC
■ AES-128-CBC
■ AES-192-CBC
■ AES-256-CBC
■ Passphrase – The passphrase that protects the SSH Key specified in the
“SSH Key” column.
Note:
■ The names of the columns do not need to be the same as above.
■ The first row of the CSV must include the column headers.
■ The CSV delimiter must be a comma: “,”.The delimiter can be changed in the
CsvFileImportDelimeter parameter in the DNA configuration file.
■ The credentials in the file must have local administrative or root privileges for the
machines to be scanned. If DNA is configured to scan for Golden Ticket and Pass-the-
Hash vulnerabilities, domain administrator credentials must be given; in this case,
local administrative credentials are insufficient and are not supported.
■ Make sure to delete the file used for this scan at the end of the scan, as it contains
sensitive credentials.
Example
The following example shows the contents of a CSV file:
b. Click Click to download CSV template; the CSV template file is downloaded
your local machine.
2. Open the CSV file and specify the details of the machines to scan, as explained in
File Format, page 139. Make sure you specify the following column:
Password – Specify the password of the user that will enable them to connect
to the specified remote machine and scan it.
3. Make sure that the SSH Key column is empty. You cannot specify both a password
and an SSH Key.
4. Set up the DNA scan, as described in Set up a DNA Scan, page 29.
Note:
DNA cannot authenticate to Windows machines with Cygwin using SSH Keys
1. Save the private SSH keys that will be used to authenticate to the remote machine
in the DNA\PrivateSSHKeys folder on the DNA machine.
2. Download a template of the CSV file where you will specify the Unix/Linux
machines to scan and their administrative credentials.
a. In the DNA Discovery window, select Scan from File, then click Next; the Setup
scanning from a file page appears.
b. Click Click to download CSV template; the CSV template file is downloaded
your local machine.
3. Open the CSV file and specify the details of the machines to scan, as explained in
File Format, page 139. Make sure you specify the following columns:
SSH Key – Specify the filename of the private SSH key that will authenticate
the user and enable them to connect to a remote machine and scan it.
Passphrase – If you specified an SSH Key that is passphrase-protected,
specify the passphrase that protects the SSH Key specified in the SSH Key
column.
4. Make sure that the Password column is empty. You cannot specify both a
password and an SSH Key.
5. Set up the DNA scan, as described in Set up a DNA Scan, page 29.
Note:
■ Make sure that the key that is being used, is not configured to automatically run a
command on the target machine after authentication. If this sort of key was used, the
command will be run and the connection will immediately disconnect. DNA cannot
scan the remote machine when this sort of key is used.
■ When running commands using sudo, make sure that a password isn’t required.
■ Make sure to delete the file used for this scan at the end of the scan, as it contains
sensitive credentials.
Known Behaviors
DNA filters built-in system users (UID between 1 to 100) when Shell is ¦
/sbin/nologin or ¦ /bin/false.
Unix Users that have a UID (User identifier) greater than 100 will not be filtered by
DNA, even though they are unable to log on (has shell /sbin/nologin).
Windows services with built-in users are filtered out.
In some scenarios, DNA credentials detection (LSASS scan) will result in wrong
information about domain accounts, as if they were local accounts.
Most cases are recorded in the scan log file
If an error occurs, the credential data is not reported. Usually, other credential
detection scans also retrieve similar credentials data about the user and report
it correctly.
Scan Limitations
■ Service account scans are not supported on the machine where CyberArk DNA is
running.
■ When scanning Unix/Linux machines, CyberArk DNA supports only the English
locale when extracting data for the Last login date column.
■ CyberArk DNA does not support PSOs (fine grained policies), therefore the
password policy will be retrieved from the group policy.
■ To determine the Last login date information, i.e., the last time an account logged
into a machine, DNA uses the lastlogontimestamp attribute. This attribute is
replicated on the different Domain Controllers in the Active Directory, hence its
value may vary. Once in 14 days the AD synchronizes the value across all DCs.
Since DNA does not enumerate through all Domain Controllers, the information
DNA reports will be a maximum of 14 days old.
■ To determine the Password Last Set information, i.e., the last time a password
was changed for an account, DNA uses the LastPasswordSet property of the
UserPrincipal class. This property is replicated on the different Domain Controllers
in the Active Directory, hence its value may vary. Once in 14 days the Active
Directory synchronizes the value across all DCs. Since DNA does not enumerate
through all Domain Controllers, the information DNA reports will be a maximum of
14 days old.
■ The Last Login Date column will display N/A for scanned Solaris machines.
■ When scanning HMC, the Key Length column shows the following values:
■ In the Unix Scan sheet, the Key Length column always displays N/A.
■ In the SSH Key Trusts sheet, the Key Length column only displays a value if a
private SSH key was found on a non-HMC machine. Otherwise, it displays
N/A.
■ CyberArk DNA crashes when the current user is denied write access to the DNA
folder.
■ Scanning AIX and ESXi via an AD Bridge solution is not supported.
■ On HMC machines:
■ In the DNA report, the following columns will display N/A: Compliance Status,
Account State, Password Never Expires, Password Age, Password Last Set,
Account Expiration Date.
■ If the scanned machine is connected to a domain via an AD Bridge, domain
users will not be discovered.
■ Currently, when setting UseLDAPS to “yes”, only Windows accounts (including
accounts used in Windows Services and Scheduled Tasks) will be discovered
using LDAPS. All other scans, such as Pass-the-Hash and SSH Key discovery,
will use LDAP.
■ DNA does not take the order of rules in the sudoers file into consideration. If there
are multiple rules, DNA will present them all.
■ When scanning for SSH keys on Windows machines where Cygwin is not
installed, DNA must use a domain administrative Windows account, and not a
local administrative account.
■ By default, DNA will not scan single core machines for private SSH keys. This is
relevant for both Windows and Unix. This can be changed by setting the SSH
Keys scan parameters in the DNA.exe.config file. For more information, refer to
Configuration Parameters, page 125.
■ CyberArk DNA does not scan for SSH keys when using AD Bridge on Centrify.
■ When using a non-administrator user (local or domain), DNA displays all
machines in the Machine Type column as Servers even though some scanned
machines may be Workstations.
■ DNA discovers Hard-Coded Credentials on WebSphere in the default installation
location and any other WebSphere running working paths. In addition, you can set
the WebSphereInstallationPaths parameter to scan additional WebSphere paths.
Likewise, DNA discovers Hard-Coded Credentials on WebLogic in the default
installation location and any other WebLogic running working paths. In addition,
you can set the WebLogicInstallationPaths parameter to scan additional
WebLogic paths.
■ If the user removes the default paths from this parameter DNA will still scan the
default installation paths. However, if the user changes the default path, DNA will
only scan the paths specified in this parameter and will not scan the default
installation paths.
■ The Database scan is based on the supplied Windows credentials, whether using
Active Directory Scan or IP Address scan.
Report Limitations
■ Special characters, such as ®, may display incorrectly in the OS Version column
of the report.
■ Due to Microsoft Excel report size restrictions, the report is limited to 1,048,576
rows. For an average environment, this limitation means approximately 40,000
target machines per scan. Use the filtering options in the configuration file
(AccountTypeScanFilter, AccountCategoryScanFilter) to limit the number of
accounts identified on each target machine.
■ Currently, the Database scan is shown only as raw data and does not have any
representation in the Executive summary.
Pass-the-Hash Limitations
DNA may falsely report detected hashes for local and domain accounts that have
a blank password.
In order for DNA to find exposed hashes on the scanning machine itself, do one of
the following:
Configure the local or domain built-in Administrator account as the credentials
that the scanner will use to perform the scan.
Log into the machine running DNA with the local or domain built-in
Administrator account, then run DNA. You can configure any domain
administrative account as the credentials that the scanner will use to perform
the scan.
Run DNA using “Run as Administrator”. You can configure any domain
administrative account as the credentials that the scanner will use to perform
the scan.
Since machines with a single core CPU may experience an effect on performance,
they are not supported by default and will not be scanned for Pass-the-Hash and
Golden Ticket risks. This can be changed by configuration parameters in the
DNA.exe.config file. For more information, refer to Configuration Parameters,
page 125.
On Windows 2000, DNA cannot correctly identify inactive hashes. DNA
overcomes this by marking accounts in the Pass-the-Hash: Hash Found column in
the following way:
■ DNA discovers ECDSA* and Ed25519 SSH keys on Windows with the following
limitations:
■ The key length is not discovered
■ Trusts will not be discovered for these keys
■ DNA will not discover SSH keys on Windows machines, when scanning via
Cygwin, when the SSH keys are stored in a folder that did not inherit its
permissions from the parent folder.
DNA discovers embedded Windows credentials on IIS Servers and categorizes the
types listed in the table below. DNA extracts username and password (masked)
attributes, as well as path and name attributes. DNA extracts this data from different
locations and sections in various IIS configuration files.
■ Hard-coded credentials – These are credentials that are manually entered into
applications running on WebSphere and IIS servers, as shown in the following
example of an IIS configuration file:
135, 137, 138, 139 To connect to target machines using NetBIOS ports.
These ports must be accessible on host-based firewalls.
443 To access the AWS Console via AWS API and scan AWS.
49154 To get the list of Scheduled Tasks from the remote machine for
remote viewing and administration.
49155, 49156 To get the list of Local Services from the remote machine for
remote viewing and administration.
Note:
These changes will apply for future SSH Key Last Used data and not past events.
b. Specify a path where the log files will be saved. You can specify either a local or
remote path that is mounted on the local machine.
4. In both files, add the syslog facility that will bind the above values.