Skip to content

[New Integration] BeyondTrust EPM #18166

@cpascale43

Description

@cpascale43

Description

BeyondTrust Endpoint Privilege Management (EPM) enforces least privilege and just-in-time elevation for endpoints across Windows, macOS, and Linux. It logs authorization decisions, process execution in elevated or restricted contexts, blocks and user cancellations, and (where enabled) related I/O or keystroke telemetry. Security and IT operations teams use this data for least-privilege compliance, threat detection, and incident investigation.

The Elastic integration should ingest EPM audit and activity events from Windows, macOS, and Linux for use cases like detecting abuse of elevation (unexpected admin rights, blocked runs), measuring least-privilege adoption and audit evidence for privileged access.

Sample tenant available upon request.

Data scope

  • Windows and macOS event IDs include:
Event ID Description
100 Process has started with admin rights added to token.
101 Process has been started from the shell context menu with admin rights added to token.
103 Process has started with admin rights dropped from token.
104 Process has been started from the shell context menu with admin rights dropped from token.
106 Process has started with no change to the access token (passive mode).
107 Process has been started from the shell context menu with no change to the access token (passive mode).
109 Process has started with user’s default rights enforced.
110 Process has started from the shell context menu with user’s default rights enforced.
112 Process requires elevated rights to run.
113 Process has started with Custom Token applied.
114 Process has started from the shell context menu with user’s Custom Token applied.
116 Process execution was blocked.
118 Process started in the context of the authorizing user.
119 Process started from the shell menu in the context of the authorizing user.
120 Process execution was canceled by the user.
199 Process execution was blocked, the maximum number of challenge / response failures was exceeded.
  • Linux: event categories documented include:
    • Accept and Reject status
    • The user’s pbrun environment when an attempt is made to run pbrun
    • Keystroke action events
    • Task status (if the task finished successfully or unsuccessfully)

References

Metadata

Metadata

Assignees

No one assigned

    Labels

    CrestContributions from Crest developement team.Integration:beyondtrust_epm[Integration not found in source]New IntegrationIssue or pull request for creating a new integration package.enhancementNew feature or request
    No fields configured for Enhancement.

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions