+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template? 

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy?

Filter by Tags: 

Using the PuTTY launcher on custom ports

November 23rd, 2011

Do you use custom ports for accessing your systems through SSH or telnet?  If you do, you’ll find that the launcher is configured for standard ports.  Configuring these ports requires the creation of a custom launcher and a few other steps. This can be a useful tool for Secret Server users, especially in those situations…


Inheriting Permissions Based on Folders

July 29th, 2011

Inheriting Permissions based on Folders It is possible for Secrets in Secret Server to inherit permissions from the folder where they are placed. For example, if you install a new managed switch in your network, instead of setting an Active Directory group or users for every network-based Secret, you set the Active Directory group or…


Sneak Peek: PuTTY Launcher

September 11th, 2008

One of a system administrator’s must-have items in his toolbox is PuTTY. PuTTY is a small, lightweight program that is perfect for telnet and SSH connections. It doesn’t require any installation, it’s just a single EXE file and you’re good to go. A feature of Secret Server that I personally have always found extremely useful…


Giving Secret View a System Font

March 27th, 2008

One of the questions that I sometimes get from customers is, “I want the information on the Secret View page to display in a system font”. The reason for this is it makes it easier to distinguish between O’s and zeros; and lower-case L’s and capital I’s. This can easily be accomplished with CSS, and…