Administration application

The Enterprise Vault admin application is dedicated to 5 usages :

Do do so, you'll find 4 menus:

image.png

Dashboard

The dashboard tab displays a summary of the contents as well as the client interfaces used to access it.

image.png

This page gives a quick overview of Enterprise Vault adoption in your company. Among other things, you can see:

There is one clickable information: the icon at the end of the user interface lines. 
It gives details of the software used per user.

Users

The Users tab displays a list of WALLIX Enterprise Vault users. Users with anomalies are displayed in red.

image.png

This page shows, user by user:

In addition, for each user it is possible to:

A user deleted on Enterprise Vault still exists on WALLIX ONE IDaaS.

Certain scenarios prevent the user from being deleted: for example, if the user is the only owner of the recovery key, or the only owner of a shared vault with members.

A user displayed in red has been deleted on the WALLIX ONE IDaaS side. But the user still exists on Enterprise Vault.
It is not possible to automate the user deletion on Enterprise Vault from WALLIX ONE IDaaS.

Shared Vault

The Shared Vault tab displays a list of vaults shared by WALLIX Enterprise Vault users.

image.png

This page shows, vault by vault:

In addition, for each vault it is possible to delete the vault.

All owner/other member fields (active/unauthorized/deleted) are clickable, giving details of the users concerned.

Logs

The Logs tab displays the logs of actions performed and items viewed

image.png

This page shows:

There are 3 types of filters for searching logs, which can be combined:

At present, it is not possible to extract logs (export or link with SIEM).

Settings

The Settings tab allows the personnalisation of WALLIX Enterprise Vault according to your choices and security policies.

image.png

Today there are 3 policies:

Log

If password access are logged, it is not possible anymore to have an offline access

Recovery

When recovery is enabled, each item will be encrypted with an additional key dedicated to recovery.
This encryption is added the first time the user decrypts his items with his own key.
Consequently, even if the recovery is enabled, these operations can only be performed AFTER the user has made a new access.
So if you want to use them, it's important to activate recovery features from the beginning!

Security


Revision #3
Created 2 January 2025 15:38:33 by WALLIX Admin
Updated 6 January 2025 19:33:37 by WALLIX Admin