Skip to main content

Quickstart Fields Demystified

Quickstart Fields Demystified

Quickstart Fields Demystified

The following tables provide details and explanations of the Quickstart report fields.

Admin List Sheet

Sheet FieldQS Field TypeDescriptionPrivilege Secure or LDAP/AD AttributeDB 'ldap_store' Computer Document Feild
isPulled/Downloaded dataIdentifier for the user.Privilege Secure_id
systemPulled/Downloaded dataComputer system attribute returned from LDAP/ADLDAP/ADcn
domainPulled/Downloaded dataAccount's NetBIOS nameLDAP/ADadmins.current.domain
userPulled/Downloaded dataUsername of account (AD sAMAccountName attribute)LDAP/ADadmins.current.user
sidPulled/Downloaded dataSID identifier of the accountLDAP/ADadmins.current.sid
typePulled/Downloaded dataDefining the type of account; 2=Group, 1=UserLDAP/ADadmins.current.sidusage
localPulled/Downloaded dataTrue/False to an local computer account.  True when the computer's cn equals the admin's domain.n/an/a
onHostPulled/Downloaded dataTrue/False flag if the account is in the local administrators group on the computer.Privilege Secureadmins.current.onHost
persistentPulled/Downloaded dataTrue/False flag if the account is marked as persistent. Persistent accounts will not be removed from the local administrators group.Privilege Secureadmins.current.persistent
default_adminPulled/Downloaded dataExists and is True if the account is the built-in admin account on a Windows endpoint (e.g. Administrator). If Privilege Secure has managed this account, the current and previous passwords can be retrieved using the Computer Local Account Password API.Privilege Secureadmins.current.default_admin
inserted_tsPulled/Downloaded dataTimestamp when the record was created in the Privilege Secure database.Privilege Secureadmins.current.inserted_ts
Intentionally Blank--Intentionally left blank.----
FilteredPulled/Downloaded dataTRUE indicates a Windows Server OS found in AD.  FALSE indicates a Window OS without 'server' in the OS name found in AD.Privilege Secure
PersistentChange to push/uploadTrue/False flag to set administrator persistence on computer:  True = persistent; False = non-persistentPrivilege Secureadmins.current.persistent
Delete from InventoryChange to push/uploadTrue flag to delete this administrator from the computer's Administor Accounts inventory.Privilege Secureadmins.current.<admin in array>

Computer Data Sheet

Sheet FieldQS Field TypeDescriptionPrivilege Secure or LDAP/AD AttributeDB Field in 'ldap_store' Collection
idPulled/Downloaded dataIdentifier for the computerPrivilege Secure_id
cnPulled/Downloaded dataComputer cn attribute returned from LDAP/ADLDAP/ADcn
domain_fqdnPulled/Downloaded dataComputer's domain FQDN returned from LDAP/ADLDAP/ADdomain_fqdn
distinguishedNamePulled/Downloaded dataComputer distinguishedName attribute returned from LDAP/ADLDAP/ADdistinguishedName
OUPulled/Downloaded dataOU derived from distinguishedName returned from LDAP/ADPrivilege Securen/a
operatingSystemPulled/Downloaded dataComputer operatingSystem attribute returned from LDAP/ADLDAP/ADoperatingSystem
lastLogonTimestampPulled/Downloaded dataComputer lastLogonTimestamp attribute returned from LDAP/ADLDAP/ADlastLogonTimestamp
last_scannedPulled/Downloaded dataDetails about the last scan attempt by Privilege SecurePrivilege Securelast_scanned
prev_scan_successPulled/Downloaded dataTimestamp when the computer was last successfully scannedPrivilege SecurelastScan.success
prev_scan_msgPulled/Downloaded dataMessage from the last scan attempt by Privilege SecurePrivilege SecurelastScan.msg
Scanned in last 2 weeksPulled/Downloaded dataTrue/False flag that indicates that the computer was scanned in the last 2 weeks, based off last_scanned field date.Privilege Securen/a
protect_modePulled/Downloaded dataIndicates computer's Protect Mode setting:  JITA, DENY, or FALSE (disabled)Privilege Securepolicy .secure
scan_modePulled/Downloaded dataTrue/False flag that indicates if the computer is included in active permission scans.Privilege Securepolicy.scan
directory_bridging_strategyPulled/Downloaded dataIndicates directory bridging provider set for Linux computer.
edr_integrationPulled/Downloaded dataIndicates if Privilege Secure EDR (Endpoint Detection and Response) integration is enabled for computer.Privilege Secureconfig.edr_integration.enabled
registeredPulled/Downloaded dataMac registered system
<QuickStart provisionUser>Pulled/Downloaded dataTrue/False flag that indicates if the provisionUser specificed in the QuickStart script is on a computer.Privilege Securen/a
Intentionally Blank--Intentionally left blank.----
FilteredPulled/Downloaded dataTRUE indicates a Windows Server OS found in AD.  FALSE indicates a Window OS without 'server' in the OS name found in AD.
OAM (Offline Access Management) EnabledPulled/Downloaded dataTrue/False flag that indicates if OAM is managed on computer.config.policies.offline_access_management.enabled
OAM StrategyPulled/Downloaded dataIndicates current OAM strategy set for computerPrivilege Secureconfig.policies.offline_access_management.strategy
OAM Name TemplatePulled/Downloaded dataCurrenlty set name template for OAM alternate administrator account. Wildcards expressed by question marks (?).  Default value is S1_ALT_ADMIN.Privilege Secureconfig.policies.offline_access_management.break_glass_account_name_template
OAM JITA User Can Access PWPulled/Downloaded dataTrue/False flag that indicates Privilege Secure application “User” role members with JITA or persistent access to systems to access OAM passwords.Privilege Secureconfig.policies.offline_access_management.jita_or_persistent_users_can_access_passwords
OAM Use Alt AdminPulled/Downloaded dataTrue/False flag that indicates if Privilege Secure is to create and use an Alternate Admin account, named according to the OAM Name Template.Privilege Secureconfig.policies.offline_access_management.use_alternate_admin
OAM Manage Built-in PWPulled/Downloaded dataTrue/False flag indicating if Privilege Secure is managing the computer's built-in local administrator (RID 500) account password.Privilege Secureconfig.policies.offline_access_management.manage_built_in_admin_password
OAM Disable Built-in AdminPulled/Downloaded dataTrue/False flag that indicates if Privilege Secure will disable computer's built-in local administrator account (RID 500).Privilege Secureconfig.policies.offline_access_management.disable_built_in_admin
Enable ProtectChange to push/uploadSet computer's Protect Mode:  JITA, DENY, or FLASE (disabled)Privilege Securepolicy .secure
Enable ScanChange to push/uploadTrue/False flag setting indicates if the computer is included in active permission scans.Privilege Securepolicy.scan
Enable EDR IntegrationChange to push/uploadTrue/False flag  setting Privilege Secure EDR (Endpoint Detection and Response) integration:  True = enabled; False = disabledPrivilege Secureconfig.edr_integration.enabled
Provision AccountChange to push/uploadDOMAIN\sAMAccountName.  Comma delimited.  To persist add ;true after sAMAccountName (still comma delimited).Privilege Secure
Set OAM EnabledChange to push/uploadTrue/False flag setting Privilege Secure OAM managment of computer:  True = enabled; False = disabled If set to false with no other parameters, then other OAM existing values will be left as-is, and only the enabled field will be set accordingly.Privilege Secureconfig.policies.offline_access_management.enabled
Set OAM StrategyChange to push/uploadSet OAM strategy.  May be entered with any of following case-insensitive values:  OS-BEST-PRACTICE MANAGED-BUILT-IN CUSTOM If left blank it will default to the current value, or to OS-BEST-PRACTICE if no previous policy was set.Privilege Secureconfig.policies.offline_access_management.strategy
Set OAM Name TemplateChange to push/uploadName template for OAM alternate administrator account. Accepts a string with wildcards expressed by question marks (?) ex: MYADMIN???. If left blank it will default to the current value, or to S1_ALT_ADMIN.Privilege Secureconfig.policies.offline_access_management.break_glass_account_name_template
Set OAM JITA User Can Access PWChange to push/uploadTrue/False flag setting Privilege Secure “Users” with JITA/persistent access to systems access OAM passwords:  True = access; False = no accessPrivilege Secureconfig.policies.offline_access_management.jita_or_persistent_users_can_access_passwords
Set OAM Use Alt AdminChange to push/uploadTrue/False flag setting creation and use of an Alternate Administrator account, named according to the OAM Name Template:  True = create/use; False = Do not create/usePrivilege Secureconfig.policies.offline_access_management.use_alternate_admin
Set OAM Manage Built-in PWChange to push/uploadTrue/False flag setting management of built-in local administrator (RID 500) account password:  True = manage; False = do not managePrivilege Secureconfig.policies.offline_access_management.manage_built_in_admin_password
Set OAM Disable Built-in AdminChange to push/uploadTrue/False flag setting if Privilege Secure is to disable computer's built-in local administrator account (RID 500):  True = disable; False = do not disablePrivilege Secureconfig.policies.offline_access_management.disable_built_in_admin
Set Directory Bridging StrategyChange to push/uploadSet directory bridging provider for Linux computer:  privilegesecure, centrify, powerbrokerPrivilege Secureconfig.directory_bridging.strategy
Set Directory Bridging DomainChange to push/uploadSet domain for bridging provider for Linux computer if not set to Privilege Secure.Privilege Securedomain_fqdn
Set Sudoers RepresentationChange to push/uploadInsert sudoers ID from a computer to replicated that sudoers file to other computer(s)Privilege Securestaged_sudoers_history.sudoers_hash