Documentation

EPM uses its own set of predefined variables to store information.

Some variables can be queried in security policy files providing a valuable resource to security administrators.
Information in variables can play a critical role in determining whether a specific request is accepted or rejected.
Variables can be used to set run time properties for a task request.
Variables are organized in the following categories:

Command line parsing variables

Host identification variables

Logging variables

System variables

Task information variables

X11 session capture variables


©2003-2025 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.