Configuration
What is site configuration?
Site configuration allows administrators to manage settings for a BeyondTrust deployment, including the setup of public sites, access controls, and session management. It is crucial for tailoring the deployment to fit organizational needs.
How is site configuration useful?
Site configuration enables organizations to customize the BeyondTrust environment to meet specific requirements. It ensures that the right policies are applied to different sites and optimizes access management, user experience, and security settings across the system.
How do I access the Configuration page?
- Sign into app.beyondtrust.io.
The BeyondTrust Home page displays. - Click the Privileged Remote Access tile, or, from the main menu, click Privileged Remote Access > Configuration.
The Configuration page opens and the Options tab displays by default.
Set your session options
- In the Session Options section, click to the enable or disable the Require Closed Sessions on Logout or Quit checkbox.
Warning
If this is checked, then a user will not be allowed to log out or quit the Access Console until their personal queue is empty.
Set your connection options
- From the main menu, click Privileged Remote Access > Configuration.
The Configuration page opens and the Options tab displays by default. - In the Connection Options section, locate the Reconnect Timeout section.
- From the If the Endpoint Client loses its connection, try reconnecting for field, click the dropdown list to change your timeout interval. The default value is 5 minutes.
- To restrict physical access to the endpoint, click to enable the Restrict physical access to the endpoint if the endpoint loses its connection or if all of the users in session are disconnected checkbox. By default, this is not enabled.
Set your access session logging options
- From the main menu, click Privileged Remote Access > Configuration.
The Configuration page opens and the Options tab displays by default. - In the Access Session Logging Options section, select the appropriate settings for your organization:
- Enable Screen Sharing Recording
- Enable User Recording for TCP & IP Tunnel Protocol Tunnel Jump
- Enable Command Shell Recording
- Enable Automatic Logging of System Information
- Enable Session Forensics
Note
The Enable Session Forensics setting is the only one that is enabled by default.
Enable or disable Peer-to-Peer options
- From the main menu, click Privileged Remote Access > Configuration.
The Configuration page opens and the Options tab displays by default. - In the Peer To Peer Options section, select the appropriate setting for your organization:
- Disabled
- Use BeyondTrust Hosted Peer-to-Peer Server.
Note
The Use BeyondTrust Hosted Peer-to-Peer Server setting is enabled by default.
Change your access portal logo
Add the reusable content below, here.
- From the main menu, click Privileged Remote Access > Configuration.
The Configuration page opens and the Options tab displays by default. - In the Connection Options section, click Change Logo.
- Select the file for your new logo, and then click Open.
- From the Crop Image dialog box, resize your image.
- Click Crop.
- Click Save Logo.
-->
Access portal logo
Administrators may upload a custom logo image to be displayed on public-facing web pages. This allows external users to verify they are on your organization's web site, as well as enhancing the access portal with your organization's branding.
The logo image is displayed on the following public-facing web pages:
- Access invite download page (the page shown after clicking a link in an access invite email)
- Public recording URLs (view and download)
- Extended availability responses (the page shown after clicking a link in an extended availability invitation email)
- Jump approval authorizations (the page shown after clicking a link in a Jump approval email)
Note
Uploaded logo image files may be in any standard image format. The logical image size maximum is 250 pixels wide and 64 pixels high. However, BeyondTrust supports high density displays which allows for a maximum physical size of 500 pixels wide and 128 pixels high.
Set your invitation email options
- From the main menu, click Privileged Remote Access > Configuration.
The Configuration page opens and the Options tab displays by default. - In the Invitation Email Options section, select the appropriate settings for your organization:
- Enable client-side emails for access invitations
- Enable server-side emails for access invitations
Note
The Enable client-side emails for access invitations setting is enabled by default.
The Enable server-side emails for access invitations requires you to configure the SMTP Server which is located on the Email Configuration tab on the Management page.
Updated 28 days ago