Mitigate malware and modern security threats from exploiting applications by removing local administrative rights and enforcing least privilege on endpoints
|Thycotic Privilege Manager Field||Sevco Field|
- Add a source: Follow our instructions to add a Sevco source.
- Provide credentials: You'll be asked to provide source credentials that Sevco will use to connect to Thycotic Privilege Manager:
|Credential or Parameter||Description|
|API Key username portion|
|API Key password portion|
- Set permissions: In Thycotic Privilege Manager, ensure that user has read access to Agent Installations report
If you encounter any errors, they are most likely related to incorrect credentials or insufficient permissions. Verify your work in steps 2 and 3.
If you're having problems integrating a source, or if you've found something wrong in this document, please email us at [email protected].
Updated about 1 month ago