Architecture
Endpoint Privilege Manager Architecture Best Practices

This section gives a high-level view of how Keeper EPM is built and best practices for running it.
Architecture
Trust and Control
Keeper EPM is designed so that you stay in control:
Dashboard: You define policies, approvers, collections, and deployment groups in the Keeper Admin Console. No need to log into each endpoint to change policy.
Agent: A local service on each endpoint enforces your policies. It talks to the backend for registration and policy sync, and runs plugins for policy evaluation, logging, and user interaction.
Local-first enforcement: Policy decisions are made on the endpoint using the latest policy data. So even if the network is briefly unavailable, the agent can still enforce what it last received.
Visibility
Health and status: The agent exposes health and status endpoints so you (or your monitoring tools) can verify it’s running and responding.
Audit and logs: Actions, policy matches, approvals, and denials are audited and logged. You can send this data to the Keeper backend and to your own SIEM or audit tools.
Plugins: Core capabilities (policy, API, logging, client) are split into plugins so that updates and troubleshooting can be focused.
Security
No standing privilege for users: By design, users don’t need to be local admins. Elevation is granted per request, under policy.
Controlled elevation: When elevation is allowed, it can be time-limited and tied to MFA, justification, or approval.
Secure communication: Agents communicate with the backend over secure channels; registration uses tokens you control.
You don’t need to know implementation details—just that the system is built for control, visibility, and security at scale.
Best Practices Overview
Start with Monitor. Use Monitor or Monitor & Notify for new policies so you can see what would be blocked or allowed before you enforce.
Use collections. Group users and machines in collections so one policy applies to many endpoints without maintaining long lists.
Use variables and wildcards. Keep policies simple and cross-platform with variables like
{userprofile}and patterns like*.exewhere supported.Pilot with deployment groups. Roll out to a small deployment group first, validate behavior, then expand.
Tune logging. Use a higher log level (e.g., Information or Debug) when troubleshooting; use Warning or Error in production to reduce noise and storage.
Secure registration tokens. Treat registration tokens as secrets; store and transmit them securely.
Review approvals and denials. Periodically review approval requests and denial events so you can adjust policies and catch misuse.
Align with compliance. Use MFA, justification, and approval where your compliance framework requires evidence of control.
Keep agents updated. Deploy agent updates through your normal patch process so you get fixes and new features.
You’re in control. This guide is your single place for customer-facing documentation—no internal or developer links, just what you need to run Keeper EPM with confidence.
Last updated
Was this helpful?

