Recommended Alerts

Best Practices and Recommended Alerts for Advanced Reporting System

Keeper's Advanced Reporting System provides built-in Alerting capabilities that will notify users and Administrators for important events. As a best practice, Keeper has created a list of recommended alerts that can be configured by the Keeper Administrator.

To create an alert, login to the Admin Console and visit Reporting & Alerts > Alerts.

Alerts is only available to customers who subscribe to Advanced Reporting & Alerts module. To upgrade, please contact your Keeper customer success representative.

Admin Policy Changes

It is important that the Keeper Admin is notified when any administrative changes are made on the Keeper Admin Console which can affect the security and usage of the platform. We recommend selecting all "Policy Change" events.

Critical system events in this category include the following:

Event

Threat / Description

Created Node

Ensure this action is approved.

Deleted Node

Ensure this action is approved.

Created Role

Ensure this action is approved.

Deleted Role

Ensure this action is approved.

Created Team

Ensure this action is approved.

Deleted Team

Deleting a team could also removed Shared Folder access. Ensure this action is approved.

Changed Role Policy

Role enforcement policies can affect many different threat vectors

Set 2FA Configuration

Duo or RSA integration could be interrupted.

Created Alert

Admin created an alert in the Advanced Reporting system

Deleted Alert

An Admin deleted an alert which could prevent detection - ensure that this was an expected action.

Paused Alert

An Admin has paused an alert which could prevent detection - ensure that this was an expected action.

License reached maximum

Notifies if you are reaching your maximum user count, will ensure that new users can be onboarded to the platform.

User Management and Security Changes

We recommend that the Keeper Admin (and the user who performs the action) is notified when any User-Specific changes occur. At minimum, we recommend generating alerts on several key events within the "Security" category.

Critical User Management and Security Change events include the following:

Event

Threat / Description

Invited User

Ensure that only approved users are invited to the platform.

Created User

Ensure that users who join the Enterprise are approved.

Deleted User

Ensure that user deletion is approved. Note this action also deletes all vault contents.

Locked User

Admin has locked a user from the platform. Ensure this action is approved.

Disabled 2FA By Admin

A user's 2FA has been turned off by the Keeper Admin. Ensure this action is approved.

Device Approved

A user has signed into a new device. This event may generate a lot of alerts depending on number of users.

Admin approval for device requested

User may need assistance to approve a new device. Login to the Admin Console to approve.

Transferred vault

The user's vault has been transferred to another user account. Ensure that this action is approved.

Granted Admin Permission

The user has been added to a role with Administrative permission. Ensure that this user is approved for administrative duties.

Breached Passwords Detected

BreachWatch provides organizations oversight of the vulnerabilities of user's passwords through active monitoring of dark web breach data. Users and administrators are notified if any of their passwords in a record have been used in publicly known breach that could leave your organization vulnerable to a credential stuffing attack or an account takeover.

Before you configure the alert, ensure that BreachWatch events are configured to flow through the Advanced Reporting & Alerts module. This is disabled by default.

Go to the Role of the users affected by the policy > Enforcement Policies > Vault Features and turn the setting to ON.

In the Alerts section of the Advanced Reporting & Alerts module, create an alert with all 3 event types within the BreachWatch category.

Critical BreachWatch events include the following:

Event

Threat / Description

BreachWatch detected high-risk record password

The user has either created a record or imported data with weak passwords or a password known to be breached on the Dark Web.

User ignored detected high-risk record password

The user has clicked "Ignore" on a detected breached password.

User resolved detected high-risk record password

The user has successfully changed a password that was previously flagged by BreachWatch as a breached password.

Admin Console Logins

Depending how many Keeper Administrators you have in the organization, you may want to be alerted every time an Admin Console login occurs.

Event

Threat/Description

Console Login

Ensure that the user should be granted Administrative rights.

New Events

Note that new Keeper events are added on a monthly basis as the functionality and features of the platform are enhanced. Therefore, we recommend reviewing the latest event types on a regular basis to ensure that you are informed of the latest capabilities.

Last updated