Verify Privilege Manager (Privilege Manager)


IBM Identity and Access management platform of products is unifying under a single brand: IBM Security Verify.

Click here for more information.

IBM Security Verify Privilege Manager On-Premises (Privilege Manager) provides endpoint privilege management and application control.

Verify Privilege Manager (Privilege Manager) Courses:

Introducing IBM Security Privilege Manager

This video provides an overview of the IBM Security Secret Server's Privilege Manager component. The following topics are covered in this video:

Privilege Manager Overview

  • local account/group management
  • application control
  • application policies
  • white/black/grey listing
  • application reputation checking
  • event discovery

  • accounts/groups
  • application events discovery
  • policies
  • Privilege Manager Server
  • Privilege Manager Agent

Privilege Manager - Actions and Filters


  • Know how to provide criteria that needs to be met for a policy
  • Understand what happens to applications that the policy applies to


8 minutes

IBM Security Verify Privilege Teams

With IBM Security Verify Privilege teams, administrators can create special groups call teams to restrict what users can see. A team bundles users and groups to assign them the same roles as to what other users and sites are visible to them.

This course uses IBM Security Verify Privilege 10.9.

IBM Security Verify Privilege Directory Synchronization

Learn about IBM Security Verify Privilege directory services options and synchronization steps.
Directory options:

  • Active Directory
  • Azure Active Directory
  • OpenLDAP (Any provider that speaks LDAP)

This course uses IBM Security Verify Privilege 10.9.

Privilege Manager - Policies


  • Learn what is a Privilege Manager policy
  • Know what the policy types are for Privilege Manager
  • Understand how to configure a Privilege Manager policy
  • Learn how to create a Privilege Manager policy
  • Understand why Privilege Manager policy priority matters


45 minutes

IBM Verify Privilege Manager AD synchronization

This course discusses IBM Security Verify Privilege Manager and Active Directory synchronization.
An important thing to note is that the video covers a local Active Directory synchronization with an on-prem deployment of Privilege Manager. For local AD synchronization with Privilege Manager Cloud, you must install a directory services agent.

IBM Security Verify Privilege Manager and Privilege Vault Analytics integration

Use IBM Verify Privilege Manager and Privilege Vault Analytics (PVA) together, so you can quickly and easily identify anything out of the ordinary in your Privilege Manager environment.
This course explains use cases and details of Privilege Manager and PVA integration.

IBM Security Verify Privilege Manager Dashboard

The new Privilege Manager dashboard is designed around ease of use. It allows you to control the changes that you want to make in your environment directly from the dashboard.

IBM Security Verify Privilege Event Pipelines

Learn about event pipelines in IBM Security Verify Privilege. Event pipelines provide event-driven process automation with in Verify Privilege.

This course uses IBM Security Verify Privilege 10.9.

IBM Security Verify Privilege Discovery

This course provides an overview of the discovery feature in IBM Security Verify Privilege, including the cloud discovery. Discovery finds secrets in an IT environment and bring them back into Verify Privilege.

This course uses IBM Security Verify Privilege 10.9.

IBM Verify Privilege Manager reports

Learn about IBM Security Verify Privilege Manager reports. Privilege Manager provides a number ready-to-use reports. Also, you can create custom reports.

Privilege Manager - Sending Policies to Endpoints


  • Understand how to send policies to endpoints using Privilege Manager


4 minutes

Privilege Manager Active Directory Configuration

In this video, you learn how to configure Active Directory in Privilege Manager.

Privilege Manager File Upload and Event Discovery

In this video, you learn about Privilege Manager file upload and event discovery.

IBM Security Verify Privilege Manager Policy Wizard

The Privilege Manager policy wizard guides you through policy creation, step by step.
An application control layer creates the parameters that dictate precisely how users access privileges across the network. They define what a user can run, and where.

Privilege Manager Installation


After completing these videos, you will be able to:
  • Know the system requirements for a Privilege Manager installation
  • Perform an installation of Privilege Manager
  • Know how to install agents through the bundle installer
Time: 12 minutes

Privilege Manager Introduction

This course provides an overview of Privilege Manager and describes key terms used in the environment.

Privilege Manager Reports

In this video, you learn about Privilege Manager reports.

Privilege Manager Upgrade

In this course, you learn how to upgrade Privilege Manager using suggested best practices.

Privilege Manager: Application Control Mobile App


  • Know the requirements for the Application Control Mobile App
  • Understand how to configure the Application Control Mobile App
  • Know what actions you can perform in the Application Control Mobile App, including set the company ID, login, create a pin code, handle approval requests, disclose passwords, and manage alerts


3 minutes

IBM Security Verify Privilege Manager file upload

File upload and discovery allows you to quickly and easily use existing files to create filters.
Discovery happens on a schedule.
File upload allows you to pick a file, upload it to Verify Privilege Manager, and then use it immediately to create a policy.

Privilege Manager: Blacklisting

Blacklisting is a powerful policy, which denies applications from running based on your application's attributes, file hash, location, or certificates.  In this course, you will see two examples of blacklisting.

Privilege Manager: Configuring with Secret Server


  • Learn how to integrate Privilege Manager with Secret Server
  • Use Secret Server as Privilege Manager's storage container for credentials
  • Understand how the REST API is used for communication with Privilege Manager from Secret Server


6 minutes

Privilege Manager: Elevating Privileges

In this course, you will learn how to assign elevation policies in order to grant users increased privileges for certain applications without giving them full rights.

Privilege Manager: Greylisting

In this course, you will learn how to create a "catch-all" policy.  This type of policy gathers information about other executables in your environment that are not satisfied by other policies.

Privilege Manager: Local Security

Learn about local security with in Privilege Manager. You will learn about local users, local groups and computer groups.

Privilege Manager: Personas

Learn about personas in Privilege Manager. Personas are collections of privileges for specific roles in the organization.

Privilege Manager: Reverse Proxy

Learn about Privilege Manager reverse proxy. Reverse proxy acts as a buffer between Privilege Manager agents and the Privilege Manager server.

Privilege Manager: ServiceNow

Learn about integration between ServiceNow and Privilege Manager. ServiceNow provides service management software as a service.

Privilege Manager: Troubleshooting Basics

Learn about basic troubleshooting techniques in Privilege Manager.

Privilege Manager: VirusTotal

Learn how to integrate VirusTotal and Privilege Manager. VirusTotal aggregates many antivirus products and online scan engines to check for viruses that the user's own antivirus may have missed.

Privilege Manager: Whitelisting

Whitelisting allows applications to run in your environment.  In this course, you will see two examples of whitelisting.

Secret Server Privilege Manager Policies

This webinar provides a high-level overview of Privilege Manager policies. The topics covered include:

  • What are Privilege Manager Policies? What defines a Policy?
  • The Privilege Manager Policies Setup Process
  • Policies Types - Privilege Manager Application Dashboard
  • Policy Configuration 
       – How to Create a New Blacklist Policy
       – Enabling the Policy on the target machine
       – How to Create a Filter
       – Applying the Filter to a Policy
  • Elevating Privileges
        – How to create a Policy that requires User Justification to run an Application
        – Viewing the Application Justification Report
  • Policies Best Practices
Duration: 25 minutes

Installing Secret Server and Privilege Manager

This video details how to plan for and complete the installations for Secret Server and Privilege Manager.

Duration: 26 minutes

Tech Day: Modernizing your workforce with PAM

Digital transformations can empower an efficient workforce, but also raise the stakes for privileged access risk. In order to stay secure, companies must empower themselves with solutions that protect privileged users.

Learn about modernizing Workforce Identity and Access Management solutions across hybrid multi-cloud infrastructures and addressing privileged account identity risks.

The recordings from the 3-hour tech workshop about privileged access management (PAM) include:
  • An overview of the IBM PAM product portfolio and IBM ecosystem integrations
  • In-depth PAM scenario deep-dives and demos
  • Engaging discussions with IBM Security Experts on PAM deployment
  • Questions and Answers