In today's digital landscape, with the growing cyber threats and stricter regulatory mandates, privileged resource management is no longer a luxury but a necessity. Data breaches and cyberattacks targeting privileged accounts are on the rise, making secure management of privileged resources more critical than ever before.
In any organization, the IT network will consist of numerous critical resources including servers, databases, network devices, cloud resources, applications, and more. Each of these resources often contains multiple privileged accounts with elevated access privileges. PAM360 classifies all the critical machines, such as workstations, servers, databases, network devices, and applications, that hold sensitive data or control essential business functions as a Resource. Privileged Accounts are high-level user accounts with elevated permissions that allow administrative access to privileged resources. These accounts include system administrators, database administrators, service accounts, etc., which can modify configurations, access sensitive data, or execute critical system operations.
Efficiently identifying and onboarding these resources is essential to ensure no privileged resource is left unmanaged, thereby minimizing the risk of security gaps and unauthorized access. Additionally, effective privileged resource management ensures centralized visibility, access control, and governance, helping organizations meet compliance standards and reduce the risk of insider threats and external attacks.
This help document covers the following topics in detail:
PAM360 classifies all critical machines, such as workstations, servers, databases, network devices, and applications, that hold sensitive data or control essential business functions as a Resource. Common privileged resources include:
Privileged Accounts are high-level user accounts with elevated permissions which includes root accounts in Linux, administrator accounts in Windows, enable-mode credentials for network devices, DBA accounts in databases, superuser roles in cloud platforms, etc. Due to their extensive access capabilities and sensitive nature, these accounts are prime targets for cyberattacks and should be strictly monitored, protected, and managed regularly to prevent misuse or unauthorized access.
The Resources tab in PAM360 offers a centralized view of all the privileged resources and the associated accounts in your environment. From the Resources tab, administrators can seamlessly discover, add, and manage all the privileged resources in their environment from the Resources tab. By leveraging its intuitive interface and streamlined functionalities, administrators can ensure comprehensive management of all critical IT assets, minimizing security gaps, and compliance with regulatory standards.
The Resources tab serves as the primary interface for managing your organization's critical IT infrastructure from PAM360. It consolidates all privileged resources and associated accounts in one place, streamlining management. This centralized approach supports better visibility, simplifies day-to-day operations, and strengthens the overall security posture of your organization.
From the Resources tab, administrators can manage the privileged resources they own and those shared with them, while users can perform key actions such as view/request passwords, launch remote connections to the privileged accounts shared with them, and export passwords. This structured layout enhances visibility, streamlines privileged access management and usability, and ensures secure and efficient handling of sensitive credentials.
The Resources tab features a Password Explorer tree on the left pane, which categorizes resources and passwords into organized groups. When you select a category in the password explorer tree, a detailed list of all resources and accounts available under that category appears on the right pane. Refer to the upcoming sections to learn more about the Password Explorer tree in detail.
The Password Explorer tree, located on the left pane of the Resources tab, displays the list of categories into which all available resources and passwords are grouped. This organized view allows users to navigate and access specific resources or passwords quickly. Click on the desired category to view the associated resources or passwords available under that category.


When you select a category from the Password Explorer tree, the right pane dynamically displays the list of resources or passwords available under the selected category. Depending on the category, the right pane is either split into Resources and Passwords sections or shown as a single section displaying a consolidated list of all passwords available under the selected category.
The Resources section within the right pane of the Resource tab displays the list of resources that you own, manage, or those shared with you, based on the category selected on the Password Explorer tree. The resources are displayed in a tabular format, where each row represents an individual resource and each column displays various resource attributes such as the Resource Name, Description, Type (e.g., Windows, Linux, Oracle, Cisco), DNS Name, etc., for easy identification. Additionally, for each resource, the table includes the following options:

Furthermore, the resources section features a Search option to quickly locate the desired resource based on its attributes and a Column Chooser to customize the tabular view by choosing the desired columns to be displayed. From the tabular view, you can click on the desired resource to access the Account Details window, where you can view the list of accounts available under that resource, along with their corresponding passwords. Click on the asterisks beside the desired account to view its password. If access control workflow is enforced in your environment, click the Request button to request its password. Additionally, for each account, the table includes the following options:
The top pane features the bulk operation buttons, such as Resource Actions and Export buttons that allow you to efficiently manage multiple resources at once. Select the desired resources from the list and click the appropriate button to execute the required action.
Depending on the category selected on the Password Explorer tree, the Passwords section within the right pane of the Resource tab displays a list of all the privileged accounts along with their corresponding passwords that are shared with you. Accounts are displayed in a tabular format, where each row represents an individual account and each column displays various account attributes such as the resource name, account name, password, etc, for easy identification and management. For each account, the table includes the following options:
Additionally, the Passwords section features a Search option to quickly locate specific accounts based on their attributes and a Column Chooser to customize the tabular view by choosing the desired columns to be displayed.
The top pane features the bulk operation buttons, such as, Account Actions, Key Actions, and Export buttons that allow you to efficiently manage multiple accounts at once. Select the desired accounts from the list and click the appropriate button to execute the required action.
From the Resources and Passwords sections in the right pane of the Resources tab, you can perform various resource, account, and password management operations, enabling seamless management of the privileged resources and their associated accounts via PAM360.
From the Resources section, you can perform the following resource-based operations on the resources listed under the selected category:
From the Resources section, you can perform the following configurations on the resources listed under the selected category:
From the Passwords section, you can perform the following operations on the accounts and passwords listed under the selected category:
From the Passwords section, you can perform the following configurations on the accounts listed under the selected category: