﻿---
title: Set up and manage privileged user monitoring
description: Before you can start monitoring privileged users, you need to define which users in your environment are considered privileged. Privileged users typically...
url: https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/advanced-entity-analytics/privileged-user-monitoring-setup
products:
  - Elastic Cloud Serverless
  - Elastic Security
applies_to:
  - Serverless Security projects: Generally available
  - Elastic Stack: Generally available since 9.3, Preview from 9.1 to 9.2
---

# Set up and manage privileged user monitoring
<admonition title="Requirements">
  To use privileged user monitoring, you must:
  - Have the appropriate user role or privileges
  - <applies-to>Elastic Cloud Serverless: Removed</applies-to> <applies-to>Elastic Stack: Removed in 9.3</applies-to> Turn on the required advanced setting
  For more information, refer to [Privileged user monitoring requirements](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/advanced-entity-analytics/privileged-user-monitoring-requirements).
</admonition>

Before you can start monitoring privileged users, you need to define which users in your environment are considered privileged.
Privileged users typically include accounts with elevated access rights that allow them to configure security settings, manage user permissions, or access sensitive data.

## Define privileged users

You can define privileged users in the following ways:
- <applies-to>Elastic Stack: Generally available since 9.3, Elastic Stack: Preview in 9.2</applies-to> <applies-to>Elastic Cloud Serverless: Generally available</applies-to> [Add a supported integration](#privmon-integrations) with your organization’s user identities. If your environment is already ingesting data from a supported integration, the setup steps are skipped—you're taken directly to the Privileged user monitoring dashboard, where you can start [monitoring user activity](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/advanced-entity-analytics/monitor-privileged-user-activitites).
- [Select an existing index](#privmon-index) or create a new custom index with privileged user data.
- [Bulk-upload](#privmon-upload) a list of privileged users using a CSV or TXT file.
- Use the Entity analytics APIs to [mark individual users as privileged](https://www.elastic.co/docs/api/doc/kibana//operation/operation-createprivmonuser) or [bulk-upload multiple privileged users](https://www.elastic.co/docs/api/doc/kibana//operation/operation-privmonbulkuploaduserscsv).

To get started, find the **Privileged user monitoring** page in the navigation menu or use the [global search field](https://www.elastic.co/elastic/docs-builder/docs/3028/explore-analyze/find-and-organize/find-apps-and-objects).

### Add a supported integration

<applies-to>
  - Elastic Cloud Serverless: Generally available
  - Elastic Stack: Generally available since 9.3
  - Elastic Stack: Preview in 9.2
</applies-to>

<stepper>
  <step title="Select an integration">
    On the **Privileged user monitoring** page, select an integration. The supported integrations are:
    - [Active Directory Entity Analytics](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3028/reference/entityanalytics_ad).
      <applies-switch>
      <applies-item title="{ stack: ga 9.3+, serverless: ga }" applies-to="Elastic Cloud Serverless: Generally available, Elastic Stack: Generally available since 9.3">
      Privileged users are identified by matching the `entityanalytics_ad.user.privileged.group_member` field against privileged Active Directory groups based on [security identifier (SID) group codes](https://learn.microsoft.com/en-us/windows-server/identity/ad-ds/manage/understand-security-identifiers#well-known-sids). Users in the following Active Directory groups are automatically assigned as privileged:
      - `512`: Domain Admins
      - `516`: Domain Controllers
      - `518`: Schema Admins
      - `519`: Enterprise Admins
      - `520`: Group Policy Creator Owners
      - `525`: Protected Users
      - `526`: Key Admins
      - `527`: Enterprise Key Admins
      - `544`: Administrators
      - `548`: Account Operators
      - `549`: Server Operators
      - `551`: Backup Operators

      <note>
      If you already have privileged user monitoring configured, you must delete and re-add your integration data source to use SID-based group matching.
      </note>
      </applies-item>

      <applies-item title="stack: preview =9.2" applies-to="Elastic Stack: Preview in 9.2">
      Users in the following Active Directory groups are automatically assigned as privileged:
      - Domain Admins
      - Enterprise Admins

      <important>
      Privileged users are identified by matching the `user.group.name` field against the literal strings `Domain Admins` and `Enterprise Admins`. If your Active Directory uses localized group names (for example, `Domänen-Admins` instead of `Domain Admins`), these users won't be assigned as privileged.
      </important>
      </applies-item>
      </applies-switch>

    - [Okta Entity Analytics](https://docs-v3-preview.elastic.dev/elastic/docs-builder/docs/3028/reference/entityanalytics_okta). Refer to [Standard administrator roles and permissions](https://help.okta.com/en-us/content/topics/security/administrators-admin-comparison.htm) for a list of Okta roles that will be automatically assigned as privileged users.
  </step>

  <step title="Install the integration">
    Follow the steps to install the integration.
  </step>
</stepper>


### Select or create an index

1. On the **Privileged user monitoring** page, click **Index**.
2. From the **Select index** popup, you can create new or choose existing indices as your data source.
3. Select **Add privileged users**.

All user names, specified in the `user.name` field in your selected indices, will be defined as privileged users.
<note>
  By default, the index selector excludes dot-prefixed indices and index patterns that are part of the [Security default data view](/elastic/docs-builder/docs/3028/solutions/security/get-started/data-views-elastic-security#default-data-view-security) (such as `logs-*`). This prevents adding excessive data to privileged user monitoring, which could cause performance issues.
</note>


### Import a list of privileged users from a text file

1. On the **Privileged user monitoring** page, click **File**.
2. Select or drag and drop the file you want to import. The maximum file size is 1 MB.
3. Select **Add privileged user**.

The file must contain at least one column, with each user record listed on a separate row:
1. The first column specifies the privileged user's user name.
2. An optional second column may specify a label, representing the user’s role, group, team, or similar.

File structure example:
```txt
superadmin
admin01,Domain Admin
sec_ops
jdoe,IT Support
```

<note>
  Any lines that don’t follow the required file structure will be highlighted, and those users won't be added. We recommend that you fix any invalid lines and re-upload the file.
</note>

After setting up your privileged users, you can start [monitoring their activity](https://www.elastic.co/elastic/docs-builder/docs/3028/solutions/security/advanced-entity-analytics/monitor-privileged-user-activitites) and related insights on the Privileged user monitoring dashboard.
You can update the selected data sources at any time by selecting **Manage data sources**.

## Manage data sources

Use the **Manage data sources** page to update your selected data sources.
You can use multiple data source types, such as an index and a CSV file, at the same time to define privileged users. Users defined through different data source types are monitored together.
On this page, you can:
- <applies-to>Elastic Stack: Generally available since 9.3, Elastic Stack: Preview in 9.2</applies-to> <applies-to>Elastic Cloud Serverless: Preview</applies-to> Change which integrations you're using as data sources.
- View, remove, and change indices after initially defining them.
- Import a new supported file with a list of privileged users.
  <note>
  Importing a new file will overwrite any users added from a previous file. This doesn't affect users defined through other data source types.
  </note>