Disabling SSH Multifactor Authorization Alerts

How-to disable SSH Multifactor Authorization Alerts.

    Turning off all SSH Multifactor Authentication (SSH-MFA) alerts in your ZeroLock™ protection environment is a simple process. However, there may be times when you only wish to turn off these alerts for select endpoints. This article walks you through both scenarios.  


    Stopping SSH-MFA Alerts on All Endpoints

    Turning off SSH-MFA alerts to all endpoints is a simple matter of disabling the SSH-MFA Detection Engine in the assigned default configuration profile.  This is easily done using the ZeroLock™ Management Console (ZMC).

    1. From the ZMC dashboard, go to System Configuration | Config Profiles, select the Endpoint profile to be changed, then click Edit on the far right..
      Edit Config Profiles 2.0.1-1

    2. On the next screen go down to the SSH Multifactor AUTH box and click the green (enabled) checkbox turning it red (disabled).  Selecting the Update button will disabled SSH-MFA alerts on the endpoint.
      SSH  Enabled 2.0.1

      SSH Disabled 2.0.1-1

    Stopping SSH-MFA Alerts on Select Endpoints

    There may be situations where you do not want SSH Multifactor Authentication (MFA) alerts triggered on certain Endpoints. To achieve this, the SSH-MFA detection engine must be disabled.  Disabling the detection engine requires creating a New Policy and Configuration Profile then applying that new profile to the Endpoint(s).


    Create a New Policy 

    1. From the ZMC dashboard, go to CONTROL POLICIES | POLICIES | ADD NEW POLICY
      New Policy 2.0.1

    2. On the New Policy screen enter a name and description for the policy.  Since policy creation does NOT require any rules, you may click CREATE without selecting a rule. New Policy with Name 2.0.1
       
    For a policy to be put into effect it must be combined with a Configuration Profile.  The next section will take you through this process. 

    Creating a New Configuration Profile 

    1. Scroll down to SYSTEM CONFIGURATION | CONFIG PROFILES which will bring you to the list of available configurations on the system.  In this example, the default configuration profile is the only profile. Select ADD NEW PROFILE, enter a name for the new profile.
      New Config Profile 2.0.1-2


    2.  Go to the SSH Multifactor Auth box and click the green (enabled) box changing it to red (disabled). 
    3. To apply the policy that was created, navigate to the Default Control Policy drop-down menu, and select the policy you created. Only one policy can be applied to a Configuration Profile at a time. Once complete, select CREATE. 
      Creating New Config Profile 2.0.1-1

      


    Applying the New Profile to Endpoint(s)

    Once a Configuration Profile has been created, it must be applied to an endpoint so the settings can take effect.

    1. Navigate to the Endpoints page and in the ACTIONS menu, select SET ENDPOINT CONFIG
      Endppoint Action Set Endpoint Config 2.0.1
    2. On the following screen select the appropriate configuration from the dropdown list then SET CONFIGS
      Set Endpoint Config Closeup 2.0.1

    TEST 

    To test, open ALERTS, then open a terminal session. SSH to the Endpoint with the new configuration applied. If an alert does not appear, you have successfully disabled the SSH-MFA alerts on the applicable endpoints.