Symantec Privileged Access Management

 View Only

What's New

  • Upcoming PAM Office Hours - February 19, 2026

    On Thursday, February 19, 2026, at 8:00AM Pacific/11:00AM Eastern the PAM team will be hosting an Office Hours meeting.

    During this February session the PAM team will highlight how you can leverage AI prompts to create policies in PAM Server Control using Prompt Orchestration Markup Language (POML).

Search Community

Latest Discussions

  • Edited to clarify that this is a discussion of Windows Recall snapshotting/recording and not PAM Session recording. Ryan, Microsoft does provide instructions for developers about preventing Windows Recall snapshotting of application windows: https://learn.microsoft.com/en-us/windows/client-management/manage-recall#information-for-developers ...

  • Profile Picture

    RE: SYSLOG with SSL

    Thanks for the response.

Latest Q&A List

  • Ralf Prigl's profile image

    RE: Regarding storage capacity when enabling the cluster ...

    Hello, PAM encrypts its disk so that the data is protected against retrieval by someone who manages to mount the disk on another ...

  • MARUBUN SUPPORT's profile image

    RE: Regarding storage capacity when enabling the cluster ...

    When expanding storage with an AWS PAM instance, is it correct to assume that no processing needs to be done on the PAM side? I ...

Unanswered Threads

  • We've added a new feature to make it easier to use code snippets from the PAM online documentation. You no longer have to manually select text in the code box and copy it. Now, simply mouse over the snippet and select the Copy button which appears ...

Latest Blog Posts

  • The global DRAM/RAM shortage has resulted in significant cost increases, +200% since August 2025. These higher prices are expected for the foreseeable future creating mounting pressure for organizations to reduce their overall memory consumption. ...

    1 person recommends this.
  • In an era where cyber threats grow increasingly sophisticated, the principle of least privilege has evolved from a best practice to a core pillar of enterprise cybersecurity. Organizations are adopting identity-based Zero Trust architectures, where access ...