arrow-left

All pages
gitbookPowered by GitBook
1 of 2

Loading...

Loading...

Windows Server

Deployment Guide for Veza Windows Server Integration

hashtag
Overview

The Veza integration for Windows Server comprises an OAA package and a collection of .NET 8.0 applications. These tools discover metadata from a Windows Server host and forward it to a Veza instance. The application package comes as an MSI installer for deployment on Windows Server.

For automated deployment at scale with per-machine unique Team API Keys, see the Enterprise Deployment guide.

hashtag
Components

The Veza Windows OAA application includes:

  1. A service that discovers local groups, user accounts, services, and scheduled tasks within the Windows Server OS.

  2. A service to detect Active Directory filesystem permissions on SMB file shares.

  3. A GUI application for configuring discovery services and setting up the Veza connection.

hashtag
Prerequisites

  • Windows Server 2012 R2 or newer

  • .NET 8.0 Runtime (included in the installer)

  • You will need the installation program from Veza, available

hashtag
Deployment Specifications

hashtag
System Requirements

Resource
Requirement
Notes

hashtag
Performance Impact

The Veza Windows integration is engineered to operate with minimal resource utilization across enterprise environments:

  • CPU Utilization: Typically insignificant during standard metadata collection operations

  • Memory Consumption: <50MB RAM during normal operational cycles

  • Network Bandwidth: Optimized data transmission with lightweight payloads transmitted at configurable intervals (default: 60 minutes)

hashtag
Operational Schedule

  • By default, the application collects and sends metadata to Veza every 60 minutes

  • This interval can be configured between 1 hour and 1 day to suit your organizational requirements by modifying the configuration file or in the application settings.

  • For file share discovery, a minimum interval of 120 minutes is recommended

GUI Configuration:

  1. Open Veza for Windows from the Start menu

  2. Go to the Local Accounts tab and modify the Discovery Interval (minutes) field (minimum 60 minutes) to change the local accounts discovery interval.

  3. For file share intervals, go to the Folders tab and modify the Discovery Interval (minutes) field (minimum 120 minutes)

Configuration File:

To manage these settings in the configuration file at C:\Program Files\Veza\Veza.config:

  1. Set windows_local_accounts-interval for local accounts discovery interval (recommended minimum 60 minutes)

  2. Set windows_files-interval for file share discovery interval (recommended minimum 120 minutes)

  3. Both values should be specified in minutes as quoted integers (e.g., "120"

hashtag
Log Management

  • The application stores 14 days of logging information

  • Logs are automatically purged as they age out

  • At the standard Info level, log storage is negligible

hashtag
Installation

hashtag
Deployment Options

The Veza Windows integration supports both manual and automated deployment methods:

Manual Installation

Run the Veza.msi installation program and follow the on-screen prompts. By default, the application installs in C:\Program Files\Veza.

Silent Installation (for automated deployment)

The MSI package supports standard silent installation parameters for enterprise deployment:

Important: API keys are encrypted using the Windows Data Protection API and cannot be set directly in configuration files.

hashtag
API Key Deployment Methods

Method 1: MSI Installation with APIKEY Parameter (Recommended)

This method encrypts the API key during installation:

Method 2: Post-Installation API Key Configuration

If you cannot include the API key in the MSI command:

Example Configuration File

Below is a standard configuration template that can be customized for your environment:

Required configuration parameters are listed and described in the table below:

Configuration Parameter
Description
Notes

hashtag
GUI Configuration (manual deployment)

Post-installation, open Veza for Windows from the Start menu.

  1. Under the Veza API tab, input your Veza instance URL into Veza URL.

  2. Paste the previously created API key into Veza API Key.

  3. Optionally provide the URL for the Insight Point Proxy.

To verify the successful connection, log in to Veza and open the Integrations page. You should see Windows Server enabled on the list of all integrations.

Note: The installed service needs to run with Administrative privileges.

hashtag
Security Considerations

hashtag
API Key Management

The Veza Windows integration uses an API key to authenticate with the Veza tenant. Important security considerations include:

  • Key Generation: API keys are issued from the Veza tenant by users with administrative access

  • Key Deployment Options:

    • Deploy a unique key per server for the highest security

See for more about Veza API keys.

hashtag
Network Security

The Veza Windows integration requires:

  • Outbound HTTPS (443) access to the Veza tenant or Insight Point

  • All data is transmitted using TLS 1.2 or higher

No inbound connectivity is required.

hashtag
Update Management

The Veza for Windows application follows a separate release cadence from the Veza platform:

  • Updates are released only for bug fixes, security bulletins, and feature enhancements

  • Updates are manually deployed via new MSI packages published by Veza

  • No automatic updates are performed

To update existing installations:

  1. Download the latest MSI from Veza

  2. Deploy using the same methods as the initial installation

  3. The installation program will automatically upgrade the existing installation

Configuration settings are preserved during upgrades.

hashtag
Standard Functionality

hashtag
Windows Local Accounts

This service identifies local security principals on the Windows Server host. By default, it detects:

  1. Local user accounts

  2. Local groups

  3. (Optional) Installed services

  4. (Optional) Configured scheduled tasks

Properties

User Properties
Description
Group Properties
Details
Scheduled Task Properties
Details
Service Properties
Details

Note (*): Local groups on Windows Server can contain both Active Directory subgroups and local user accounts. The type property distinguishes between the two entities.

hashtag
Windows Files

This service discovers filesystem permissions for specified paths and subdirectories based on the set depth. It primarily identifies:

  1. Filesystem paths

  2. Active Directory users and groups with permissions on each path

  3. Permission inheritance

Limitations

  • Designed for SMB file shares utilizing Active Directory permissions

  • Metadata from security principals that do not correlate to Active Directory users or groups is omitted before sending data to Veza

  • Enumerating large shares can be more memory-intensive and will increase the RAM requirement during execution

hashtag
Configuration Options

These settings can be configured either through the GUI application (Veza for Windows from the Start menu) or by editing the configuration file at C:\Program Files\Veza\Veza.config. See the for file-based configuration details.

hashtag
Local Accounts

In the Local Accounts tab, adjust settings as desired:

Option
Purpose

hashtag
Files

In the Folders tab, customize as needed:

Option
Purpose

hashtag
Troubleshooting

hashtag
Common Issues

API Key Not Working During MSI Installation:

  • Problem: API key included directly in configuration file

  • Solution: API keys cannot be set in configuration files. Use MSI APIKEY parameter or post-installation configuration

  • Example: msiexec /i Veza.msi /qn CONFIG="C:\path\to\Veza.config" APIKEY="your_key"

Configuration Parameters Not Applied:

  • Problem: Configuration file path incorrect or MSI cannot access relative paths

  • Solution: Use full filesystem path for CONFIG parameter, not relative paths

  • Example: Use CONFIG="C:\Users\Administrator\Desktop\Veza.config" instead of CONFIG="Veza.config"

Connection Failures:

  • Verify network connectivity to the Veza tenant

  • Check API key validity in the Veza tenant

  • Ensure correct URL format (e.g. https://tenant-name.vezacloud.com)

Performance Issues:

  • If memory usage exceeds 50MB during normal operation, check file share sizes

  • Reduce the number of discovery threads for file shares

  • Increase discovery intervals

Log Analysis:

  • You can adjust the service's log level using the dropdown menu. By default, logs are saved at C:\\Program Files\Veza\Local Accounts\logs\VezaWindows.log and C:\\Program Files\Veza\Folders\logs\VezaFiles.log.

  • Set log level to Debug temporarily to gather more information for troubleshooting and support requests.

hashtag
Support

For additional assistance, contact Veza Support at [email protected] or through your account representative.

Permissions

Local Administrator

Required for installation and operation

Storage I/O: Negligible impact on storage subsystems outside of scheduled log maintenance or diagnostic activities

Click Save to apply changes

). See the
for complete details
At Debug level, logs may consume up to 1GB of disk space
  • Log locations:

    • C:\Program Files\Veza\Local Accounts\logs\VezaWindows.log

    • C:\Program Files\Veza\Folders\logs\VezaFiles.log

  • windows_local_accounts-save_json

    Save the payload uploaded to Veza to disk into <INSTALL_DIRECTORY>\Local Accounts\

    "true" or "false"

    veza-api_key

    The encrypted API key used to communicate with the Veza tenant

    Populated by MSI APIKEY parameter or post-install command

    veza-insight_point_proxy

    The URL of the local Insight Point for proxying outbound connections to Veza

    See for configuration information

    veza-url

    The URL of the Veza tenant

    Veza tenant URL

    veza-loglevel

    Sets the verbosity of the logs for the Veza service

    "Info" or "Debug"

    windows_files-enabled

    Enables the discovery of Windows File Server folders and permissions

    "true" or "false"

    windows_files-interval

    The execution interval in minutes for Windows File Server discovery

    Set to an integer greater than 120 in quotes

    windows_files-threads

    The number of simultaneous threads used during Windows File Server discoviry

    Set to "1" unless instructed to change by Veza support

    windows_files-save_json

    Save the payload uploaded to Veza to disk into <INSTALL_DIRECTORY>\Folders\

    "true" or "false"

  • Click Apply.

  • Deploy a shared key across all servers for simplified management

  • Deploy keys by department or region for balanced security and management

  • Key Storage:

    • The API key is encrypted using Windows Data Protection API

    • Stored in the configuration file at C:\Program Files\Veza\Veza.config

  • Key Rotation:

    • Keys are not automatically rotated

    • Keys can be manually deleted and replaced with new ones via the Veza tenant

  • Key Compromise:

    • A compromised key would grant access to the endpoints listed in Veza APIs

    • Immediately delete and replace any compromised keys

  • Update notifications are sent to tenant administrators

    home_directory

    User home directory path

  • Root Cause: MSI executes in different user context than current directory

  • Reduce the logging level after troubleshooting to minimize disk usage

    Memory

    < 50MB RAM

    During normal operation

    Disk Space

    ~300MB

    For application installation

    Additional Disk Space

    Varies

    Up to 1GB for logs when using Debug level

    Network

    Outbound HTTPS (443)

    windows_local_accounts-enabled

    Enables the discovery of local accounts, services, and scheduled tasks

    "true" or "false"

    windows_local_accounts-interval

    The execution interval in minutes for local accounts discovery

    Set to an integer greater than 60 in quotes

    windows_local_accounts-services_enabled

    Include local service metadata in Veza

    "true" or "false"

    windows_local_accounts-tasks_enabled

    Include Scheduled Tasks metadata in Veza

    last_login_at

    Time of user last login

    cannot_change_password

    Indicates if the user's password can't be changed (boolean)

    locked_out

    Shows if the user account is locked out (boolean)

    password_never_expires

    Checks if the user's password is set to never expire (boolean)

    password_not_required

    Checks if the user doesn't need a password (boolean)

    type*

    Differentiates between local or active directory user accounts (string)

    type*

    Specifies if the group is local or associated with active directory (string)

    path

    Full path of the scheduled task (string)

    state

    Current state: Ready, Running, Disabled, etc. (string)

    service_account_name

    Account used to run the service (string)

    start_type

    Start type: Automatic, Manual, etc. (string)

    status

    Current status: Running, Stopped, etc. (string)

    Enabled

    Toggles discovery (check mark to enable discovery)

    Discovery Interval (minutes)

    Sets interval between discovery runs (minimum 60 minutes)

    Include Services

    Enables service discovery (optional)

    Include Scheduled Tasks

    Activates scheduled task data discovery (optional)

    Save Payload

    Saves the payload uploaded to Veza to disk (optional)

    Enabled

    Toggles discovery

    Discovery Interval (minutes)

    Time gap between discoveries (minimum 120 minutes)

    Discovery Threads

    Sets concurrent discovery threads

    Save Payload

    Saves the payload uploaded to Veza to disk (optional)

    Paths

    Use Add Path to specify discovery paths

    herearrow-up-right
    Authentication
    configuration parameters table

    To Veza tenant

    "true" or "false"

    configuration parameters table
    # Basic silent install
    msiexec /i Veza.msi /qn
    
    # Install with specific log file
    msiexec /i Veza.msi /qn /l*v install.log
    
    # Install to custom directory
    msiexec /i Veza.msi /qn INSTALLDIR="D:\Applications\Veza"
    
    # Install with an existing configuration file
    msiexec /i Veza.msi /qn CONFIG="\\deployment-share\Veza\Veza.config"
    
    # Install with an existing API key (recommended for automated deployment)
    msiexec /i Veza.msi /qn APIKEY="<api_key>"
    
    # Install with existing configuration file and API key
    msiexec /i Veza.msi /qn CONFIG="\\deployment-share\Veza\Veza.config" APIKEY="<api_key>"
    msiexec /i Veza.msi /qn CONFIG="\\deployment-share\Veza\Veza.config" APIKEY="<api_key>"
    # Install without API key (use full path for CONFIG)
    msiexec /i Veza.msi /qn CONFIG="C:\path\to\Veza.config" /l*v install.log
    
    # Configure API key post-installation
    Start-Process -FilePath "C:\Program Files\Veza\VezaWindowsTray.exe" -ArgumentList "--api_key=<api_key>" -NoNewWindow -Wait
    <?xml version="1.0" encoding="utf-8"?>
    <configuration>
     <configSections>
      <section name="PathConfigurationSection" type="Veza.Integrations.PathConfigurationDataSection, PathConfiguration, Version=1.0.0.0, Culture=neutral, PublicKeyToken=null" />
     </configSections>
     <PathConfigurationSection>
      		<PathConfigurations>
      		  </clear>
    			  <add path=”\\fileserver01.example.com\Finance” depth=”1” />
    			  <add path=”\\fileserver02.example.com\Human Resources\Benefits” depth=”1” />
      		</PathConfigurations>
     </PathConfigurationSection>
     <appSettings>
      <!-- Local Account Collection Settings -->
      <add key="windows_local_accounts-enabled" value="true" />
      <add key="windows_local_accounts-interval" value="60" />
      <add key="windows_local_accounts-services_enabled" value="true" />
      <add key="windows_local_accounts-tasks_enabled" value="true" />
      <add key="windows_local_accounts-save_json" value="false"/>
    
      <!-- Veza API Connection Settings -->
      <!-- WARNING: Do not set veza-api_key here - use MSI APIKEY parameter or post-install command -->
      <add key="veza-url" value="https://YOUR_TENANT.vezacloud.com" />
      <add key="veza-insight_point_proxy" value="http://INSIGHT_POINT_IP:8080">
      <add key="veza-loglevel" value="Info" />
    
      <!-- File Share Discovery Settings -->
      <add key="windows_files-enabled" value="true" />
      <add key="windows_files-interval" value="120" />
      <add key="windows_files-threads" value="1" />
      <add key="windows_files-save_json" value="false"/>
     </appSettings>
    </configuration>
    Insight Point documentationarrow-up-right

    Enterprise Deployment

    Deploying the Windows Server integration using Team API Keys and secure automation scripts.

    This guide provides instructions for deploying the Windows Server integration at scale in an enterprise environment using Team API Keys for enhanced security and automated deployment workflows.

    Important: API keys are encrypted using the Windows Data Protection API and cannot be set directly in configuration files. This guide shows proper methods for enterprise API key deployment.

    hashtag
    Example Deployment Workflow

    For enterprise deployments, Veza recommends one of these workflows:

    Option A: MSI with APIKEY Parameter (Recommended)

    Option B: Two-Step Deployment

    1. Deploy the MSI to target machines using your preferred orchestration tool (SCCM, PDQ Deploy, etc.)

    2. Deploy a standardized configuration file (without API key)

    3. Execute a script to securely store the Veza API key:

    Both approaches encrypt API keys using LocalMachine credentials via the Windows Data Protection API.

    hashtag
    Automated Deployment with Team API Keys

    have a narrower scope than standard API keys and can be used to push Windows Server metadata to the Veza platform while limiting the access granted to the deployed keys.

    hashtag
    Create Providers

    Team API Keys do not allow for creating new Integration Providers on the Veza platform. To ensure that Windows servers can push metadata once configured, create the required providers on the Veza platform before deploying the application.

    Execute the following commands with a to ensure the providers are created.

    This script creates two custom providers in your Veza tenant: "Windows Server" for local account metadata and "Windows Files" for file share permissions. These providers must exist before Team API Keys can be used to push data to them.

    hashtag
    Create Team

    With the Providers created, create a new in Veza that is scoped to only the Windows Server and Windows Files providers.

    1. Click Administration in the left-hand navigation pane.

    2. Click Team Managment in the tab list in the main pane.

    3. Click Add Team.

    hashtag
    Create Team API Keys

    Team API Keys can be generated programmatically, allowing for flexible deployment options. A single Team API key can be shared to all deployed Windows Servers, or a unique key can be generated for each installation.

    To generate a for Windows Server, construct a POST request to https://<tenant>.vezacloud.com/api/preview/teamkeys with the following payload:

    Example:

    The response body will include the generated API key:

    Record the access_key value for use with the Veza for Windows integration.

    Using Powershell to create and print a Team API key:

    This script generates a Team API Key and prints its value to the console. The key is associated with the specified team ID and given a name (typically the server name) for tracking and management purposes.

    hashtag
    Install with Per-Machine Team API Keys

    An example installation Powershell script that generates a unique Team API Key per installation and employs a shared configuration file follows:

    1. Detect the server's fully qualified domain name (FQDN)

    2. Create a unique Team API Key named after the server

    3. Install the Veza application silently with a shared configuration file and the newly-generated API key

    Follow the steps in the Create Providers and Create Team sections before deploying an install script that follows this pattern.

    Provide a Name and Description for the new Team.
  • In The Select Providers dropdown, check both Windows Server and Windows Files

  • Click Create Team.

  • In the Team Management view, click the name of the newly-created Team and record the Team ID at the end of the url (ex: https://example.vezacloud.com/app/teams/613df02b-9a40-4331-947c-5c327b54b228).

  • Team API Keys
    Personal API Key
    Team
    Team API Key
    # Single command deployment with API key encryption during installation
    msiexec /i Veza.msi /qn CONFIG="\\deployment-share\Veza\Veza.config" APIKEY="<team_api_key>"
    # Store API key (this encrypts the key using Windows Data Protection API)
    Start-Process -FilePath "C:\Program Files\Veza\VezaWindowsTray.exe" -ArgumentList "--api_key=<team_api_key>" -NoNewWindow -Wait
    # Set Veza tenant URL and API key
    $vezaUrl = "https://<yourtenant>.vezacloud.com"
    $vezaAPIKey = "your-personal-api-key"
    
    $body = @{
     "name"="Windows Server"
     "custom_template"="application"
    } | ConvertTo-Json
    $header = @{
     "Accept"="application/json"
     "Authorization"="Bearer $vezaAPIKey"
     "Content-Type"="application/json"
    }
    Invoke-RestMethod -Uri "https://$vezaUrl/api/v1/providers/custom" -Method 'Post' -Body $body -Headers $header
    $body = @{
     "name"="Windows Files"
     "custom_template"="application"
    } | ConvertTo-Json
    Invoke-RestMethod -Uri "https://$vezaUrl/api/v1/providers/custom" -Method 'Post' -Body $body -Headers $header
    {
        "team_id": "<team_id>",
        "name": "<key_name>"
    }
    {
     "team_id": "613df02b-9a40-4331-947c-5c327b54b228",
     "name": "server01.example.com"
    }
    {
     "value": {
         "id": "01968c1b-85b7-71eb-8876-843ef2463a8e",
         "access_key": "k1TzyiA…NiBuwP0Wzw",
         "name": "server01.example.com",
         "created_at": "2025-01-01T15:35:58.647121782Z",
         "last_access_at": "2025-01-01T15:35:58.647121782Z",
         "status": "ACTIVE",
         "team_id": "613df02b-9a40-4331-947c-5c327b54b228",
         "team_name": ""
     }
    }
    # Set Veza tenant URL and API key
    $vezaUrl = "https://<yourtenant>.vezacloud.com"
    $vezaAPIKey = "your-personal-api-key"
    
    # Set the Team ID from the previous step
    $teamId = "your-team-id"
    
    $body = @{
     "team_id"=$teamId
     "name"="server01.example.com"
    } | ConvertTo-Json
    $header = @{
     "Accept"="application/json"
     "Authorization"="Bearer $vezaAPIKey"
     "Content-Type"="application/json"
    }
    $resp = Invoke-RestMethod -Uri "https://$vezaUrl/api/preview/teamkeys" -Method 'Post' -Body $body -Headers $header
    $resp.value.access_key
    $vezaUrl="https://<yourtenant>.vezacloud.com"
    $vezaAPIKey="<veza-personal-api-key>"
    $teamId="<veza-team-id>"
    
    $fqdn=(Get-WmiObject win32_computersystem).DNSHostName+"."+(Get-WmiObject win32_computersystem).Domain
    
    $vezaRequestHeader = @{
      "Accept"="application/json"
      "Authorization"="Bearer $vezaAPIKey"
      "Content-Type"="application/json"
    }
    
    $keyRequestBody = @{
      "team_id"=$teamId
      "name"=$fqdn
    } | ConvertTo-Json
    
    $keyResponse = Invoke-RestMethod -Uri "$vezaUrl/api/preview/teamkeys" -Method 'Post' -Body $keyRequestBody -Headers $vezaRequestHeader
    $apiKey = $keyResponse.value.access_key
    
    msiexec /i Veza.msi /qn CONFIG="\\deployment-share\Veza\Veza.config" APIKEY=$apiKey