🔐
DELINEA SECRET SERVER Training Module
0 / 6 complete
Training Guide · Event Subscriptions

Master Event Subscriptions
in Secret Server

Learn how to configure, manage, and operationalise event-driven notifications so your team is always alerted to critical PAM activity in real time.

📚
6 Modules
⏱️
~25 min read
🎯
Intermediate
01

What Are Event Subscriptions?

Understanding the Secret Server notification engine

Definition

An Event Subscription in Delinea Secret Server is a configurable rule that monitors for specific system or secret-level activity and automatically delivers notifications to designated recipients — via email, Slack, Teams, or custom webhook — when that activity occurs.

Event Subscriptions form the heart of Secret Server's audit alerting capability. Instead of polling reports manually, subscriptions push the right information to the right people the moment it happens — reducing response time and supporting compliance requirements.

Event Subscriptions differ from Event Pipeline rules. Subscriptions are notification-only; Pipelines can trigger automated actions. Both work in concert to form a complete event-driven PAM workflow.

How It Works

Trigger Event
User/System Action
Event Engine
Captures & evaluates
Subscription Rules
Filter & match
Notification
Email / Webhook
Recipients
Users / Groups

Event Categories

🔑

Secret Events

View, edit, delete, check-out, launch session, copy password, expiry, heartbeat failure.

👤

User Events

Login, logout, login failure, lockout, permission change, MFA events.

🏢

Folder Events

Folder creation, deletion, permission change, secret moved into/out of folder.

⚙️

System Events

Configuration changes, role changes, discovery, backup, licence expiry.

🔄

Workflow Events

Access requests submitted, approved, denied, and expiration of workflow grants.

🩺

Heartbeat Events

Password validation success/failure, Remote Password Changer (RPC) results.

Combining multiple event types into a single focused subscription (e.g. all secret-access events for a Critical folder) produces cleaner, more actionable alerts than a single catch-all subscription.

Finished reading Module 01?

02

Creating Event Subscriptions

Step-by-step walkthrough from navigation to save

You must be an Administrator or have the Administer Event Subscriptions role permission to create subscriptions.

Step-by-Step: Create a New Subscription

1
Navigate to Event Subscriptions

From the top menu go to Admin → Event Subscriptions. The Event Subscriptions management page will load showing all existing subscriptions.

2
Click "+ Create New"

Select the Create New button (top-right of the grid). This opens the New Event Subscription wizard.

3
Set the Subscription Name

Enter a descriptive name — e.g. Prod Vault — Critical Secret Viewed. Good naming conventions include scope, event type, and environment.

4
Choose Event Type(s)

Expand the Events selector. Choose one or more event types from the categorised list. Each selected event creates a trigger condition for this subscription.

5
Configure Filters (Optional but Recommended)

Apply scope filters to narrow the subscription:

Secret Filter — scope to specific secrets by name or template.
Folder Filter — restrict to secrets inside certain folders.
Group Filter — only fire when the acting user belongs to a specified group.
Container Filter — limit to a specific site or engine.

6
Add Recipients

Click Add Recipient. Select from Users, Groups, or enter an external email address. You can mix all three recipient types on a single subscription.

7
Configure Send Settings

Choose whether to Send Immediately (one email per event) or Batch notifications on a schedule (e.g. hourly digest). For high-volume events, batching is strongly recommended.

8
Set Active Status & Save

Ensure Active is toggled on, then click Save. The subscription immediately begins monitoring for matching events.

Key Configuration Fields

Field Required Description
Name Yes Unique, descriptive name for the subscription.
Events Yes One or more event types that trigger the notification.
Filters Optional Scope limiting criteria: folder, secret, group, or site.
Recipients Yes Users, groups, or external emails to be notified.
Send Immediately Optional Toggle between real-time and batched digest delivery.
Active Optional Enable/disable without deleting the subscription.
High Priority Optional Marks notification as high-priority in email clients.
Use the Send Test Email button (visible after saving) to verify routing and template rendering before enabling a subscription in production.

Finished reading Module 02?

03

Managing Event Subscriptions

Edit, disable, audit, and maintain subscriptions over time

After go-live, subscriptions require ongoing attention. Recipients change, event scopes expand, and alert fatigue can emerge if subscriptions are not regularly reviewed.

Navigate to Admin → Event Subscriptions, locate the subscription in the grid, and click its name or the Edit pencil icon.


All fields are editable post-creation. Changes take effect immediately upon saving — there is no deployment or propagation delay. Use the Audit tab within the subscription to see who last modified it and when.

Disable (toggle Active off) when a subscription is temporarily paused — maintenance windows, change freezes, or testing. The configuration is preserved and can be re-enabled instantly.


Delete only when the subscription is permanently no longer needed. Deletion is irreversible and removes all associated configuration. Always prefer disabling when in doubt.

Recipients can be added or removed at any time. Best practice is to assign Groups rather than individual users so that off-boarding and team changes automatically update notification routing without modifying each subscription.


External email recipients (outside the Secret Server directory) are supported and useful for routing to ticketing systems (e.g. ServiceNow inbound email) or SIEM forwarders.

Every change to a subscription is logged in Secret Server's audit trail. Access it via Admin → Event Subscriptions → [Subscription Name] → Audit tab.


The audit log captures: creation date, last modified by, field-level diff of what changed, and the IP address of the modifying user. This supports SOC 2, ISO 27001, and PCI-DSS audit requirements.

Secret Server logs every notification sent. Review delivery history under Reports → Event Subscriptions or in the subscription's own Notifications tab to confirm alerts were delivered and identify failures caused by SMTP misconfiguration or bounced addresses.

High-frequency events (e.g. Secret Viewed on a shared vault) can generate hundreds of emails per day, causing recipients to ignore them. Mitigate this by:


  • Enabling Batch / Digest delivery (hourly or daily).
  • Applying Folder or Group filters to limit scope.
  • Reserving Send Immediately only for critical security events.
  • Regularly reviewing subscription hit rates in the Notifications tab and pruning or adjusting underperforming subscriptions.

Recipient Types

Type Use When
User (Internal) Notifying a named individual — e.g. the secret owner or vault admin.
Group (Internal) Notifying a team role (SOC, PAM Admins). Preferred: automatically inherits membership changes.
External Email Routing to ticketing inboxes (ServiceNow, Jira), SIEM forwarders, or distribution lists.
Webhook (via Pipeline) Delivering structured JSON payloads to Slack, Teams, PagerDuty, or custom APIs. Requires Event Pipeline configuration.

Quarterly Maintenance Checklist

Click each item to mark it complete.

  • Review all active subscriptions — confirm they are still needed.
  • Verify recipient lists reflect current team membership.
  • Check notification delivery success rate in the Notifications tab.
  • Remove or merge duplicate subscriptions covering the same scope.
  • Confirm batch schedules align with incident-response SLAs.
  • Audit who has Administer Event Subscriptions permission — limit to PAM admins.

Finished reading Module 03?

04

Use Cases & Leverage

Real-world scenarios that deliver security and compliance value

Event Subscriptions unlock tangible value only when mapped to real operational and compliance needs. Below are the most impactful patterns.

🚨

Privilege Escalation Detection

Subscribe to Role Assignment Changed and User Added to Group events. Alert the Security team whenever elevated roles are granted — catching both authorised changes and insider threats.

🕐

After-Hours Access Alerts

Use the Group filter to scope Secret Viewed and Session Launch events to privileged accounts, and alert on any activity outside business hours using scheduled reports combined with subscriptions.

💔

Heartbeat Failure Monitoring

Subscribe to Heartbeat Failure events scoped to production credential folders. Immediate alerts let the vault team investigate misconfigured RPC before an outage occurs.

🔓

Check-Out Monitoring

Alert on Secret Checked Out and Check-In Overdue for high-value secrets (domain admin, root, break-glass). Ensures oversight of every privileged session against a shared account.

📜

SOX — Change Evidence

Subscribe to Secret Field Changed on financial system credentials. Email notifications serve as immutable evidence of who changed what and when — directly satisfying SOX IT general controls.

💳

PCI-DSS — Access Alerts

PCI DSS Req. 10 requires alerting on privileged access to cardholder data systems. A subscription scoped to the CDE folder with Secret Viewed and Session Launch events satisfies this directly.

🏥

HIPAA — PHI System Access

Alert on any access to credentials for EHR or PHI-adjacent systems. Combine with folder-level access reviews to demonstrate minimum-necessary access controls.

📆

Password Expiry Reminders

Subscribe to Secret Expiration events 30/7/1 days before expiry. Automate credential rotation reminders, reducing compliance gaps caused by expired passwords on non-RPC accounts.

🔄

RPC Failure Alerting

Subscribe to Password Change Failed events. Ops teams can immediately investigate and remediate failed automated rotations before manual password use becomes necessary.

🗂️

Secret Lifecycle Events

Alert on Secret Created and Secret Deleted in critical folders. Helps vault admins track vault growth and identify ungoverned secrets being added outside change control.

🤝

Access Request Notifications

Subscribe to Access Request Submitted to ensure approvers are promptly notified. Reduces approval SLA breaches and removes the need for manual follow-up chasing.

🔑

Discovery Notifications

Alert on Discovery Scan Completed and Unmanaged Account Found. Provides ops teams a prompt to onboard newly discovered privileged accounts before they drift outside PAM governance.

Feeding Secret Server event data into a SIEM or SOAR platform gives the SOC real-time PAM telemetry for correlation and investigation.

Syslog / SIEM Integration Pattern
/* Option 1 — Syslog forwarding (built-in) */ AdminConfigurationGeneralSyslog / CEF Enabled: true Syslog Server: "siem.corp.internal:514" Protocol: UDP | TCP | TLS Format: CEF | Syslog | JSON /* Option 2 — Event Subscription → External Email → SIEM Ingestion */ Recipients → Add External Email → "siem-ingest@corp.internal" /* Option 3 — REST API polling (scripted) */ GET /api/v1/eventssubscriptions/notifications ?subscriptionId=42 &startDate="2025-01-01T00:00:00Z" Authorization: Bearer {token}
For high-fidelity SIEM integration, the preferred method is CEF Syslog forwarding (built-in to Secret Server). This delivers every event — not just subscribed ones — and avoids SMTP delivery latency.

Finished reading Module 04?

05

Advanced Configuration

Email templates, REST API management, and Event Pipeline integration

Customising Notification Email Templates

Secret Server ships with default notification templates. You can override them per subscription or globally via Admin → Configuration → Email. Templates use Razor-style tokens.

Email Template Tokens
// Common tokens available in notification templates $EventName // e.g. "SECRET_VIEW" $EventUserName // Username that triggered the event $SecretName // Name of the affected secret $FolderPath // Full folder path of the secret $SecretTemplateName// Template type (e.g. "Windows Account") $EventDate // Timestamp of the event $IPAddress // Source IP of the acting user $SecretServerUrl // Deep link back to the secret $Comment // Reason entered during check-out/view

Managing Subscriptions via REST API

Secret Server exposes a full REST API for Event Subscriptions — useful for Infrastructure-as-Code (IaC) provisioning, automated audits, and CI/CD pipeline integration.

REST API — CRUD Operations
# List all subscriptions GET /api/v1/eventssubscriptions # Get a specific subscription GET /api/v1/eventssubscriptions/{id} # Create a new subscription POST /api/v1/eventssubscriptions { "name": "Prod — Domain Admin Checkout", "active": true, "sendEmail": true, "highPriority": true, "events": ["SECRET_CHECKOUT", "SECRET_CHECKIN"], "subscribedUserIds": [12, 45], "subscribedGroupIds": [7], "folderFilters": [{ "folderId": 101 }] } # Update (full replace) PUT /api/v1/eventssubscriptions/{id} # Delete DELETE /api/v1/eventssubscriptions/{id}

Event Subscriptions vs. Event Pipelines

Capability Event Subscription Event Pipeline
Purpose Notify people Automate actions
Email Notification ✓ Native ✓ Via Task
Webhook / Slack ✗ Not supported ✓ Native
Trigger Password Change
Create Ticket (ITSM)
Complexity Low Medium–High
License Requirement All editions Platinum / above
Use Event Subscriptions for immediate human notification. Layer in Event Pipelines where automated remediation or ITSM ticket creation is required. They are complementary, not competing.

Finished reading Module 05?

06

Knowledge Check

Test your understanding before signing off this module

Question 1 of 5
Which role permission is required to create an Event Subscription in Secret Server?
Question 2 of 5
What is the recommended best practice for managing recipients on a subscription to handle team changes automatically?
Question 3 of 5
You need to alert the SOC via Slack when a privileged secret is checked out. Which tool should you use?
Question 4 of 5
What should you do instead of deleting a subscription during a planned maintenance window?
Question 5 of 5
Which delivery mode is most appropriate for a Secret Viewed subscription on a high-traffic shared vault folder?

Finished the Knowledge Check?