A complete, interactive training guide for rotating local computer administrator passwords using Delinea Secret Server — covering architecture, setup, automated RPC, macOS, API automation, and a live incident test case.
Why Secret Server, what it does, and how rotation fits into your security posture.
Validate every prerequisite before configuring Secret Server or performing any rotation.
One-time configuration tasks — complete these before creating Secrets or enabling automated rotation.
Automated rotation via Secret Server RPC for domain-joined and workgroup Windows endpoints.
Secret Server rotates macOS local admin passwords over SSH using a custom sysadminctl changer script.
Secret Server exposes a full REST API for programmatic rotation, bulk operations, SOAR playbook integration, and pipeline credential retrieval.
Simulated post-incident exercise. Work through each task and mark it complete as you go.
EDR telemetry has flagged a memory-scraping process on CORP-WS-0142 at 09:14 UTC. A Mimikatz-signature binary was detected in the process tree before being terminated. The local Administrator account on this machine was last rotated 61 days ago and has not been rotated since the alert fired.
The corresponding Secret is ID #1042 in Secret Server, located at IT\Local Admin Accounts\Workstations. Your SOC ticket is INC-20260307-0042.
Your task: Rotate the credential immediately using Secret Server RPC, validate the change end-to-end, check for attacker persistence, and document the incident in the Secret's audit record.
All 10 tasks verified. Emergency rotation exercise passed.
Credential is rotated and secured in Delinea Secret Server.
Select the best answer for each question. Instant feedback and explanation provided.