Privilege Manager for Windows enables you to control and secure the admin account on your organization’s Windows systems. It features a number of configuration options for end-user access to the desktop admin account. Privilege Manager for Windows delivers flexibility IT needs while providing the security the organization demands. This enables you to control the elevated permissions for desktop users as part of your organization’s privileged access management program.
Your IT team has a bevy of installation options from which to choose, including our client-deployment wizard, a client Windows installer file (.msi) and Microsoft’s GPMC.
With the Client Data Collection Settings Wizard, you can collect client data for reporting, support discovery and to leverage launch on-demand features.
Take advantage of myriad options for end-user admin access to optimize productivity and security. Options types include: Instant Elevation, Self-service Elevation, Requested Elevation, Temporary Session Elevation and No Elevation.
Ensure that end users and admins are always on the same page for approval processes with email notifications.
Collect information about the privileged applications used over your network during a specified time. With this critical knowledge, you can create a rule to allow a user without elevated privileges to launch the app they need – or choose to mark it as processed so that it will not display in the applications list for that user (unless the filter is specifically set to display it).
Stay apprised of what’s happening on your Windows desktops with reports that provide a quick and simple status of Elevation Activity, Blacklist Activity, Rules Deployment, Instant Elevation, Temporary-Session Elevation Requests and Rule Details reports.
Privilege Manager for Windows - control and secure the admin account on Windows systems
The 2017 Gartner Market Guide for Privileged Access Management (PAM) provides a detailed analysis of the PAM market as well as an in-depth examination of the solutions from over 24 different PAM vendors.
Watch this video to learn how a holistic and comprehensive approach to PAM can help you reduce risk, increase security, and better achieve compliance.
Watch this Randy Franklin Smith-hosted webcast on demand to learn about the eight ways that you can analyze privileged activity to prevent damage from compromised privileged accounts.
Has your organization taken steps to protect your privileged assets from a Pass the Hash (PtH) attack? Re
One Identity named a Visionary in the Gartner MQ for Privileged Access Management