How to Remove Local Admin Rights from Windows Users Without Impacting the Business

preview_player
Показать описание
Local Admin rights on Windows computers can be very powerful. Which also means they can be very dangerous. The most common attack vector is via users targeted by attackers who have too much privilege as they can install malware without IT ever knowing.

In this video, you see how Local Admin rights can be removed from *all* users, including a line of business staff and system administrators, in ways that are both auditable and don't impact the business. It's all achieved using Osirium Privileged Endpoint Management (PEM).

ABOUT OSIRIUM

Innovators in Privileged Access and IT Process Automation

Osirium’s experienced management team has an outstanding track record in cybersecurity and automation, helping thousands of organisations over the past 25 years protect and transform their IT security and operations, before founding Osirium Ltd in 2008 and establishing its headquarters near Reading, UK.

The company is now a leading UK-based cybersecurity SaaS vendor delivering Privileged Access Management (PAM), Privileged Endpoint Management (PEM) and IT Process Automation solutions that are uniquely simple to deploy and maintain.

With privileged credentials involved in over 80% of security breaches, customers rely on Osirium’s innovative 2nd generation PAM technology to control 3rd party access, protect them against insider threats, and demonstrate rigorous compliance. Our award-winning Task and Process Automation solutions deliver time and cost savings by automating complex, multi-system processes securely, allowing them to be delegated to Help Desk engineers or end-users and to free up specialist IT resources. The Osirium PEM solution balances security and productivity by removing risky local administrator rights from users, while at the same time allowing escalated privileges for specific applications.

About Video:
00:06 removing local admin rights from users
00:22 how privileged endpoint management tackles
00:40 create policies
00:56 install and run as administrator
01:28 top level IT admins
01:56 a full audit trail
02:05 admin rights in a way that keeps users
Рекомендации по теме