User environment security

Secure endpoints: You can’t rely on software configurations and permissions to ensure a secure user environment. You also need to take into account user devices. Desktop Authority USB and Port Security controls device usage such as flash drives, printers, cameras and mobile devices. They also control port access such as serial, infrared, USB and more. Control hinges on the unique level of authentication and access for each user. And you choose the level of access by targeting Read, Write, Full Access or Full Deny.

Set policy with smart USB whitelisting or blacklisting: Set policy through whitelists (blocking everything and then explicitly allowing certain devices) or through blacklists (disallowed devices explicitly entered).

Elevate Windows operations for user flexibility and more: Some Windows features require administrative privileges, even those as simple as changing the time or time zone. Boost the productivity of users by elevating rights on specific processes with Privilege Manager. You can easily elevate the features they need, while keeping the rest locked down.

Discover applications that require elevated privileges: Identify applications in use that require administrative privileges with Privilege Manager’s discover mode. Once discovered, it’s easy to create privilege elevation rules so applications can be used without disruption.

Grant user rights to securely update and install trusted apps: Privilege Manager allows users to easily install the latest version of Adobe Reader or apply the latest Java update themselves. At the same time, endpoints are secured by preventing installation of viruses and unwanted apps. You can also provide users with the ability to request elevated privileges when needed. You can then send a request to the administrator to deny or approve, then notify the user once processed.

Confirm applications are approved for administrative privileges: You can use several methods to determine that an application is the one you intended for elevated privileges. Create elevation rules by application vendor or publisher, based on their digital certificate. This ensures only trusted applications are launched or elevated for users. Use the file hash feature to protect against users who rename files in an attempt to elevate a different application.