{"id":34679,"date":"2020-12-07T15:16:37","date_gmt":"2020-12-07T15:16:37","guid":{"rendered":"https:\/\/sectona.com\/?page_id=34679"},"modified":"2022-12-28T09:27:52","modified_gmt":"2022-12-28T09:27:52","slug":"remove-administrator-rights","status":"publish","type":"page","link":"https:\/\/sectona.com\/remove-administrator-rights\/","title":{"rendered":"Remove Administrator Rights"},"content":{"rendered":"\t\t
Provision of always-on access for the workforce with complete administrator control potentially increases ransomware and lateral movement risk. Local administrator accounts on endpoints or user account with ungoverned administrative privileges are risky and expose possible areas for attackers to inject malware.\n<\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t NEED<\/p>\n\n <\/p>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t \n\t\t\t\t\t\tMost organizations choose user convenience over endpoint security leaving the door open for external or insider user attack. Define policies for elevation on need-basis\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t \n\t\t\t\t\t\tElevate privileges per application basis for users within the network or for offline users.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t \n\t\t\t\t\t\tBlock unknown applications and define policy-driven methods to allow whitelisted applications and restrictive administrative privileges.\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t BENEFITS<\/p>Simplify Least Privileged Management on Windows Endpoints<\/h2>\n
\n\t\t\t\t\t\n\t\t\t\t\t\tLock Down Privileges on Endpoints\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t\tOn-demand Privilege Elevation\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t
\n\t\t\t\t\t\n\t\t\t\t\t\tStop Unknown Application Execution\t\t\t\t\t<\/span>\n\t\t\t\t<\/h3>\n\t\t\t\t\t\t\t\t\t
Deliver Frictionless Access without Compromising Security<\/h2>\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t