- Knowledge Base
- Technology
- Accounts, Passwords, & Access
- Privileged Access Management (PAM)
Relying on either the video or transcript provided, learn how to use Privileged Access Manager, the BeyondTrust Privileged Access Management (PAM) tool.
- Knowledge Base
- Technology
- Help, Support, & Training
- Endpoint Management
This article explains how to use a secondary account's enhanced privileges to make changes on specific computers. See
https://td.usnh.edu/TDClient/60/Portal/KB/Artic... for steps to request a secondary account and permission to use it on specific computers. Once both those requests have been fulfilled, then you can use the instructions in this article.