Search2 Results

This article explains how to use a secondary account's enhanced privileges to make changes on specific computers. See https://td.usnh.edu/TDClient/60/Portal/KB/Artic... for steps to request a secondary account and permission to use it on specific computers.  Once both those requests have been fulfilled, then you can use the instructions in this article.
Relying on either the video or transcript provided, learn how to use Privileged Access Manager, the BeyondTrust Privileged Access Management (PAM) tool.