Search2 Results

Start typing to lookup. Use the UP and DOWN arrow keys to review results. Press ENTER to select. Press BACKSPACE to remove a selection.
    Lookup Category Clear Category
    Relying on either the video or transcript provided, learn how to use Privileged Access Manager, the BeyondTrust Privileged Access Management (PAM) tool.
    This article explains how to use a secondary account's enhanced privileges to make changes on specific computers. See https://td.usnh.edu/TDClient/60/Portal/KB/Artic... for steps to request a secondary account and permission to use it on specific computers.  Once both those requests have been fulfilled, then you can use the instructions in this article.