Search2 Results

Relying on either the video or transcript provided, learn how to use Privileged Access Manager, the BeyondTrust Privileged Access Management (PAM) tool.
This article explains how to use a secondary account's enhanced privileges to make changes on specific computers. See https://td.usnh.edu/TDClient/60/Portal/KB/Artic... for steps to request a secondary account and permission to use it on specific computers.  Once both those requests have been fulfilled, then you can use the instructions in this article.