Search5 Results

This article explains how to use a secondary account's enhanced privileges to make changes on specific computers. See https://td.usnh.edu/TDClient/60/Portal/KB/Artic... for steps to request a secondary account and permission to use it on specific computers.  Once both those requests have been fulfilled, then you can use the instructions in this article.
This article provides additional information for established and approved USNH endpoint management standards and policies.
Relying on either the video or transcript provided, learn how to use Privileged Access Manager, the BeyondTrust Privileged Access Management (PAM) tool.
This article contains information regarding Antivirus Software; CrowdStrike Falcon and Avira. Antivirus Software is a critical part of securing your computer, institutional data, and your personal information. On University and USNH grant funded Apple Mac systems CrowdStrike Falcon is the required Antivirus. Avira is strongly suggested for personally owned Apple Mac devices.