- Knowledge Base
- Technology
- Help, Support, & Training
- Endpoint Management
This article explains how to use a secondary account's enhanced privileges to make changes on specific computers. See
https://td.usnh.edu/TDClient/60/Portal/KB/Artic... for steps to request a secondary account and permission to use it on specific computers. Once both those requests have been fulfilled, then you can use the instructions in this article.
- Knowledge Base
- Technology
- Help, Support, & Training
- Endpoint Management
This article provides additional information for established and approved USNH endpoint management standards and policies.
- Knowledge Base
- Technology
- Accounts, Passwords, & Access
- Privileged Access Management (PAM)
Relying on either the video or transcript provided, learn how to use Privileged Access Manager, the BeyondTrust Privileged Access Management (PAM) tool.
- Knowledge Base
- Technology
- Cybersecurity
This article contains information regarding Antivirus Software; CrowdStrike Falcon and Avira. Antivirus Software is a critical part of securing your computer, institutional data, and your personal information. On University and USNH grant funded Apple Mac systems CrowdStrike Falcon is the required Antivirus. Avira is strongly suggested for personally owned Apple Mac devices.