Search4 Results

This article provides additional information for established and approved USNH endpoint management standards and policies.
Relying on either the video or transcript provided, learn how to use Privileged Access Manager, the BeyondTrust Privileged Access Management (PAM) tool.
This article explains how to use a secondary account's enhanced privileges to make changes on specific computers. See https://td.usnh.edu/TDClient/60/Portal/KB/Artic... for steps to request a secondary account and permission to use it on specific computers.  Once both those requests have been fulfilled, then you can use the instructions in this article.