PEM Risk Discovery Report

Local Admin Account Audit

PEM Risk Assessment Tool

Limiting the use of local administrator rights in your organisation should be an essential component of your IT security practice. But removing administrator rights is not necessarily a simple operation. Many users need local administrator rights to stay productive at work, and to remove the need for constant assistance from your IT support desk. Providing full administrator rights to these users may streamline productivity in the short term, but operating in this manner represents significant long-term risks.

The report you’ve received from running our Local Admin Audit Tool is part of the puzzle. You’ve been provided with the information about who is actively using local administrator accounts and which computers they are accessing. The next part is to evaluate whether these users need local administrator rights and what they need them for.

If you find users that are simply overprivileged and do not require administrator rights for their day to day work, the simplest solution is to remove that privilege.

PEM Risk Assessment Tool

Limiting the use of local administrator rights in your organisation should be an essential component of your IT security practice. But removing administrator rights is not necessarily a simple operation. Many users need local administrator rights to stay productive at work, and to remove the need for constant assistance from your IT support desk. Providing full administrator rights to these users may streamline productivity in the short term, but operating in this manner represents significant long-term risks.

The report you’ve received from running our Local Admin Audit Tool is part of the puzzle. You’ve been provided with the information about who is actively using local administrator accounts and which computers they are accessing. The next part is to evaluate whether these users need local administrator rights and what they need them for.

If you find users that are simply overprivileged and do not require administrator rights for their day to day work, the simplest solution is to remove that privilege.

Thank you!

Your submission has been received and we'll be in touch shortly.

Go here
Oops! Something went wrong while submitting the form.

Local Admin Account Audit

PEM Risk Assessment Tool

Limiting the use of local administrator rights in your organisation should be an essential component of your IT security practice. But removing administrator rights is not necessarily a simple operation. Many users need local administrator rights to stay productive at work, and to remove the need for constant assistance from your IT support desk. Providing full administrator rights to these users may streamline productivity in the short term, but operating in this manner represents significant long-term risks.

The report you’ve received from running our Local Admin Audit Tool is part of the puzzle. You’ve been provided with the information about who is actively using local administrator accounts and which computers they are accessing. The next part is to evaluate whether these users need local administrator rights and what they need them for.

If you find users that are simply overprivileged and do not require administrator rights for their day to day work, the simplest solution is to remove that privilege.

Understanding the Audit Tool Report

Can I just remove admin rights from all my users across the board?

There may be a number of users who require local administrator access to their workstations for legitimate business reasons, they may be a developer who  needs to run Visual Studio with elevated privileges in order to manage their tools and plugins, or a support engineer who often has to change network settings on their laptop when visiting a customer site.

The necessity of local admin rights is highly dependent on the nature of your operation, you’ll need to find out why your users need administrator rights and what for.

What should I do next?

Here’s where Osirium offers a solution,  Privileged Endpoint Manager (PEM) is an endpoint management platform that removes the necessity for local administrator rights by offering both policy based access to run specific  applications with elevated privilege or time based elevation of rights, all with a full audit trail to ensure maximum compliance.

How do I know what rights my users need?

There are two routes you can go down here, in an organisation with fewer users it may be possible to simply ask individual users why they need local admin rights, but in an larger organisation this is a more challenging task, so we’ve developed a solution within PEM to deal with this.

PEM can operate in ‘learning mode’, in this mode elevations of privilege are monitored by PEM and policies automatically created to deal to allow these actions in the future. This gives you a clear oversight over the need for admin rights in your Windows estate, while ultimately providing control over the usage of these rights.

If you'd like to learn more and get a free introduction to PEM, please leave your contact details in the form below and we'll be in touch.


No items found.

No items found.

Privileged Endpoint Management

To get more information about the Audit Tool report and understand how to address the issues raised, please get in touch.

An overview of Privileged Access Management

Read this short whitepaper to see how PAM can protect your shared devices and services, manage privileged users and accounts and simplify remote access.

Read the Overview
Talk to an expert

An overview of Privileged Process Automation

Read this short whitepaper to see how PPA can transform your IT Operations.

Read the Overview
Talk to an expert

An overview of Privileged Endpoint Management

Read this short whitepaper to see how PEM can improve endpoint security and IT help desk load.

Read the Overview
Talk to an expert

An overview of Privileged Access Security

Read this short whitepaper to see how PPA can transform your IT Operations.

Read the Overview
Talk to an expert
Click to chat