More

    Just-In-Time Admin Access for Windows: Extend Time-Based Admin Privileges 

    According to a recent report, breaches involving admin accounts have increased by 17% from 2023[1]. Moreover, approximately 45% of ransomware attacks targeted specifically admin accounts in 2024[2].

    These statistics highlight that administrator accounts are prime targets for hackers, as gaining access to such accounts grants full control over administrative actions, including user management, file access, and app installation, posing significant security risks.

    just-in-time privileged access management
    Privileged Access Management with Just-in-Time Admin Access for Windows

    Traditional administrative access methods are often inadequate in addressing these risks. The lack of automation can result in users retaining extended admin access, which increases the potential for security breaches.

    Furthermore, sharing admin credentials among multiple users escalates the issue, heightening the risk of malware attacks and data breaches, and compromising sensitive organizational information.

    This underscores the need for a robust privileged access management solution, such as Scalefusion’s Just-In-Time Admin Access feature. This blog will explain what Just-In-Time Admin Access entails and highlight the key capabilities of this feature.

    What is Just-In-Time Admin Access?

    Scalefusion offers privileged access management with the Just-In-Time Admin Access feature. This feature ensures that users operate with standard privileges, offering a secure way to access temporary admin privileges only when necessary. It significantly reduces the risks associated with excessive user privileges by providing elevated access only when required, maintaining security while minimizing potential threats.

    Just-In-Time Admin Access enables users to obtain temporary access to launch applications in admin mode, on managed Windows devices. This feature ensures that users operate with elevated privileges securely and only when necessary, allowing them to perform essential tasks without prolonged admin access.

    Key Features of Just-In-Time Admin Access for Windows Devices 

    1. JIT Admin Configuration 

    JIT admin configuration allows IT admins to configure: 

    a. Duration of Admin Privilege

    IT admins can specify the duration (in minutes) during which the user can access the applications in elevated mode. Once the duration ends, the app will be automatically closed. Admin can set the duration from 5 to 60 minutes.

    b. Allowed number of Requests per Day

    IT admin can enable this setting to allow users to elevate the applications with admin privileges by entering other admin’s credentials. Users will be able to elevate applications using only the Scalefusion account if the admin credentials are not available

    c. Enforce Request justification text

    Administrators can make it compulsory for Windows device users to enter the reason for requesting access to any application with elevated access. 

    d. Enforce active internet connection

    If this setting is enabled, a Windows device user must have an active internet connection to access any application in admin mode 

    e. Allow users to elevate using other Admin credentials

    IT admin can enable this setting to allow Windows users to elevate the applications with admin privileges by entering other admin’s credentials. If the admin credentials are not available, users will be able to elevate applications using only the Scalefusion Account.

    f. Configure Disclaimer Note

    IT admins can enter a disclaimer note for users that is displayed on the JIT Admin screen to notify them when the set duration ends. 

    2. Log and Activities 

    a. Monitor Admin Access and Collect logs

    Admins can configure whether logs monitoring the number of times critical operations and applications were started/stopped with admin privileges, should be captured and synced to the dashboard.

    3. Elevation Scope 

    Elevation scope enables IT admins to set a limit of access elevation. It allows them to configure the following settings: 

    a. Configure Accounts That Can Request Admin Access

    IT admins can configure whether all non-admins accounts or specific accounts on the device can request to access the application in elevated mode. If the admins select ‘Specific Accounts’, they must provide the names of user accounts to whom they want to grant access. 

    b. Select Applications that can be Run as Administrator

    Administrators can select which applications should run as an administrator. They can choose from three options: 

    • ‘All Allowed Applications’ enables all applications specified in the Select Apps section of the Device Profile. 
    • ‘All Applications’ permits any application on the managed device to be run as an administrator. 
    • ‘Specific Applications’ restricts administrative access to particular applications. Admins must add the application names by clicking “Add Application” and providing relevant details such as the app name and version.

    c.  Override Duration of Admin Privilege

    Admins can specify the duration (in minutes) after which the admin privileges will be automatically revoked, automatically closing the app. This setting overrides the duration of admin privileges configured as a part of JIT Admin Configuration. The time duration ranges between 1 to 1440 mins.

    4. JIT Admin Access Summary 

    JIT Admin Access summary provides IT admins with the following details: 

    a. Device Summary 

    The device summary offers a comprehensive overview, detailing the total number of devices with Just-In-Time (JIT) Admin configuration applied, the count of standard users on these devices, and the number of admin users. This summary provides clear visibility into the user distribution and administrative access across the configured devices.

    b. Request Summary 

    Request Summary gives IT admins an overview of the number of admin requests made during a single day and the total number of admin requests made during the last 60 days.

    c. Device Overview 

    With the device overview section, admins can access a consolidated tabular view of the name of devices where the configuration has been applied, the serial number of devices, the number of requests received from the device today, the total number of admin requests received from the device, the name of the configuration applied to the device. 

    5. Activity Logs 

    Activity logs enable admins to view activities done by the users on the device, during their elevation from standard to admin user. Apart from the device name and serial number, activity logs include the names of users requesting JIT Admin Access, the files accessed, the start and end time of the JIT admin activity (indicating when the user was elevated to admin and when they were downgraded back to a standard user), and the justification text entered by the user when requesting JIT admin access.

    6. Recommendations 

    The recommendations section offers a summarized view of the admin accounts available on the devices. It includes the names and serial numbers of JIT-configured devices, the total number of users and admins on each device, the number of managed admins, and the name of the JIT Admin configuration applied. 

    Optimize User Privilege Escalation for Windows with Scalefusion OneIdP 

    Scalefusion’s IAM Solution provides organizations with robust identity and access management capabilities. It allows organizations to gain full control over user privilege elevation by offering time-based admin access, preventing users from obtaining extended admin access, securing data, and maintaining system integrity.

    To learn more about Just-In-Time Admin Access for Windows contact our experts or schedule a free demo today

    References 

    1. CyberSecurity Ventures 

    2. Verizon 

    Tanishq Mohite
    Tanishq Mohite
    Tanishq is a Trainee Content Writer at Scalefusion. He is a core bibliophile and a literature and movie enthusiast. If not working you'll find him reading a book along with a hot coffee.

    Product Updates

    Staying Ahead of the Curve: Scalefusion’s Solutions for a Smooth Transition to Apple’s New OS

    Apple's recent announcements have opened up new possibilities for users in both enterprise and personal spaces, thanks to groundbreaking advancements in iOS 18 and...

    Feature Round-up: July and August 2024

    Exciting updates have arrived from July and August 2024!  We’ve introduced a range of new features and enhancements designed to take your Scalefusion experience to...

    Simplifying macOS Enrollment Process: Automate, Streamline, and Secure Your Device Setup

    Beyond just getting the devices up and running, ensuring a smooth and straightforward device setup process is essential for both IT teams and end-users....

    Introducing Just-In-Time Admin for macOS: Extending Access Management with OneIdP

    While macOS security is a prime business concern, most (if not all) security discussions focus on software updates and endpoint security software, and user...

    New Feature Release: Managing AI Settings on Windows

    As enterprises integrate AI-driven functionalities for operational efficiency, they tread carefully due to potential security risks. AI implementations can introduce vulnerabilities like data breaches...

    What are the Key Features of iOS BYOD Management with MDM?

    According to the latest statistics, iPhone users have increased from 10 million in 2008 to 1.46 billion in 2023. ...

    Securing BYOD Environments with Comprehensive IAM Solutions

    The rise of the Bring Your Own Device (BYOD) model has reshaped modern workplaces, with nearly 82% of organizations...

    Must read

    Securing BYOD Environments with Comprehensive IAM Solutions

    The rise of the Bring Your Own Device (BYOD)...

    What is Apple Mobile Device Management (Apple MDM)? A Detailed Guide 

    Apple's presence in the business arena is more than...
    spot_img

    More from the blog

    Enhancing Content Management with Scalefusion FileDock for Windows Devices

    Imagine you're an IT administrator at a rapidly growing tech firm. Each day, you juggle the demands of securely managing and distributing a vast...

    Staying Ahead of the Curve: Scalefusion’s Solutions for a Smooth Transition to Apple’s New OS

    Apple's recent announcements have opened up new possibilities for users in both enterprise and personal spaces, thanks to groundbreaking advancements in iOS 18 and...

    Optimizing Remote Workforce Management

    For many businesses, a remote workforce is a dream come true. It keeps costs low, saves commuting time, and allows team members to work...

    Role of IAM in BFSI: Securing Financial Data 

    As of May 2024, business email-compromised attacks within financial services have increased by 21%. Cybercriminals use social engineering and malware to access legitimate business...