Duplicate » admin by request

Intune

Navy digital network artwork.

At Admin By Request, we want our Privileged Access management (PAM) solution to be both as effective as possible, and also smooth and easy to adopt for our customers. That often means ensuring our product works with and adds to existing security tools and policies already in place at customer organizations.

With that in mind, we’ve added Microsoft Intune integration to our latest version of Admin By Request for Windows: you can now layer up your endpoint security by enforcing compliance with existing Intune policies for users who want administrative access.

This integration is super simple – here’s a quick rundown on how to get it configured.

Configuring the Feature

1. In your User Portal, navigate to Settings > OS Settings > Lockdown > Intune, and set the Device must be compliant toggle to ON:

Click the Save button to save the changes – note the green tick that appears when the save is complete.

2. From here on, only users who fulfil the company compliance policies specified in Intune will be able to gain elevation. E.g.:

3. Users who do not meet these compliance policies will recieve the following popup when they attempt to gain elevation:

Note that these policies can be circumvented by users who have been provided a PIN Code from an IT Admin.

4. As with all Admin By Request features, you can apply this rule to some users and groups and not to others by creating a Sub-Setting which overrules Global Settings:

Summary

If your enterprise makes use of Microsoft Intune policies, you can now use Admin By Request to block elevations on devices that are not compliant with your existing Intune policies.

Layer up your security with this simple new feature – download Admin By Request v8.0 today to get started with this integration, and a whole lot more.

About the Author:

Picture of S Dodson

S Dodson

With a solid background in computer science and graphic design, my career kicked off writing tech manuals for various companies in both the software and hardware realms. I then side-stepped into marketing and found my passion in cybersecurity. I fuse my tech know-how with design skills to craft engaging blogs that spotlight cybersecurity for businesses. My main focus now is championing the marketing efforts of Admin By Request Zero Trust Platform, where my creative take on cybersecurity helps me create content that's enlightening, entertaining, and impactful. My articles have graced the pages of InfoSec Magazine and top-tier security websites like OPSWAT. I'm on a mission to stress the significance of cybersecurity and to showcase how Admin By Request is shaking things up by making enterprise solutions simple, intuitive, accessible, and affordable to organizations of all sizes, in any industry. My goal is to craft content that informs, intrigues, and motivates action, helping businesses understand the pivotal role of cybersecurity in the digital age we're now living in. Through my work, I aim to close the gap between technology and its real-world applications, keeping our audience well-informed, interested, and ready for the ever-evolving cybersecurity landscape. I bring a blend of extensive experience, deep expertise, recognized authority, and unwavering commitment to trustworthiness in cybersecurity. My goal? To make complex topics relatable and actionable for businesses of all sizes - just like Admin By Request strives to do.

Latest Blogs

Best Remote Access Services in 2024

Remote access services allow you to connect to networks or systems from anywhere and work securely and flexibly. It’s an absolute must in 2024 when most of work at least part of the week at home. In this article, we’re going to breakdown how remote access solutions work, and...

Share this blog to your channels:

Get the Admin By Request Free Plan

Fill out the form with your work email and we’ll send your credentials to your inbox.

Book a Demo

Orange admin by request circle tick logo. » admin by request