KACE Privilege Manager

Straightforward and effective Windows privilege management

Comprehensive least-privileged administration and application control

Help your end users elevate and manage their own user and administrative rights while maintaining a least privileged, GDPR-compliant environment with KACE Privilege Manager. Leverage pre-packaged and community elevation rules to address the most common needs. Applying the elevation rules is more effective with the integration of Quest’s patented and powerful Validation Logic targeting technology. Privilege Manager works seamlessly with Active Directory and Group Policy Objects. You won’t find an easier or more affordable way to maintain security while allowing users more self-help capabilities in a locked-down PC environment.

Also part of the KACE Desktop Authority Management Suite (DAMS), KACE Privilege Manager is easy to deploy and manage.

Self-service
Allow end-users to easily elevate and manage their own user and administrator rights, while maintaining a least-privileged environment.
Automation
Avoid the pain of managing each user and desktop individually by automatically elevating permissions with privilege elevation rules.
Visibility
Discover applications that require administrative privileges and apply pre-defined privilege elevation rules.
Flexibly
Delegate privilege management responsibilities to OU-level admins in organizations of all sizes.
Security
Control user-level access to unwanted or suspect applications.
Integration
Seamlessly integrate with Active Directory and Group Policy Objects

Key Features

Elevation on-demand

Take advantage of myriad options for end-user admin access to optimize productivity and security.

Digital certificate verification

Save time by automatically elevating all of the applications from a specific publisher.

Validation Logic

Use our Validation Logic technology to target access rights to any combination of users, user groups, platforms or applications.

Reporting

Stay apprised of what’s happening on your Windows desktops with reports that provide a quick and simple status of elevation and rules activity.

Community rules exchange

Maximize your investment by using or adding to the more than 100 pre-existing rules in the Community Rules Exchange.

Blacklisting

Deny user access to unnecessary or unwanted applications for increased security and efficiency.

    Privilege elevation and blacklisting

  • Elevate or deny permissions at the application level.

  • Find all admin accounts

  • Remove local admin rights and give users with elevated execution privileges.

  • Application discovery and elevation

  • Discover and elevate all of the applications from a specific publisher.

  • Self-service elevation

  • Allow user-based elevation for specific scenarios.

  • Reporting

  • Get updated on elevation activity, blacklisting and rules deployment.

  • Blacklisting

  • Deny access to unnecessary or unwanted applications.

Specifications

Operating systems

  • .NET Framework 4.0
  • Microsoft Group Policy Management Console
  • PDF reader to open the Privilege Manager guides
  • Screen resolution of 1024x768 or higher
  • Windows Server 2008
  • Windows 7 Enterprise, Professional, or Ultimate Editions
  • Windows Server 2008 R2
  • Windows Server 2012
  • Windows 8.1
  • Windows Server 2012 R2
  • Windows 10
  • Windows Server 2016

Resources

Privilege Manager for Windows
Datasheet
Privilege Manager for Windows
Privilege Manager for Windows
Privilege Manager for Windows - control and secure the admin account on Windows systems
Read Datasheet
Desktop Authority Management Suite
Datasheet
Desktop Authority Management Suite
Desktop Authority Management Suite
Proactively configure, manage, secure and support all of your desktops
Read Datasheet
Quest Unified Endpoint Management
White Paper
Quest Unified Endpoint Management
Quest Unified Endpoint Management
Quest overview of Unified Endpoint Management and how to build an effective strategy.
Read White Paper
Mapping Your Requirements to the NIST Cybersecurity Framework
White Paper
Mapping Your Requirements to the NIST Cybersecurity Framework
Mapping Your Requirements to the NIST Cybersecurity Framework
To better understand how agencies can leverage the NIST Cybersecurity Framework to navigate the changing threat landscape, GovLoop partnered with Quest, a leader in helping build and manage modern, secure and more resilient IT architecture.
Read White Paper
Report: Industry Insights - Trends in Unified Endpoint Management
White Paper
Report: Industry Insights - Trends in Unified Endpoint Management
Report: Industry Insights - Trends in Unified Endpoint Management
Read this Unified Endpoint Management report to learn about trends, solutions and strategies to enhance your unified endpoint management.
Read White Paper
Facing the Endpoint Reality: Unified Endpoint Management (UEM) Trends
Infographic
Facing the Endpoint Reality: Unified Endpoint Management (UEM) Trends
Facing the Endpoint Reality: Unified Endpoint Management (UEM) Trends
Endpoint security is one of the primary benefits of having a UEM solution in place. Uncover strategies to implement compliance mandates and reduce complexities.
View Infographic
Privilege Manager
Technical Brief
Privilege Manager
Privilege Manager
Licensing & frequently asked questions
Read Technical Brief
Poor PAM processes and policies leave the crown jewels susceptible to security breaches
White Paper
Poor PAM processes and policies leave the crown jewels susceptible to security breaches
Poor PAM processes and policies leave the crown jewels susceptible to security breaches
Take a look at the eye-opening findings about privileged account management (PAM) practices in One Identity’s global survey of IT security professionals.
Read White Paper

Get Started Now

Straightforward and effective Windows privilege management

Support & Services

Product Support

Self-service tools will help you to install, configure and troubleshoot your product.

Support Offerings

Find the right level of support to accommodate the unique needs of your organization.