Дякуємо, ми отримали ваше повідомлення і звʼяжемось в найближчий час! :)
What is Elevation Control?
Elevation Control is a policy-based privilege management solution for endpoints that helps organizations stay secure without compromising operational efficiency.
Instead of granting users administrator account access, administrators can create policies that automatically elevate privileges only for specific applications.
This allows applications to access necessary resources without exposing sensitive credentials to users.
Elevation Control gives administrators full control over which applications can run with local administrator rights — without the need to grant these rights to users.
How Does It Work?
After initial deployment, ThreatLocker automatically analyzes all existing applications on the system.
Administrators can review the application list, identify which ones require elevated privileges, and configure access policies.
When endpoint privilege management (EPM) is enabled for a specific application, users can run it with local administrator rights — without entering credentials.
Elevation Control integrates with Application Control.
If an application is not permitted to run, users can request access, and administrators can approve it while simultaneously granting elevated privileges.
For applications that only require elevation during installation or updates, time-bound policies can be created.
Once the set time expires, administrator rights are revoked, and the application runs with standard privileges.
What Makes ThreatLocker® Unique?
Unlike traditional endpoint privilege management tools that focus solely on user rights and roles, ThreatLocker Elevation Control is application-centric.
Administrators can precisely specify which applications are allowed to run with elevated privileges.
This approach provides deeper control over application execution and significantly reduces the attack surface.
Restricting elevated application execution to only when truly necessary greatly enhances cybersecurity.
While classic EPM solutions require complex authentication that can hinder user productivity, ThreatLocker eliminates this friction in operational workflows.
This solution is designed for maximum user convenience: authorized users can run applications with elevated rights without having to repeatedly enter credentials.
ELEVATION CONTROL CAPABILITIES
Complete Visibility of Administrative Privileges
Gain the ability to approve the execution of specific applications with administrator rights—even if the user does not have local admin privileges.
Simplified Privilege Elevation Requests
Users can submit requests to run applications with elevated privileges and attach files or explanations to justify the need.
Flexible Access Level Management
Configure the duration of elevated privileges: temporary or permanent access to specified applications under full IT department control.
Secure Application Integration
The ringfencing mechanism prevents unauthorized access to other related applications on the network after privileges are granted.
FAQ
Can We Restrict Elevated Application Execution to Specific Users?
How Is Elevation Control Different from Other Privileged Access Management (PAM) Tools?
What exactly gets elevated privileges: the user or the process?
What notifications do users see when Elevation Control is enabled?
Do notifications work in Learning Mode?
How Does Privilege Elevation Work?
Can Temporary (Just-in-Time) Privilege Elevation Be Set?
Is Elevation Management Available via Mobile App?
Is It Necessary to Create Separate Local Administrator Accounts?
Fill out the form to receive a personalized consultation on testing within your IT infrastructure: