Avecto has announced the availability of Privilege Guard 3.8, the latest version of its award-winning solution.
Privilege Guard 3.8 introduces a number of industry firsts into the privilege management arena, including remote PowerShell control, which provides system administrators with flexible and secure management over remote desktops and servers. Other additions include granular control over Windows services, enabling a system administrator or power user to stop and start specific services, while preventing unauthorized interaction with other services.
“With Privilege Guard 3.8 we have continued to address the need for a comprehensive privilege management solution for desktops, while also appealing to the growing demand for more granular control over privileged access to servers in the datacenter,” said Mark Austin, co-founder and CEO of Avecto. “Privilege management is fast becoming the foundation of a defense-in-depth security strategy for both desktops and servers, as it promotes the best practice of least privilege. All of the new features in 3.8 are built on Privilege Guard’s flexible policy framework, rich end user experience and extensive reporting capabilities that have firmly established it as the market leading privilege management solution.”
Key New Features:
* Remote PowerShell Control for System Administrators – Enables privileges to be applied directly to PowerShell scripts and commands on remote computers, ensuring that system administrators can be restricted to running only authorized remote administration tasks.
* Granular Control over Windows Services – Provides precise control over Windows services, enabling both system administrators and power users to stop and start individual services.
* Policy Automation API – Provides trusted administrators with the ability to automate the creation or update of policies through PowerShell, enabling integration with existing management systems, such as help desks and operations management.
* Message Notifications for End Users – Enables discreet notifications to be displayed to users, for information purposes, where it isn’t necessary to seek consent before running or elevating an application.
* Software Uninstall Support – Enables users to automatically uninstall software that they were approved to install, without requiring specific policies to be defined for uninstallation.
* Drive Rule for Applications – Allows the targeting of applications based on the drive type from where they are executed, such as local fixed disks, network drives and removable media.