Getting started with AdminByRequest is straightforward and designed to get you up and running quickly. Follow these simple steps to begin your journey toward enhanced security and streamlined privilege management.
| Action | Details | Benefits |
|---|
| Visit Registration Page | Navigate to the AdminByRequest web page | Access to sign-up form |
| Create Free Account | Register for free plan (up to 25 endpoint devices and 10 server licenses) | No-cost evaluation with substantial capacity |
| Receive Credentials | Login credentials emailed to your registered address | Secure access to Admin Portal |
Ideal for: Organizations wanting to evaluate AdminByRequest capabilities without initial investment.
| Feature | Included in Free Plan | Value |
|---|
| Endpoint Devices | Up to 25 devices | Sufficient for small teams or pilot programs |
| Server Licenses | Up to 10 servers | Covers typical server infrastructure needs |
| Full Feature Access | Complete AdminByRequest functionality | Comprehensive evaluation capabilities |
| Support Access | Community support and documentation | Assistance during evaluation period |
| Step | Action | Expected Result |
|---|
| Navigate to Portal | Use the Login button at the top of the website | Access to secure login page |
| Enter Credentials | Use the login credentials received via email | Successful authentication |
| Dashboard Access | View main Admin Portal interface | Ready to configure and manage endpoints |
Portal Capabilities:
- Central management interface
- Real-time endpoint monitoring
- Policy configuration and management
- Audit log access and reporting
- User and group management
| Platform | Download File | Installation Method |
|---|
| Windows | .msi file | Standard Windows installer |
| macOS | .pkg file | macOS package installer |
| Linux | Package or script | Distribution-specific installation |
| Step | Action | Notes |
|---|
| Download Client | Select appropriate file for target operating system | Ensure correct platform selection |
| Deploy to Endpoints | Install on computer endpoints | Can be deployed manually or via management tools |
| Verify Installation | Confirm client appears in portal inventory | Successful connection to AdminByRequest services |
Deployment Options:
- Manual installation on individual devices
- Group Policy deployment for Windows environments
- MDM deployment for managed mobile devices
- Script-based deployment for automated rollout
Once logged in, you can adjust settings to customize AdminByRequest for your organization’s needs.
| Configuration Area | Settings to Consider | Impact |
|---|
| Authorization Settings | Configure privilege elevation policies | Controls how users can request admin access |
| Approval Workflows | Set up approval chains and notifications | Determines who can approve requests |
| Application Control | Create whitelists of approved applications | Streamlines access for commonly used software |
| Security Policies | Configure MFA, session timeouts, and recording | Enhances security and compliance |
| Feature | Function | Business Value |
|---|
| Audit Log | View complete history of all privileged activities | Compliance reporting and security monitoring |
| Inventory Management | Monitor all connected endpoints and their status | Real-time visibility into your environment |
| User Management | Configure user access and permissions | Granular control over who can perform actions |
| Mobile App | Access AdminByRequest from mobile devices | Management on-the-go for IT administrators |
| Test Area | Validation Step | Success Criteria |
|---|
| Client Connectivity | Verify endpoints appear in inventory | All deployed devices visible and reporting status |
| Privilege Elevation | Test user request for admin privileges | Request workflow functions correctly |
| Approval Process | Test admin approval of user requests | Approval notifications and logging work properly |
| Application Installation | Test installation of approved software | Users can install approved applications without full admin rights |
| Training Topic | Key Points | Delivery Method |
|---|
| Request Process | How to request privilege elevation | Documentation and short video tutorials |
| Approval Workflow | Understanding approval timelines | Email notifications and portal guidance |
| Security Best Practices | Proper use of elevated privileges | Security awareness training |
| Policy Type | Configuration Options | Business Impact |
|---|
| Time-Based Access | Set specific hours for privilege elevation | Enhanced security during off-hours |
| Role-Based Access | Different policies for different user groups | Tailored access based on job requirements |
| Emergency Access | Break Glass scenarios for critical situations | Ensures business continuity during emergencies |
| Integration Type | Supported Systems | Benefits |
|---|
| SSO Integration | Azure AD, Okta, other identity providers | Streamlined user authentication |
| SIEM Integration | Microsoft Sentinel, Splunk, other security platforms | Centralized security monitoring |
| Ticketing Systems | ServiceNow, Jira, other ITSM platforms | Automated workflow integration |
| Resource Type | Access Method | Content |
|---|
| Documentation | Admin Portal and website | Comprehensive guides and API documentation |
| Mobile App | App Store and Google Play | Mobile management capabilities |
| Community Support | Online forums and knowledge base | Peer support and best practices |
| Professional Support | Paid plans include dedicated support | Expert assistance for complex issues |
| Support Channel | When to Use | Response Time |
|---|
| Knowledge Base | Self-service troubleshooting | Immediate |
| Community Forums | General questions and best practices | Community-driven |
| Email Support | Technical issues and account questions | Typically within 24 hours |
| Priority Support | Critical issues (paid plans) | Expedited response times |
| Phase | Focus Area | Activities |
|---|
| Pilot Phase | Small group testing | Validate configuration and gather feedback |
| Department Rollout | Expand to specific departments | Refine policies based on real-world usage |
| Organization-Wide | Full deployment across all endpoints | Complete security coverage |
| Optimization | Continuous improvement | Monitor usage and optimize policies |
| Metric | Target | Measurement Method |
|---|
| User Adoption | >90% of target users active | Portal login statistics |
| Security Improvement | Reduced standing admin rights | Audit log analysis |
| Helpdesk Efficiency | Reduced admin-related tickets | Support ticket system reports |
| User Satisfaction | Positive user feedback | Surveys and feedback mechanisms |
Key Takeaway: Getting started with AdminByRequest is designed to be straightforward and immediate, with a free plan that provides substantial capacity for evaluation and initial deployment, ensuring organizations can quickly realize the benefits of enhanced privilege management.
Starting with AdminByRequest is designed to be a seamless experience that quickly delivers value to your organization. The free plan provides generous capacity for evaluation, while the comprehensive portal interface offers powerful configuration and monitoring capabilities.
By following the simple registration, installation, and configuration steps outlined above, you can be up and running with AdminByRequest in minimal time, immediately improving your security posture while maintaining user productivity. The combination of flexible deployment options, robust configuration capabilities, and extensive support resources ensures that organizations of any size can successfully implement and benefit from AdminByRequest’s privilege management solution.