Skip to content

AdminByRequest Security FAQ

How is data transferred to the cloud service?

Section titled “How is data transferred to the cloud service?”

Data transfer to the AdminByRequest cloud service is fully explained in our comprehensive documentation. Please also refer to our Service Level Agreement (SLA) in the admin portal for detailed service commitments.

For more information on how Admin By Request meets its compliance obligations and helps your organization do the same, refer to our compliance documentation.


The only people who can see devices in your tenant are the primary login that was first used to register with Admin By Request and the users listed in the portal under Logins > User Logins.

Security FeatureImplementationProtection Level
Unique Installer FilesEach tenant receives uniquely signed installersPrevents cross-tenant device registration
License-Based AccessLicense files apply only to specific tenant installersEnsures strict tenant separation
Platform CoverageSingle license covers Windows, macOS, Linux, and Server clientsConsistent security across all platforms
Real-Time InventoryOnly devices from your tenant appear in your inventoryComplete visibility control
AspectSecurity MechanismBusiness Impact
Data IsolationComplete separation of tenant dataPrevents data leakage between organizations
Access ControlRole-based permissions within tenantGranular control over who can view devices
AuthenticationSecure login credentials per tenantEnsures only authorized access
Audit TrailComplete logging of all access attemptsSecurity monitoring and compliance

Which IP addresses are endpoints communicating with?

Section titled “Which IP addresses are endpoints communicating with?”

Admin By Request uses port 443 and specific IP addresses and URLs that need access through firewalls.

Data LocationIP AddressDNS Endpoints
Europe104.45.17.196api1.adminbyrequest.com
macapi1.adminbyrequest.com
linuxapi1.adminbyrequest.com
USA137.117.73.20api2.adminbyrequest.com
macapi2.adminbyrequest.com
linuxapi2.adminbyrequest.com

If you wish to remotely access endpoints using Unattended Access and Remote Support:

ServicePortEndpoints
MQTT Broker Connectivity8883FastTrackHubEU1.azure-devices.net
FastTrackHubUS1.azure-devices.net
Unattended Access3389RDP needs to be enabled on the device

How do I let users keep full access, but log what they do?

Section titled “How do I let users keep full access, but log what they do?”

Allowing your users to retain full access rights is equivalent to turning off all Admin By Request’s protections.

Important Security Warning: Turning off everything effectively means giving users back their local admin rights. Think about this carefully before doing it.

To turn off everything except logging actions to the Auditlog, follow these steps:

SettingConfigurationResult
AuthorizationTurn On Allow Run As Admin and Turn Off all other togglesUsers can run as admin but other protections disabled
AuthorizationTurn On Allow Admin Sessions and Turn Off all other togglesUsers can have admin sessions but no other restrictions
Access TimeSet Access time (minutes) to a large number covering most of the day (e.g., 480 minutes = 8 hours)Extended admin access duration
LockdownTurn Off Revoke admin rightsUsers maintain their admin privileges

Note: For more information, refer to Windows Settings documentation. You can also check out our video guide for a 10-minute overview on how to accommodate developers or power users.


Data collection practices are fully explained in our comprehensive documentation. Please also refer to our SLA in the admin portal for detailed service commitments.

For more information on how Admin By Request meets its compliance obligations and helps your organization do the same, refer to our compliance documentation.

Data storage practices are fully explained in our comprehensive documentation. Please also refer to our SLA in the admin portal for detailed service commitments.

For more information on how Admin By Request meets its compliance obligations and helps your organization do the same, refer to our compliance documentation.


What regulatory frameworks do you support?

Section titled “What regulatory frameworks do you support?”

Admin By Request can help you comply with a number of regulatory frameworks, including GDPR, ISO 27001, NIST SP 800-53, DORA and NIS2. We continually assess frameworks for compatibility and use their requirements as one of the inputs to our development process.

RegulationAdminByRequest SupportKey Features
GDPRFull compliance supportData protection, audit trails, consent management
ISO 27001Comprehensive controlsSecurity management, risk assessment, continuous monitoring
NIST SP 800-53Complete framework supportFederal security controls, continuous monitoring
DORADigital operational resilienceRisk management, incident response, digital security
NIS2Network and information securityIncident reporting, security measures, risk management

Refer to our compliance documentation for more information.

Yes. For more information on how Admin By Request meets its compliance obligations and helps your organization do the same, refer to our compliance documentation.


Which IP addresses are used to send webhooks?

Section titled “Which IP addresses are used to send webhooks?”

The following IP addresses are used to send webhooks:

Data LocationIP Addresses
Europe104.40.134.41 and 40.91.214.18
USA13.90.244.80 and 40.121.45.3

Which IP addresses are used to send notification emails?

Section titled “Which IP addresses are used to send notification emails?”

All emails are sent from noreply@fasttracksoftware.com. We use Twilio SendGrid to send emails and the dedicated IP address is: 149.72.185.15.


Can Admin By Request help with stolen computers?

Section titled “Can Admin By Request help with stolen computers?”

Yes. AdminByRequest provides several features to assist with stolen computer recovery:

Recovery FeatureImplementationBusiness Value
Location TrackingPublic IP address captured when stolen computer bootsProvides location data for law enforcement
Automatic ReportingInventory data uploaded transparently without user loginImmediate tracking when computer is powered on
IP Address LoggingUpload time and public IP address visible in client viewEvidence for police investigation
ISP InformationPolice can obtain owner details from ISPFacilitates recovery efforts

Process: Once a stolen machine is booted and communicates with the Inventory, the public IP address of the thief’s router becomes available. The endpoint client does not require anyone to log on to a computer to upload data, so when the thief simply turns on the computer, inventory data is sent transparently. You can now see the public IP address and upload time in your client view and give this to the police.


Have you published any CVEs for Admin By Request?

Section titled “Have you published any CVEs for Admin By Request?”

Yes, we have published two CVEs in 2019. These were found by Improsec in September 2019 in the production version 6.1. We notified our customers and released version 6.2 on October 11th 2019 with fixes for these two vulnerabilities.

CVE DetailsDiscoveryResolution
Two CVEs (2019)Found by Improsec in September 2019Fixed in version 6.2 released October 11th 2019
Customer NotificationImmediate notification to all customersProactive security communication
Patch DeploymentAutomatic update deploymentRapid protection for all customers

For more information, refer to our security advisories and vulnerability reports.

Note: We generally have two separate companies run penetration tests before every major release. We also get copies on a monthly basis of clean reports executed secretly by customers.

I’m a Penetration Tester - how do I contact you with findings?

Section titled “I’m a Penetration Tester - how do I contact you with findings?”

Please use our contact details page to report your findings.

Note: The scope of a vulnerability has to be escalation of privileges from a non-administrator user to obtain admin rights.


All collected data associated with the computer is deleted.

Important Note: When a computer is deleted from the Inventory, make sure that its endpoint client software is removed. If the computer is subsequently powered on with a network connection, and the endpoint client is still installed, the computer will show up again and re-upload inventory data.

StepActionResult
Computer DeletionRemove computer from portal inventoryImmediate data removal from portal
Client RemovalUninstall endpoint client softwarePrevents data re-upload
VerificationConfirm computer no longer appears in inventoryComplete data removal confirmed

PracticeImplementationSecurity Benefit
Regular UpdatesKeep client software currentProtection against known vulnerabilities
Network SegmentationRestrict access to required IP addresses onlyReduced attack surface
Audit Log MonitoringRegular review of privileged activitiesEarly threat detection
Access ControlImplement principle of least privilegeMinimized exposure to risks
ComponentRecommendationPurpose
MonitoringReal-time alerting for suspicious activitiesRapid threat detection
DocumentationMaintain current inventory and configuration dataEffective incident response
TestingRegular security testing and validationProactive vulnerability identification
RecoveryBackup and recovery proceduresBusiness continuity assurance

Key Takeaway: AdminByRequest maintains comprehensive security controls including data encryption, tenant isolation, regulatory compliance, and proactive vulnerability management to ensure the highest levels of security and privacy for customer data.


AdminByRequest is designed with security as a foundational principle, implementing multiple layers of protection including data encryption, tenant isolation, comprehensive audit trails, and regulatory compliance support. Our commitment to transparency is demonstrated through regular security assessments, vulnerability disclosure programs, and detailed documentation of our security practices.

The combination of robust technical controls, compliance with major regulatory frameworks, and proactive security management ensures that AdminByRequest provides a secure, reliable platform for endpoint privilege management while maintaining the highest standards of data protection and privacy.