Skip to content

Deployment Guide AdminByRequest EPM for Workstations

Deployment Guide: AdminByRequest EPM for Workstations

Section titled “Deployment Guide: AdminByRequest EPM for Workstations”

AdminByRequest (ABR) is an Endpoint Privilege Management (EPM) solution designed to manage and control local administrative rights on user devices, providing secure ways to elevate privileges when necessary. The platform operates through a cloud-based management portal and agents deployed on endpoint devices such as workstations, laptops, and servers.

AdminByRequest supports Windows, macOS, and Linux devices, making it suitable for diverse IT environments. Here’s a step-by-step deployment guide to implement AdminByRequest EPM effectively across your organization.


ComponentFunctionBusiness Value
Cloud-Based Management PortalCentralized administration for settings, policies, and usersSingle pane of glass management
Endpoint AgentsEnforce policies, collect data, handle privilege elevation requestsReal-time security enforcement

The first step is to set up your AdminByRequest tenant:

  • Sign up or access your existing tenant from the AdminByRequest portal
  • Complete the basic configuration of the tenant, ensuring all relevant organization information and settings are updated

This step ensures that your organization is ready to deploy agents and manage devices.

For the AdminByRequest agent to communicate with the portal, ensure that the following URLs are accessible over the required ports:

Admin By Request uses port 443 and the IP addresses and URLs that need access through firewalls are as follows. This is agent-to-portal traffic only and not vice versa.

IP AddressDNS NamesPurpose
104.45.17.196api1.adminbyrequest.comPrimary API endpoint
macapi1.adminbyrequest.commacOS agent communication
linuxapi1.adminbyrequest.comLinux agent communication
IP AddressDNS NamesPurpose
137.117.73.20api2.adminbyrequest.comPrimary API endpoint
macapi2.adminbyrequest.commacOS agent communication
linuxapi2.adminbyrequest.comLinux agent communication

Step 2: Connecting AdminByRequest to Entra ID (Azure AD)

Section titled “Step 2: Connecting AdminByRequest to Entra ID (Azure AD)”

To integrate AdminByRequest with your user directory:

  • Navigate to the Settings in AdminByRequest and select Connect to Entra ID (Azure AD)
  • Follow the prompts and grant AdminByRequest the necessary permissions to manage access users, groups and devices through your Azure AD (Entra ID) tenant

This integration allows for:

FeatureCapabilityBusiness Impact
Single Sign-On (SSO)Seamless authentication for admin usersImproved user experience
Group-Based PoliciesSelect groups from Entra ID for policy assignmentGranular access control

Step 3: Adjust Global Settings to Retain Admin Rights Initially

Section titled “Step 3: Adjust Global Settings to Retain Admin Rights Initially”

Initially, it’s important to disable the automatic revocation of admin rights to gather data before restricting access:

  • Go to the Global Settings tab and disable the Revoke Admin Rights setting

This gives users temporary admin rights while the system collects data about elevated processes and applications.


There are two primary methods for deploying the AdminByRequest agents:

StepActionConsideration
Download AgentGet agent from AdminByRequest portalEnsure correct platform version
InstallationRun installer manually or via scriptSuitable for small environments
StepActionAdvantage
Create App PackageSet up in MDM solution (e.g., Intune)Automated deployment
Assign to GroupsTarget specific device groupsScalable management

Ideal for: Large organizations with established MDM infrastructure


After deploying agents, it is recommended to wait a week to collect data on the software and processes that users elevate on their devices:

  • AdminByRequest will log all elevation requests, providing insights into which applications are elevated most frequently

This information is critical for building your pre-approved apps list in the next step.


Once you’ve gathered data on elevated applications, it’s time to configure your pre-approved apps list:

  • Navigate to the Admin Portal and review the logs for common applications users elevate
  • Begin creating a pre-approved list, which ensures that users can elevate specific applications without needing approval
MethodUse CaseSecurity Level
Certificate-BasedAllow any version of software signed with trusted certificateMedium security, flexible
Checksum-BasedAllow specific application versions based on checksumHigh security, precise control
Location-BasedApprove apps from specific local or remote locationsNetwork-based security
Forced ElevationLegacy apps without UAC supportCompatibility solution
  • Global Settings: Apps required for all users
  • Sub-Settings: Apps required for specific groups
  • Inheritance: Global pre-approved apps are available in sub-settings

Step 7: Configuring Tray Tools (Control Panel Applets)

Section titled “Step 7: Configuring Tray Tools (Control Panel Applets)”

AdminByRequest allows you to add tray tools, which are small applets accessible from the AdminByRequest agent icon in the user’s taskbar:

  • Add Control Panel applets like Network Settings or other useful system tools

These tray tools provide users with quick access to essential settings without requiring admin rights.


After building the pre-approved apps list, it’s time to gradually revoke admin rights:

  • Go back to Global Settings and enable the Revoke Admin Rights option
  • Start with small user groups and gradually expand as you refine the settings based on user feedback

It’s essential to monitor user behavior closely during this phase to ensure they can perform necessary tasks without unnecessary disruptions.


AdminByRequest supports sub-settings based on groups, offering more granular control over specific user groups or devices:

Group TypeSourceUse Case
Local AD GroupsOn-premises Active DirectoryTraditional environments
Entra ID GroupsAzure Active DirectoryCloud-first organizations
Device GroupsMDM or device collectionsDevice-specific policies
Organizational UnitsActive Directory OUsHierarchical management
  • Global Settings: Apply to all devices
  • Sub-Settings: Override global policies for specific groups
  • Workgroup Devices: Automatically follow Global Settings

Step 10: Handling Feedback and Adjustments

Section titled “Step 10: Handling Feedback and Adjustments”

During the admin rights revocation process, some users may encounter User Account Control (UAC) prompts or be unable to perform certain tasks:

  • Adjust your pre-approved apps list or policies as needed
  • Continue gathering feedback from users to refine settings

Helpdesk teams require greater flexibility to support users, so you should configure a separate policy for them:

  • Allow helpdesk employees to elevate any application after approval, but ensure that an approval workflow is in place

This ensures that helpdesk teams can efficiently resolve issues without security risks.


Step 12: Using the Admin Rights Report and Break-Glass Feature

Section titled “Step 12: Using the Admin Rights Report and Break-Glass Feature”

AdminByRequest provides an Admin Rights Report to identify any remaining users with local admin privileges:

  • Review the report and ensure all local admin accounts are removed
  • Use the break-glass feature to allow emergency admin access when necessary, without permanently restoring admin rights

Helpdesk teams can use the AdminByRequest mobile app to approve ad-hoc elevation requests on the go:

  • Ensure the app is installed and configured for your helpdesk team, allowing them to approve requests quickly from anywhere

Step 14: Connecting to a Ticketing System or Communication Tools

Section titled “Step 14: Connecting to a Ticketing System or Communication Tools”

AdminByRequest integrates with ticketing systems or communication platforms like Slack and Teams:

  • Configure the platform to send elevation requests and approval workflows directly to your preferred ticketing or communication system

This ensures that requests are logged and responded to efficiently within your existing workflows.


For better security monitoring and incident response, integrate AdminByRequest with your organization’s SIEM solution:

SIEM PlatformIntegration BenefitUse Case
Microsoft SentinelNative Microsoft integrationOrganizations using Microsoft stack
SplunkCustom log parsingEnterprise security operations
QRadarIBM security ecosystem integrationEnterprise environments

These platforms can receive logs from AdminByRequest, providing real-time insights into elevated privilege activities and potential security threats.


The EPM platform has two methods of elevation:

MethodDescriptionRecommended Use
Run-As-AdminSingle process elevationEnd users with approval workflow
Admin-SessionFull admin rights on deviceHelpdesk team only

Best Practice: Use Run-As-Admin for end users with proper approval mechanisms. Admin-Session should be restricted to helpdesk personnel since you can already pre-approve anything users need.


By following this comprehensive guide, you will ensure a smooth and secure deployment of AdminByRequest EPM across your organization, providing:

BenefitOutcomeBusiness Value
Tailored Privilege ManagementGranular control based on roles and needsReduced security risk
Minimal User DisruptionPre-approved applications and smooth workflowsImproved productivity
Strong Security PracticesComprehensive audit trails and approval workflowsEnhanced compliance

Key Takeaway: A phased approach to AdminByRequest deployment ensures successful privilege management while maintaining user productivity and security standards.