Logo
Sign in
Product Logo
Elevation ControlThreatLocker

ThreatLocker Elevation Control is an endpoint privilege management tool that allows administrators to revoke local admin rights while granting specific applications elevated privileges. This ensures secure and efficient operations by controlling application access without giving users admin credentials.

641c3e25e46dfd9b1003f180_Artboard 1-p-500.png
Product details

Endpoint privilege management with Elevation Control

ThreatLocker® Elevation Control is an endpoint privilege management tool that enables system administrators to revoke local administrator rights from their users and execute specific applications with elevated privileges.

What is Elevation Control?

Elevation Control is a policy-based endpoint privilege management solution that assists organizations in being secure but still efficient in their operations. Instead of granting users access to administrator logins, policies can be created to automatically grant higher privileges to applications. This allows the applications to access the necessary resources without giving users these desired credentials. Elevation Control puts IT administrators in the driving seat, enabling them to control what applications can run as a local admin without giving users local admin rights.

How does it work?

When ThreatLocker is first deployed, all existing applications are learned. Administrators can review the applications, select which applications need privileged access, and set policies to grant elevated access. Once endpoint privilege management (EPM) is enabled on an application, users can run that same application as a local administrator without entering credentials. Elevation Control integrates with our application control modules. If an application is not currently allowed, the end user can request to run the software, and administrators can approve it, applying elevation simultaneously. For applications that require elevation only to install or update, create time-based policies that will remove elevated rights once the time expires, allowing the application to run with regular privileges.

The ThreatLocker® difference

Traditional Endpoint Privilege Management tools often focus on managing user privileges and roles. ThreatLocker Elevation Control is application-centric, allowing administrators to define and control precisely which applications can run with elevated privileges. This approach provides finer control over the execution of applications, reducing the attack surface. Restricting applications to run with elevated privileges only when necessary helps to shore up cybersecurity efforts, while traditional EPM tools may require users to go through complex authentication processes, leading to operational friction.   ThreatLocker endpoint privilege management solution is designed to provide a user-friendly experience. Authorized users can run applications with elevated privileges seamlessly without the need to enter credentials repeatedly.

Find more products by segment
EnterpriseB2BView all
Find more products by category
Security SoftwareView all