Concept
When End Users have permissions to install applications and modify system settings on Local Machines (Local Administrator), and you want to implement the CyberQP End User Elevation, the Audit Mode capability will allow you to capture the existing actions that an End User may perform, that required those additional Elevated Permissions, without interfering with their operations. You can then use the Audit Mode to build Elevation Policy rules, which will allow you to easily transition the End Users away from permanently having Administrator level permissions on the system. You can also use this process to build Elevation Policies for Customers that use similar programs or applications, or need access to change system configurations.
Intent
This KB Article is designed to provide Best Practice guidance for implementation of End User Elevation Audit and then transitioning the End Users away from those permissions.
Recommended Phases
-
Initial Collection Phase (Week 1–2)
Enable Audit Mode to begin capturing elevation events without disrupting users. -
Monitor Activity & Identify Patterns (Week 1–2)
Review captured events to understand which actions require elevated permissions. -
Build Elevation Policies (Week 2+)
Convert audit data into reusable Policy Rules tailored to users, roles, and applications. -
Prepare Customers for Elevation Rollout (Week 2+)
Communicate upcoming changes with customers and prepare End Users for new workflows. -
Remove Admin Permissions for Sample Users (Week 3+)
Start enforcing Elevation Policies for a small group and validate user experience. -
Expand Policy Enforcement (Ongoing)
Apply refined Policies to broader user groups and additional customers. -
Complete Audit Mode Transition
Move all users to managed elevation, disable Audit Mode, and remove admin rights. -
Continuous Monitoring & Improvement
Regularly update Policies as applications evolve and new elevation needs arise.
Initial Collection Phase (1-2 weeks)
Enabling End User Elevation Audit Mode
- Start with selecting a few Customers that currently have over provisioned permissions for End Users to run as Administrators on their systems.
- Focus on Customers that have both common and unique needs. This will give you a full picture of the types of actions that your Customers need the elevated credentials for.
- Review the Audit Mode Enable and Configuration KB.
-
Enable Audit Mode for the selected Customer(s) you chose.
- Ensure to deploy the Agent to the Workstations/Servers where the End Users have Administrator Permissions enabled.
- Ensure that the End Users are imported from Active Directory or M365/Azure/Entra
Note: Enabling Audit Mode will not disrupt any workflows. It runs silently in the background and captures privileged actions without affecting the user experience.
Learn more about how CyberQP captures audit events: https://support.getquickpass.com/hc/en-us/articles/33205685514391-How-CyberQP-Captures-Privileged-Events-in-Audit-Mode-for-End-user-Elevation
Monitor Activity
- Allow 1 to 2 weeks for collection of the Audit Mode events. Monitoring activity during this period of collection is advised, to fully understand the processes and actions that you may want to build Policy Rules for.
-
Using the Audit Event page:
https://admin.getquickpass.com/elevation/elevation-eventsYou can begin to see what types of activity your Customer's End Users are performing that require elevation.
- You can see common Programs, Publishers, and Matching Elevation Policies for the actions performed, as well as patterns for which End Users are using elevated permissions.
Begin Building Elevation Policies (Week 2 onwards)
Once you begin to see trends for usage at your Customers, you can begin building policies for these actions. You can transform an existing Audit Event to a Policy, manually create a Policy that would apply, or determine that specific actions are NOT desired to allow End Users to perform.
Converting an Audit Event to an Elevation Policy Rule
- The process for this is identical to creating an Elevation Policy from Elevation Requests.
- Create a Policy
- Expand Elevation on the Main Dashboard page
- Click Policies
- Click New Policy in the upper right corner.
- Give it a name and description that is applicable - see some suggestions below:
- Customer Name - use this to build Policy Rules that will apply to a specific Customer
- Common Applications - use this to build Policy Rules that will apply to multiple Customers that use similar applications or require access to similar administrative functions.
- Specific Application - use this to build Policy Rules for specific applications. (ex Quickbooks, Solidworks, AutoCAD)
- Job Function/Role - use this to build Policy Rules based upon Customer's Employee Job Function (ex Developer, Reception, Co-Managed Support, Executives/ C-Suite)
- Depending on the use case, set the Audience Scope as desired.
- Target Select Customers - use this for Customer specific, or generic policies that would apply to multiple customers.
- Target Select End-Users - use this for End User specific policies (ex End Users that use the application, Co-Managed Admins, Users that have specific permission to help others)
- Save the Policy as a Draft (you can only alter the Policy to be "Live/Active" once a rule has been applied)
- Find the Audit Events page and then click on the Audit Event Row that you wish to turn into an Elevation Policy Rule
- Above the Details section on the right side is a "Create Rule" button.
- Give the Rule a name (ex. Application name, or Action name)
- Using the Rule Conditions, modify the populated boxes to remove any restrictions you don't want to enforce for the Policy (remember MORE boxes populated equals MORE restrictive, less boxes populated equals more broad)
Ex.- Publisher - allow all applications from a specific software vendor (NOT recommended because names can be spoofed - especially if you use WildCard values here)
- Publisher, Certificate Hash - allow all specific application versions from a specific software vendor.
- Publisher, Certificate Hash, File Hash - allows only a specific application to be installed
- Publisher, Certificate Hash, File Hash, Program Path - allows only a specific application from a specific path/folder to be installed.
- Determine the Scope of the Elevation
- User-scoped - Grants the process administrative privileges within the user's context. This is the recommended setting for most applications and processes. It allows the application to perform administrative tasks but does not grant full system-level control.
- System-scoped - Grants the process the higher level of privileges, allowing it to interact with operating system and make local system changes. Use this option only when necessary, as it grants significant power and should be reserved for specific scenarios where user context is not required (e.g. installing system drivers, modifying critical system settings such as date, firewall rules etc)
- Click Continue
- You will be shown the list of Policies that are currently added to your Policy List.
- Select the Policy you wish to have the Rule added to.
- Click Add and Save
- Repeat the process for each Application or Administrative Action that have been recorded in the Audit mode, that you would WANT to allow the End Users to perform.
Manually Creating a Policy Rule
This process is detailed here.
Creating an Elevation Auto-Approval Policy
Preparing Customers for Elevation Policies
In this phase, you will want to start informing your Customer's End Users about how their permissions will change.
It is suggested to start with a small group of End Users or Applications (if assigning to multiple customers) to ensure potential impact is minimized and easily mitigated.
Explain that you will be removing their existing Local Administrator permissions, and that the Elevation Policy should handle future execution of the application or elevated permission. Explain what the screen will look like if the policy does not apply (ex applications that are not yet converted to Rules, or applications that didn't get caught by the Audit Mode), and how they can submit a request for manual approval (see this KB for instructions).
Remove Admin Permissions for a Sample Customer (Week 3+)
Begin with a small subset of your Customer's End Users (leaving some users with Administrative Permissions still).
- Save the Policy you have Created and added Rules to as "Active"
- Expand Elevation on the Main Dashboard page
- Click Policies
- Find the Policy(ies) you used to convert a Audit Entry to a Policy Rule
- Click the Pencil Icon to Edit the Policy
- Modify the Audience Scope (if that was not initially defined or if you need to change it) - you may have discovered that certain Policies are going to apply to multiple Customers, or you may have discovered that an application should only be applied to specific End Users.
- Click SAVE -> Save & Publish
- Switch the Elevation Settings for the Customer(s) you now want to start enforcing Elevation for.
- Settings -> Elevations -> Manage Access.
- Find the Customer(s) you are ready to start using the Policies for.
- Bulk select check boxes and then Edit Elevation Mode from the Header Bar
- Select the Pencil icon on the far right side of the individual Customer
- Change to Enabled and save.
- Remove Administrator permissions from the End User system
- NOTE: CyberQP Agent Permissions Remediation will soon be released (as of July 1, 2025) to assist you with this.
- Modify the GPO or Intune Policy, or Local Security Groups to remove the Admin permissions for the End User(s) you want to do the initial set of Policy testing with.
- Have the End Users perform their daily tasks.
- The Enabled/Active Policy should elevate permissions for actions/applications that require Administrative permissions.
- Have the End User submit Elevation requests for any actions/applications that they are now seeing the UAC Prompt for.
- Use those additional Elevation requests to fine-tune the Policy Rules
- Perhaps the Elevation Policy rules were too restrictive - compare the difference between the request and the policy to find any values from the Policy that need to be adjusted (ex Version number, folder path, etc.)
- Verify that the Policy Rule file name, folder path, etc. match the existing policy and update or add additional Policy Rules to match the experienced behaviour.
- Build new Policy Rules from any previously uncaptured Elevation requests:
https://support.getquickpass.com/hc/en-us/articles/31075585709847-Create-a-Rule-from-an-Elevation-Request-and-Add-to-a-Policy
- Use those additional Elevation requests to fine-tune the Policy Rules
-
Once you have very few Elevation Requests, that should be handled by the Elevation Policy Rules, expand the scope to additional End Users at the same customer and/or additional customers.
Completing the Audit Mode
Once a comprehensive list of Policy(ies) and Rules have been created, to manage the majority of cases where Elevated Permissions are required, you can expand the scope of the implementation to additional customers or End Users.
- Change the Customer Elevation Mode to Active for any customer that was previously in Audit Mode.
- Change the Policy(ies) you have created to Active when you have added rules that cover the majority of cases.
- Remove Admin permissions for End Users on Local Workstations and Servers
- Ensure the End Users know how to submit new Elevation Requests and continue to improve/modify/create Policy rules to handle new cases.
Continued Monitoring and Improvement
Continued Monitoring of patterns for Elevation Requests is important. Making the transition from having Administrator permissions, to using Elevation to handle those cases is an ongoing process. New applications may be implemented by your customers. Changes to Vendor or Software, or even something as simple as an updated digital signature can require updates to the Policy Rules.
Communication between team members/technicians will be integral to finding usage patterns that may indicate that a Policy needs to be updated. Empowering your team to determine what existing policies are working, which are not (and need refinement), and even cases where Elevation should NOT be automatically approved will help ensure the long term success of the Elevation solution.
Ensuring Continued Success with Elevation
To Ensure continued success with the effort to remove Administrative permissions from your Customer's End Users and use the CyberQP Elevation solution, please remember these key points.
Communication
- Communicate with your Customer's End Users frequently to determine if the steps taken are having the desired results.
- What are the goals for the customer?
- Are those Goals being met?
- Can additional training be provided to minimize support requests after Administrative Permissions are removed?
- Communicate with your Team to ensure that you are covering the desired use cases, and keeping your customer as secure as possible.
- Establish clear processes for both your team and your Customers:
- How do you handle new Elevation requests?
- How does your Customer's End User ensure their Elevation Requests are handled quickly?
- Should repeated requests be converted to Policy Rules to minimize requests?
Time
- Don't rush the Audit mode for Customers that you are implementing this for.
- Allowing the Audit mode to monitor for a sufficient period of time will give you more details on what Elevation will be most effective for.
- Enabling Audit mode for multiple customers will ensure you are getting a broad measurement of applications and processes that require additional permissions. You can use these findings for multiple customers and Policy Rules.
- Removing permissions for small groups of End Users at your Customer, at a time, will reduce frustration (if you missed a use case).
- Grow the list of End Users that no longer have Administrative permissions, in different divisions/departments of your Customer slowly.
Comments
0 comments
Please sign in to leave a comment.