Skip to main content

 

ConnectWise

ScreenConnect Privileged Access quick-start guide

Introduction

ScreenConnect Privileged Access™ gives partners the tools to secure, monitor, and control access across their environment. This solution can handle User Agent Control (UAC) requests, and it also allows an end user to sign into Windows with administrator privileges. Privileged Access is part of the ScreenConnect remote support platform and utilizes its agent for managing endpoints.

Interactive demo

Learn how to get started with this short, interactive demo!

Take a tour of product
 
 

Requirements

Windows only

Currently Privileged Access is only for 64-bit Windows machines that also meet the system requirements of the ScreenConnect client ("access agent").

ScreenConnect Privileged Access extension

The Privileged Access extension is a required component that should be installed on your instance by default. If it isn't, download it from the extension marketplace.

Send a request for administrative privileges via UAC prompt

When a non-administrator user activates a UAC prompt, they'll see a UAC prompt with a new option and a new icon.

Note: By default, the logo here will be the ScreenConnect logo. However, if you’ve replaced your logos, especially ApplicationIconOpaque192, you’ll see your own logo instead.

They should click Request Elevation or Yes to submit an elevation request.

clipboard_e2a7a5408dcff27d0cd58d71af9189a3e.png

Important: If you already have ScreenConnect and have added Privileged Access, this feature only appears on your end users' machines when an administrator or technician connects to them. To turn on this feature for your end users, see our article on configuring end user elevation.

Handling an elevation request

Host page: Handling an elevation request

You can also approve or deny an elevation request from the Host page. When an elevation request is received, the request appears on the Messages tab. The request includes information such as:

  • Program name
  • Publisher name
  • Certificate thumbprint
  • File path
  • File SHA-256
  • User
  • User groups

AccessManagementTabElevationRequest.png

For each elevation prompt, there are three icons in the upper right hand corner of the block. 

  • The first icon shows the raw data of the elevation request.
  • The second creates a new Privileged Access rule for auto approvals, auto elevations, and auto denials of different applications. 
  • The third is an integration with VirusTotal to help determine if a file is malicious.

Run a VirusTotal scan

Click the icon to link to a VirusTotal report. 

CAMVirusTotalMessagesTabHostPage.png

The report will open in a separate tab. Review the report.

CAMVirusTotalScanlight

Approve or deny a request

After reviewing these request details, click Approve or Deny.

https://docs.connectwise.com/@api/deki/files/37728/CamRequestedElevationApproveDeny.png?origin=mt-web

For each requested elevation prompt, there are two icons in the upper right hand corner of the block. 

  • The first creates a new Privileged Access rule for auto approvals, auto elevations, and auto denials of different applications. 
  • The second is an integration with VirusTotal to help determine if a file is malicious.

Note: By default, applications are granted elevated privileges to run as the Windows logged-in user. 

ScreenConnect host client

If you purchased Privileged Access with ScreenConnect remote support software, you can respond to elevation requests while you're connected to a machine.

If you connect to a machine with a UAC request and you have the RespondToElevationRequest permission, you can approve, deny, or dismiss an elevation request yourself by clicking the banner in the ScreenConnect host client.

clipboard_eee11c0b3875fd01099ac2af0a4ffe205.png

Using temporary administrator logon accounts

With this feature, no credentials are needed to use an administrative account. The user can simply request administrative privileges for a temporary logon account.

Request a temporary Windows administrator account

1. Select the ScreenConnect logo on the Windows lock or logon screen 

From the Windows lock screen or logon screen, select the ScreenConnect logo.

Note: By default, the logo here will be the ScreenConnect logo. However, if you’ve replaced your logos, especially ApplicationIcon32, you’ll see your own logo instead.

2. Submit your request

Click the arrow or press the enter key to submit your request.

3. Wait for approval

Once you’ve submitted your request, your administrator will receive your message and approve or deny the request.

CamAdminLogonRequested.png

Handling temporary administrator account requests

From the ScreenConnect host client

If you purchased ScreenConnect, you’re connected to a remote machine, and you have the permissions, you can respond to an administrative logon request yourself by clicking the banner in the host client.

CamAdminLogonSelfApproveDenyDismiss.png

 

From the Host page

On the Host page, you’ll see a new message in the Messages tab that incudes the request for administrator privileges. Click Approve or Deny to handle the request.

CamAdminLogonRequestedApproveDeny.png

Create auto-approve, auto-elevate, and auto-deny rules

For elevation requests, you can create auto-approve, auto-elevate, and auto-deny rules straight from the elevation prompt alert or the elevation request. 

Important: Users must have the Administrator permission in order to create rules.

1. Click the second icon in the upper right hand corner of an Encountered Elevation Prompt block or Requested Elevation block.

CamEncounteredElevationPromptRuleIconHighlighted.png

This opens the Create Privileged Access Rule window.

CamCreateAccessManagementRule.png

2. Select an action

Select an action from the list. 

  • Auto-elevate – Automatically elevate an application without a user request
  • Auto-approve – Automatically approve an elevation request
  • Auto-deny – Automatically deny an elevation request

3. Select conditions for the rule

Click a condition to select it. For a full list of conditions, switch the view from Show Popular Conditions to Show All Conditions

4. Name your rule

Use an automatically-generated name, or switch off the Auto-generate option to type in your own name. 

5. Click Create

Click Create to finish your rule. 

Tip: To edit or delete the rule, navigate to the Administration > Triggers page. 

New default triggers

By default, Privileged Access can send emails whenever an administrative logon request or an elevation request is made. Privileged Access includes two new triggers on the Administration > Triggers page

  • Notify when an administrative logon request is sent
  • Notify when an elevation is sent

These two triggers will send an email to the default "To" address on the Administration > Mail page

Auditing elevation prompts, requests, and responses

From the Audit page, you can view each elevation event and its resulting data.

New session events

New session events are included in the Session Event Filter. Select the Session Event Filter menu and select from these new session events towards the bottom of the menu.

The new session events are:

Session event

Definition

Example data

EncounteredElevationPrompt

An elevation prompt appeared for the user

Data: #command_line="C:\Users\Joe\Desktop\vlc-3.0.17.4-win64.exe" #file_path=C:\Users\Joe\Desktop\vlc-3.0.17.4-win64.exe #file_size=43524776 #file_sha256=fda8cbf2ee876be4eb14d7affca3a0746ef4ae78341dbb589cbdddcf912db85c #signature_valid=true #signature_publisher=VideoLAN #certificate_thumbprint=bcb40c7d23c9db41766c780b5388fb70f3d570bf

 

Process:Guest

 

Address:xxx.xx.xx.xx

RequestedElevation

The user requested elevation

Process: Guest

Address: xx.xxx.xx.xxx

RequestedAdministrativeLogon

The user requested to log in with administrator privileges

Process: Guest

Address: xx.xxx.xx.xxx

ApprovedRequest

A ScreenConnect user with the RespondToElevationRequest or RespondToAdministrativeLogonRequest permissions approved the request.

Host:Cloud Account Administrator

 

Process:Unknown

DeniedRequest

A ScreenConnect user with the RespondToElevationRequest or RespondToAdministrativeLogonRequest permissions denied the request.

Host:Cloud Account Administrator

 

Process:Unknown

AbortedRequest

The user canceled the elevation request.

Process: Guest

Address: xx.xxx.xx.xxx

QueuedCredentialProviderProceed 

Automatically take an action without waiting for an elevation request

 

clipboard_ebd4be25126e7c06509e2f18997fc989f.png

 

Edit Privileged Access settings

To edit Privileged Access settings, navigate to the Administration > Privileged Access page. See our article on the Privileged Access extension for more information, or browse our knowledge base.