Providing Permission to Install/Remove Software to RMM End Users

Providing Permission to Install/Remove Software to RMM End Users

Overview

The purpose of this article is to specify our policies regarding giving RMM end users the ability to perform actions on their workstation that may cause corruption or security breaches. The two main areas of concern are: 

  1. Allowing customers to install, remove or run software that requires admin access
  2. Providing admin passwords to end users

Policies

Admin Passwords

Generally we do not provide admin passwords to users. We can send the Security Authorization account contact the credentials once onboarding is close to completion. 

Verbiage to use is here

Running and Installing Software that Requires Admin Access  


Windows
We use AutoElevate to approve software changes and installations on Windows RMM computers. If a user wants to install or run software that we believe can cause damage to the machine or to the network, the Security Authorization contact must approve in writing (via email to a team member's inbox or to a ticket as a customer note).  

Whenever possible, reach out to the appropriate customer contact via the ticket generated by Auto-Elevate. (If necessary, add the Security Authorization contact to the AE ticket.) 

Macs
For Macs, we use AdminByRequest to approve temporary admin sessions on the machine. 


Verbiage to use is here.

Procedure for Exceptions

Because we can temporarily give our permissions via the utilities above (which are installed on every RMM machine), users should never need admin access to their workstations. For any exception, the customer's Security Authorization contact must approve the exception and accept responsibility for any malware, hacking or other security breaches that (in our judgement) result. 
Please document any exceptions by either of the following methods:
1. Upload the email to the customer's IT Glue site summary flexible asset and document the exception in the appropriate site summary field(s).
2. Enter the ticket number on which the customer note appears in the customer's IT Glue site summary flexible asset and document the exception in the appropriate site summary field(s).

    • Related Articles

    • Remove Contact (User) for RMM Customer

      Use ticket category: Administrative Change/Request. Confirm the ticket contact field is populated Choose ticket template "[Current Customer] Remove Contact/User for Current RMM Customer" Save. Saving the ticket with this template causes an email to ...
    • Verbiage for RMM Customers About Providing Passwords or other Admin Permissions

      This is verbiage to use for RMM customers about providing passwords or permission to run software requiring admin access to end users.    Use all or part of this. Proofread before sending:   Password Access  We have a secure encrypted storage space ...
    • Response to Privacy Concerns About Our Software on User and Company Devices

      Items in red may require editing.  ScreenConnect Privacy Concerns The software called ScreenConnect was downloaded onto laptops only, enabling GGIT technical support direct access to laptops when needed for updates or troubleshooting.  This software ...
    • Customer is Demanding on End User support but is not a help desk customer

      I scheduled your appointment for today as a courtesy; however, I'd like to remind you that this accommodation is an exception. Generally, we can’t accommodate end user support on such short notice. Your current RMM agreement does not guarantee a ...
    • User-Requested Software Installations

      All software installed on RMM machines must be listed in either the customer's install checklist in AT, or in the Site Summary asset in ITG under the field "Applications that can be Installed and Updated without Authorization Contact Approval." If ...