Update: Microsoft has moved this feature from Public Preview to General Availability, I’ll update this post (or write a new post) as soon as there are some new features or significant changes introduced.
I vividly recall when this feature was first announced because I had the *privilege* to attend Microsoft Ignite in Seattle last year when it was first introduced. Now that the public preview has been released, we finally have the opportunity to play around with Endpoint Privilege Management ourselves!
For a long time, we were forced to choose between local admin or standard user permissions. Granting users local admin rights poses a significant security risk, especially with the rising threat of cyber attacks. On the other hand, assigning standard user permissions results in productivity loss for both end-users and IT personnel due to the countless requests to install or update applications.
Thankfully, Endpoint Privilege Management (EPM) provides a solution to this dilemma. EPM allows us to assign standard user permissions while creating specific rules for applications/files that are permitted to run with administrative privileges. I am happy to share my initial experience with this new feature.
This blog includes the following sections;
During the public preview, no license is required for this feature. However, once the preview period ends, an add-on license will be necessary to use the feature. Unfortunately, this license is not covered in the Microsoft 365 E5 suite. To try out this feature, a 90-day trial with 250 user licenses is available in the billing section of the Microsoft 365 Admin Center.
The feature has specific operating system requirements, which are as follows:
In addition to the operating system requirements, there are also specific device and user requirements;
First, we need to activate the EPM feature in the Microsoft Intune Admin center.
After that we should enable EPM for our devices by creating an elevation settings policy.
After naming our policy, we can configure the following settings;
Because I want to enable EPM and send data to Microsoft for EPM reports, while also denying all requests, I will leave the policy on its default settings.
Before we can configure elevation rules, we need to obtain the file hash from the file/application that we will be setting rules for.
| Get-FileHash C:\Windows\System32\WindowsPowerShell\v1.0\PowerShell_ISE.exe | Format-List |
Now lets create the EPM elevation rules, for now I want to configure the following two rules;
After naming our policy, let’s move on to configuring the rules.
Now lets create our second rule.
Now, lets take a look at the user experience. First let me show you how an user can try to run files with elevated access.
Right click any file and click on the Run with elevated access option.
Because we didn’t include the Command Prompt application in our policy, it did not work.
If we try to run the Google Chrome setup with elevated access, we are required to enter a business justification. After clicking continue, the installation successfully starts.
If we do the same for the PowerShell ISE application, as excepted this starts without any interruptions.
While the Endpoint Privilege Management feature is still missing some features, I believe it is a great start. During Microsoft Ignite last year, we were shown how elevation on admin approval could be configured in the future. As you can see in the picture below, this is something we can look forward too.
It’s a shame that the Endpoint Privilege Management feature is only available in the new Microsoft Intune Suite add-on license. Personally, I think it should be included in the Microsoft 365 E5 license, or at least released as a standalone add-on. The EPM feature can provide significant benefits to organizations of all sizes.
EDIT: Within a month Microsoft has brought this feature into general availability and also they listened to user feedback because they introduced a standalone license for EPM!
What do you think of the new Endpoint Privilege Management feature? Let me know in the comments.
Your email address will not be published. Required fields are marked *
0 Comments