DocumentationAPI ReferenceRelease Notes
Log In
Documentation

Quickstart templates

What is a QuickStart template?

A QuickStart template is a preconfigured policy template you customize to your organization's requirements,

How are QuickStart templates useful?

The QuickStart policy is designed from BeyondTrust’s experiences of implementing the solution across thousands of customers, and is intended to balance security with user freedom. These templates are preconfigured with Workstyles, application groups, messages, and custom tokens (configured with Endpoint Privilege Management and Application Control).

When creating a new policy, there are three QuickStart templates to choose from:

  • QuickStart For Windows
  • QuickStart For Mac
  • Server Roles

As every environment is different, we recommend you thoroughly test this configuration to ensure it complies with the requirements of your organization.

Preconfigured options in QuickStart templates

QuickStart template for Windows and macOS

These QuickStart templates contain Workstyles, application groups, and messages for Windows and macOS policies.

Workstyles
NameDescription
All UsersContains rules that apply to all standard users regardless of the level of flexibility they need:
  • Block any applications in the Block - Blocklisted Apps group.
  • Allow Endpoint Privilege Management Support tools.
  • Allow standard Windows functions, business applications, and applications installed through trusted deployment tools to run with admin rights (Windows QuickStart template).
  • Allow standard macOS functions, business applications, and applications installed through trusted deployment tools to run with admin rights (Mac QuickStart template).
  • Allow approved standard user applications to run passively.
High FlexibilityContains rules for users that require a lot of flexibility, such as software developers:
  • Allow known business applications and operating system functions to run.
  • Allow users to run signed applications with admin rights.
  • Allow users to run unknown applications with admin rights once they confirm that the application should be elevated.
  • Allow applications that are in the Add Admin – High Flexibility group to run with admin rights.
  • Allow unknown business application and operating system functions to run on-demand.
Medium FlexibilityContains rules for users that require some flexibility, such as sales engineers:
  • Allow known business applications and operating system functions to run.
  • Allow users to run signed applications with admin rights once they confirm that the application must be elevated.
  • Prompt users to provide a reason before they can run unknown applications with admin rights.
  • Allow applications that are in the Add Admin – Medium Flexibility group to run with admin rights.
  • Allow unknown business application and operating system functions to run on-demand.
  • Restricted OS functions that require admin rights are prevented and require support interaction.
Low FlexibilityContains rules for users that don't require much flexibility, such as helpdesk operators:
  • Prompt users to contact support if a trusted or untrusted application requests admin rights.
  • Prompt users to contact support if an unknown application tries to run.
  • Allow known approved business applications and operating system functions to run (Windows only).
AdministratorsProvides visibility on the Administrator accounts in use.
Contains general rules to:
  • Capture user and host information.
  • Block users from modifying local privileged group memberships.
SYSTEMProtects the Restricted System Functions application group against potentially malicious behaviour by a user who can perform elevated PowerShell commands.
Application Groups

Application Groups prefixed with (Default) or (Recommended) are hidden by default and do not need to be altered.

NameDescription
Add Admin - General (Business Apps) (Windows)
Authorize - All Users (Business Apps) (macOS)
Contains applications that are approved for elevation for all users, regardless of their flexibility level.
Add Admin - General (Windows Functions)
Authorize - All Users (macOS Functions)
Contains operating system functions that are approved for elevation for all users.
Add Admin - High Flexibility (Windows)
Authorize - High Flexibility (macOS)
Contains the applications that require admin rights that should only be provided to the high flexibility users.
Add Admin - Low FlexibilityContains the applications that require admin rights that should only be provided to the low flexibility users.
Add Admin - Medium Flexibility
Authorize - Medium Flexibility (macOS)
Contains the applications that require admin rights that should only be provided to the medium flexibility users.
Add Admin - Protected Operations 
Passive - High Flexibility (Business Apps)Contains applications that are allowed for High Flexibility users without providing admin authorization.
Passive - Medium Business AppsContains applications that are allowed for Medium Flexibility users without providing admin authorization.
Passive - Low Flexibility (Business Apps)Contains applications that are allowed for Low Flexibility users without providing admin authorization.
Block - Blocklisted AppsContains applications that are blocked for all users.
Passive - All Users Functions & AppsContains trusted applications, tasks and scripts that should execute as a standard user.
(Default) Any ApplicationContains all application types and is used as a catch-all for unknown applications.
(Default) Any Trusted & Signed UAC Prompt (Windows)
(Default) Any Trusted & Signed Authorization Prompt (macOS)
Contains signed (trusted ownership) application types that request admin rights or authorization.
(Default) Any UAC Prompt (Windows)
(Default) Any Authorization Prompt (macOS)
Contains application types that request admin rights or authorization.
(Default) Any Sudo Command (macOS)Contains all sudo commands and is used as a catch-all for unknown sudo commands.
(Default) Endpoint Privilege Management ToolsProvides access to a BeyondTrust executable that collects Endpoint Privilege Management troubleshooting information.
(Default) Child Processes of TraceConfig.exe 
(Default) Signed UAC Prompt (Windows)
(Default) Any Signed Authorization Prompt (macOS)
Contains signed (trusted ownership) application types that request admin rights or authorization.
(Default) Authorize - System TrustedContains operating system functions that are authorized for all users.
(Default) Passive - System TrustedContains system applications that are allowed for all users.
(Recommended) Restricted FunctionsContains OS applications and consoles that are used for system administration and trigger UAC/authorization when they are executed.
(Recommended) Restricted Functions (On Demand)Contains OS applications and consoles that are used for system administration.
(Default) Trusted Parent ProcessesTrusted processes for reference in parent-rules.
Messages

The following messages are created as part of the QuickStart policy and are used by Application Rules:

NameDescription
Allow Message (Authentication)(Windows). Asks the user to provide a reason and enter their password before the application runs with admin rights.
Allow Authorize (Authentication & Reason)(macOS). Asks the user to enter their password and provide a reason before the application is authorized to run.
Allow Message (Select Reason)Asks the user to select a reason from a dropdown menu before the application runs with admin rights.
Allow Message (Support Desk)Presents the user with a challenge code and asks them to obtain authorization from the support desk. Support can either provide a response code or a designated, authorized user can enter their login details to approve the request.
Allow Message (Yes / No)Asks the user to confirm that they want to proceed to run an application with admin rights.
Block MessageWarns the user that an application has been blocked.
Block NotificationNotifies the user that an application has been blocked and submitted for analysis.
Notification (Trusted)Notifies the user that an application has been trusted.

QuickStart template for server roles

This QuickStart template contains Workstyles, application groups, and content groups to manage different server roles (such as DHCP, DNS, IIS, and print servers).

Workstyles
NameDescription
Server Role - Active Directory - TemplateSupports server management of the Active Directory role.
Server Role - DHCP - TemplateSupports server management of the DHCP role.
Server Role - DNS - TemplateSupports server management of the DNS role.
Server Role - File Services - TemplateSupports server management of the File Services role.
Server Role - Hyper V - TemplateSupports server management of the Hyper-V role.
Server Role - IIS - TemplateSupports server management of the IIS role.
Server Role - Print Services - TemplateSupports server management of the Print Services role.
Server Role - Windows General - TemplateSupports general server management operations.
Application Groups
  • Server Role - Active Directory - Template
  • Server Role - DHCP - Template
  • Server Role - DNS - Template
  • Server Role - File Services - Template
  • Server Role - Hyper V - Template
  • Server Role - IIS - Template
  • Server Role - Print Services - Template
  • Server Role - Windows General - Template
Content Groups
  • AD Management
  • Hosts Management
  • IIS Management
  • Printer Management
  • Public Desktop

Before you begin using QuickStart templates

Before deploying a QuickStart policy to your users, BeyondTrust recommends you customize the policy to your organization's specific requirements.

You must:

  • configure the users or groups that can authorize requests that trigger messages.
  • assign users and groups to the high, medium, and low flexibility Workstyles.
  • populate the Block - Blocklisted Apps Application Group with any applications that you want to block for all users.
  • set your shared key so you can generate an Endpoint Privilege Management for Windows for Mac Response code.

©2003-2025 BeyondTrust Corporation. All Rights Reserved. Other trademarks identified on this page are owned by their respective owners. BeyondTrust is not a chartered bank or trust company, or depository institution. It is not authorized to accept deposits or trust accounts and is not licensed or regulated by any state or federal banking authority.