Group policies
What are group policies?
Group policies define permissions and settings for groups of users, enabling administrators to standardize and streamline access control.
How are group policies useful?
Group policies help ensure consistency in user permissions, simplify administrative tasks, and support secure and efficient management of user groups.
How do I access the Group Policies page?
- Use a Chromium-based browser to sign in to your Remote Support URL.
This URL is provided in the BeyondTrust welcome email and includes your site URL followed by /login. - From the left menu, click Users & Security.
The Users page opens and displays by default. - At the top of the page, click Group Policies.
The Group Policies page displays.
How to configure group policies
Add new policy, edit, delete
Create a new policy, modify an existing policy, or remove an existing policy.
Note
If you edit the group policy that is the default for the local provider, or has local administrator users, and remove administrator permissions, a warning message appears. Ensure other users have administrator permissions before proceeding.
Change order
Click the Change Order button to drag and drop group policies to set their priority. Click Save Order for prioritization changes to take effect. When multiple policies apply to a given user, the permissions take effect by starting at the top of the Group Policies list, and then moving down the list. If a permission conflicts with a permission applied by a group policy higher in the list, then the lower permission will overwrite the higher, unless the higher was set as Final. In short, group policies that appear lower in the list have a higher functional priority than those that are higher.
Search group policies
To quickly find an existing policy in the list of Group Policies, enter the name, or part of the name. The list filters to all policies with a name containing the entered search term. The list remains filtered until the search term is removed, even if the user goes to other pages or logs out. To remove the search term, click the X to the right of the search box.
If you click the Change Order button after searching the list, all group policies appear. You can drag and drop group policies to set their priority. When you click Save Order, the changes take effect and the list returns to policies with a name containing the entered search term.
Expand all / collapse all
To assist with searching and navigating the group policies, click the Expand All link above the grid to expand the details of all listed group policies. Click Collapse All to return to the unexpanded list of group polices.
Copy
To expedite the creation of similar policies, click Copy to create a new policy with identical settings. You can then edit this new policy to meet your specific requirements.
Add or edit policy
After making your edits, click Save to save your changes to this group policy.
Policy name
Create a unique name to help identify this policy.
Available members and policy members
To assign members, select a member from the Available Members list and click Add to move it to the Policy Members box. Use the Search box to find existing members.
You can select users from your local system, or select users or entire groups from configured security providers. To add users or groups from an external directory store such as LDAP, RADIUS, or Kerberos, you must first configure the connection on the /login > Users & Security > Security Providers page. If an attempt to add a user from a configured security provider is invalid, the synchronization log error message appears here as well as in the log.
Account settings
Two factor authentication: log in with an authenticator app
Select whether the user is required to log in using an authenticator app, or has the option to do so (default setting). If Required is selected, the next time the user tries to login to either the administrative interface or the representative console, a screen displays requiring the activation of two-factor authentication.
Note
For more information on 2FA, please see Two-factor authentication guide.
Account never expires
If this option is selected, the account never expires.
Account expiration date
Causes the account to expire on a given date.
Account disabled
Disables the account so the user cannot log in. Disabling does NOT delete the account.
Allowed to change their display names
Enables users to change their display names.
Allowed to change their photo
Enables users to change their avatar photos, which display on the /login administrative interface and in the customer client chat window.
Allowed to show on public site
Displays the user's name on all public sites that have the representative list enabled.
Comments
Add comments to help identify the purpose of this account.
Passwordless authenticators
Listing of the passwordless authenticators registered for this user. Admins can view the name, type, registration timestamp, and last used timestamp. Admins can remove one or more authenticators from this list.
General permissions
Which general settings should this Group Policy control?
Decide if a setting should be Defined within this policy. If it is, you can select Final to prevent other policies of a lower priority from overriding the permission value set by this policy. Select All to define all settings in this section.
Administration
Administrator
Grants the user full administrative rights.
Allowed to administer Vault
Enables the user to manage all aspects of the BeyondTrust Vault add-on.
Allowed to Administer Endpoint Automation
Enables the user access to Endpoint Automation.
Allowed to set passwords
Enables the user to set passwords and unlock accounts for non-administrative local users.
Allowed to edit Jumpoints
Enables the user to create or edit Jumpoints. This option does not affect the user's ability to access remote computers via Jumpoint, which is configured per Jumpoint or group policy.
Allowed to edit public site
Enables the user to create and modify public site configurations, edit HTML templates, view the translation interface, etc.
Allowed to edit customer notices
Enables the user to create and edit messages used to notify customers, as they are requesting support, of broadly impacting IT outages.
Allowed to edit file store
Enables the user to add or remove files from the file store.
Allowed to edit canned messages
Enables the user to create or edit canned chat messages.
Allowed to edit support teams
Enables the user to create or edit support teams.
Allowed to edit Jump Groups
Enables the user to create or edit Jump Groups.
Allowed to edit issues
Enables the user to create and edit issues.
Allowed to edit skills
Enables the user to create and edit skills.
Allowed to edit Support Button profiles
Enables the user to customize Support Button profiles.
Allowed to edit canned scripts
Enables the user to create or edit canned scripts for use in screen sharing or command shell sessions.
Allowed to edit custom rep links
Enables the user to create or edit custom links.
Allowed to edit access sponsors
Enables the user to create or edit access sponsor teams.
Allowed to edit iOS profiles
Enables the user to create, edit and upload Apple iOS Profile content for distribution to iOS device users.
Reporting
Allowed to view support session reports
Enables the user to run reports on support session activity, viewing only sessions in which they were the primary representative, only sessions in which one of their teams was the primary team or one of their teammates was the primary representative, or all sessions.
Allowed to view support session recordings
Enables the user to view video recordings of screen sharing sessions, Show My Screen sessions, and command shell sessions.
Allowed to view license usage reports
Enables the user to run reports on BeyondTrust license usage.
Allowed to view Vault reports
Enables the user to run reports on Vault activity, viewing all event data or only their event data.
Allowed to view presentation session reports
Enables the user to run reports on presentation activity, viewing only presentations in which they were the presenter, only sessions in which one of their teammates was the presenter, or all presentations.
Allowed to view support session recordings
Enables the user to view recordings of screen sharing sessions and command shell sessions. It does not affect presentation recordings.
Allowed to view license usage reports
Enables the user to view Representative License Report.
Allowed to view syslog reports
Enables the user to download a ZIP file containing all syslog files available on the appliance. Admins automatically have permissions to access this report. Non-admin users must request access to view this report.
Representative permissions
Allowed to provide remote support
Enables the user to use the representative console in order to run support sessions. If support is enabled, options pertaining to remote support will also be available. Disable this setting for presentation-only users.
Session management
Allowed to generate session keys for support sessions within the representative console
Enables the user to generate session keys to allow customers to start sessions with them directly.
Note
For more information, please see Generate a session key.
Allowed to generate access keys for sending iOS profiles
Enables the user to generate access keys to offer iOS content to iOS device users.
Note
For more information, please see iOS profile access key.
Allowed to manually accept sessions from a team queue
Enables the user to select and start sessions that are in one of their team queues.
Note
For more information, please see Accept a session to start support.
Allowed to transfer sessions to teams which they do not belong to
Enables the user to transfer sessions to teams other than their own. If disabled, user interaction is restricted solely to the user's assigned teams.
Allowed to share sessions with teams which they do not belong to
Enables the user to invite a less limited set of user to share sessions, not only their team members. Combined with the extended availability permission, this permission expands session sharing capabilities.
Note
For more information, see Session tools.
Allowed to invite external support representatives
Enables the user to invite third-party users to participate in a support session, for the duration of that session only.
Note
For more information, see Rep invite.
Allowed to use the get next session feature
Enables the user to start supporting the oldest queued session from all of their teams simply by clicking a button.
Note
For more information, please see Accept a session to start support.
Allowed to enable extended availability mode
Enables the user to receive email invitations from other users requesting to share a session even when they are not logged into the representative console.
Note
For more information, please see Extended availability .
Allowed to edit the external key
Enables the user to modify the external key from the session info pane of a session within the representative console.
Note
For more information, please see Session tools.
Equilibrium
Note
For more information, please see Equilibrium guide.
Allowed to opt out of session assignments
Enables the representative to mark himself or herself as unavailable for sessions to be assigned using Equilibrium.
Do not assign sessions if the representative is participating in at least
Sets the least number of sessions the representative must be supporting before sessions will no longer be automatically assigned using Equilibrium.
Do not assign sessions if the representative has been idle for at least
Sets the least amount of time the representative must have been idle before sessions will no longer be automatically assigned using Equilibrium.
Rep to rep screen sharing
Note
For more information, please see Rep-to-rep screen share.
Allowed to show screen to other representatives
Enables the user to share their screen with another user without the receiving user having to join a session. This option is available even if the user is not in a session.
Allowed to give control when showing screen to other representatives
Enables the user sharing their screen to give keyboard and mouse control to the user viewing their screen.
Support Buttons
Note
For more information, please see Session tools.
Allowed to deploy and manage Support Buttons in personal queue
Enables the user to deploy and manage personal Support Buttons. This setting affects deploying Support Buttons from both the web interface and the representative console. To deploy a Support Button from within a session, the Support Button Deployment session permission must also be allowed.
Allowed to manage Team Support Buttons
Enable the user to modify the Support Buttons deployed to teams they are a member of. If the user is a team lead or manager, they can modify the personal Support Buttons of any team members as well.
Note
For more information, please see Manage Support Buttons.
Allowed to change the public portal associated with Support Buttons
Enables the user to set the public portal through which a Support Button should connect. Because session policies may be applied to public portals, changing the portal may affect the permissions allowed in the session.
Allowed to deploy team Support Buttons
Enables the user to deploy team Support Buttons for teams they are a member of. This setting affects deploying Support Buttons from both the web interface and the representative console. To deploy a Support Button from within a session, the Support Buttons Deployment session permission must also be allowed.
Jump Technology
Allowed Jump methods
Enables the user to Jump to computers using Jump Clients, Local Jump, Local VNC, Local RDP, Remote Jump, Remote VNC, Remote RDP, Shell Jump, and/or Intel vPro.
Jump Item Roles
A Jump Item Role is a predefined set of permissions regarding Jump Item management and usage. For each option, click the Edit button to open the Jump Item Role in a new tab.
The Default role is used only when Use User's Default is set for that user in a Jump Group.
The Personal role applies only to Jump Items pinned to the user's personal list of Jump Items.
The Teams role applies to Jump Items pinned to the personal list of Jump Items of a team member of a lower role. For example, a team manager can view team leads' and team members' personal Jump Items, and a team lead can view team members' personal Jump Items.
The System role applies to all other Jump Items in the system. For most users, this should be set to No Access. If set to any other option, the user is added to Jump Groups to which they would not normally be assigned, and in the representative console, they can see non-team members' personal lists of Jump Items.
Note
For more information, please see Jump Item Roles.
Representative console
Idle timeout
Set how long the representative can be idle before being logged out of the representative console. This permission can use the site-wide setting or can override that setting.
Attended and unattended session permissions
Attended and unattended session policies
Session policy
Set the prompting and permission rules that should apply to this user's sessions. Choose an existing session policy or define custom permissions for this user. If Not Defined, the global default policy will be used. These permissions may be overridden by a higher policy.
Use the same permissions for unattended sessions
To use the same permissions for both attended and unattended sessions, check Use the same permissions for Unattended sessions. Uncheck this box to define attended and unattended permissions separately. You can also copy the permissions from one to the other.
Description
View the description of a pre-defined session permission policy.
Allow elevated access to tools and special actions on the endpoint
Check Allow Elevated Access to Tools and Special Actions on the Endpoint if desired, and if allowed by the Endpoint's platform.
Support tool prompting
Note
For more information, please see Desktop customer client user guide.
Prompting rules
Choose to ask the customer permission to use any of the support features below. Select No Prompting to never prompt, Always Prompt to always prompt, or Prompt for Some Tools to choose which permissions to prompt for. If Prompt for Some Tools is chosen, a Prompt Customer option will appear beside each tool with the options to Never prompt or to Always prompt. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Allowed to prompt once
If Screen Sharing is set to View and Control and prompting is enabled, this option appears. Check the box to make the screen sharing prompt request access to all tools during the session, with no further prompts.
Prompting options
Set how long to wait for a response to a prompt before defaulting to the answer of Deny or Allow. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Screen sharing
Screen sharing rules
Enable the user to view or control the remote screen. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Note
For more information, please see Screen share.
Allowed to show their screen to the customer
Enables the user to share their screen with the customer during a support session. This option is available if View Only or View or Control is selected.
Note
For more information, please see Show my screen.
Allowed customer restrictions
Set if the user can suspend the remote system's mouse and keyboard input. The user may also prevent the remote desktop from being displayed. This is option is available if View and Control is selected. If Display, Mouse and Keyboard is the selected Customer Restriction, a check box is available to Automatically request a privacy screen on session start. Privacy screen is applicable only for sessions started from a Jump Client, a Remote Jump Item, or a Local Jump Item. We recommend using privacy screen for unattended sessions. The remote system must support privacy screen.
Note
For more information, please see Restricted customer interaction.
Application sharing prompt behavior
Set if a request for screen sharing should always or never prompt the customer to select applications to share, or if the user can choose whether to prompt for application sharing or not. Selecting Always or Rep Decides also allows you to predefine application sharing restrictions.
Note
For more information, please see Application sharing.
Clipboard synchronization direction
This is option is available if View and Control is selected. Select how clipboard content flows between representatives and end users. The options are:
- Not allowed: The representative is not allowed to use the clipboard, no clipboard icons display in the representative console, and cut and paste commands do not work.
- Allowed from Rep to Customer: The representative can push clipboard content to the customer but cannot paste from the end user's clipboard. Only the Send clipboard icon displays in the representative console.
- Allowed in Both Directions: Clipboard content can flow both ways. Both Push and Get clipboard icons display in the representative console.
Note
For more information about the Clipboard Synchronization Mode, please see Representative console on the Security page.
Annotations
Annotation rules
Enables the user to use annotation tools to draw on the remote system's screen. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Note
For more information, please see Annotations.
File transfer
File transfer rules
Enables the user to upload files to the remote system, download files from the remote system, or both. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Accessible paths on customer's filesystem
Allow the user to transfer files to or from any directories on the remote system or only specified directories.
Accessible paths on representative's filesystem
Allow the user to transfer files to or from any directories on their local system or only specified directories.
Note
For more information, please see File transfer.
Command shell
Command shell rules
Enables the user to issue commands on the remote computer through a virtual command line interface. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Note
Command shell access cannot be restricted for Shell Jump sessions.
Note
For more information, please see Command shell.
System information
System information rules
Enables the user to see system information about the remote computer. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Allowed to use system information actions
Enables the user to interact with processes and programs on the remote system without requiring screen sharing. Kill processes; start, stop, pause, resume, and restart services; and uninstall programs.
Note
For more information, please see System information.
Registry access
Registry access rules
Enables the user to interact with the registry on a remote Windows system without requiring screen sharing. View, add, delete and edit keys, search and import/export keys.
Note
For more information, please see Registry editor.
Canned scripts
Canned script rules
Enables the user to run canned scripts that have been created for their teams. Note that when the user is in view-only screen sharing, the customer receives a prompt to allow the script to run. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Note
For more information, please see Command shell.
Elevation
Elevation rules
Enables the user to attempt to elevate the customer client to run with administrative rights on the remote system. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Note
For more information, please see Elevate the customer client.
Support Button deployment
Support Button deployment rules
Enables the user to deploy or remove a Support Button while in a session. Locations available for deployment depend on the Support Button settings above. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Note
For more information, please see Session tools.
Jump Clients pinning/unpinning
Jump Clients pinning/unpinning rules
Enables the user to pin or unpin a Jump Client while in a session. Locations available for deployment depend on the Jump Client settings above. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Note
For more information, please see Session tools.
Chat
Note
For more information, please see Chat with the customer.
Chat rules
Enables the user to chat with the remote customer. If Not Defined, this option will be set by the next lower priority policy. This setting may be overridden by a higher priority policy.
Allowed to push URLs to the customer's web browser
Enables the user to enter a URL into the chat area and then click the Push URL button to automatically open a web browser to that address on the remote computer.
Allowed to send files using the chat interface
Enables the user to send files via the chat interface.
Note
For more information, please see Desktop customer client user guide.
Session termination behavior
If unable to reconnect within the time you set by Reconnect Timeout, choose what action to take. To prevent an end-user from accessing unauthorized privileges after an elevated session, set the client to automatically log the end user out of the remote Windows computer at session end, to lock the remote computer, or to do nothing. These rules do not apply to browser sharing sessions.
Allow users to override this setting per session
You can allow a user to override the session termination setting from the Summary tab in the console during a session.
Chat session permissions
Allowed to push URLs to the customer's web browser
Enables the user to enter a URL into the chat area and then click the Push URL button to automatically open a web browser to that address on the remote computer.
Allowed to send files using the chat interface
Enables the user to send files via the chat interface.
Note
For more information, please see Desktop customer client user guide.
Availability settings
Full support license pool
Choose the license pool to which this representative should belong. When this representative logs into the representative console, a license is consumed from the designated license pool. If None is selected, the representative will be able to log in to the representative console only if one or more licenses are left unassigned to license pools and are available.
Skills
Designates the skills assigned to this user. When using skills match for Equilibrium, sessions will be assigned to the user best skilled to handle a particular issue.
Note
For more information, please see Assign skills to reps.
Login schedule
Restrict representative log in to the following schedule
Set a schedule to define when users can log in to the representative console. Set the time zone you want to use for this schedule, and then add one or more schedule entries. For each entry, set the start day and time and the end day and time.
If, for instance, the time is set to start at 8 am and end at 5 pm, a user can log in at any time during this window but may continue to work past the set end time. They will not, however, be allowed to log back in after 5 pm.
Force logout when the schedule does not permit login
If stricter access control is required, check this option. This forces the user to log out at the scheduled end time. In this case, the user receives recurring notifications beginning 15 minutes prior to being disconnected. When the user is logged out, any owned sessions will follow the session fallback rules.
Memberships
Which membership settings should this Group Policy control?
Decide if a setting should be Defined within this policy. If it is, you can select Final to prevent other policies of a lower priority from overriding the permission value set by this policy. Select All to define all settings in this section.
Add Support Teams Membership
Search for teams to which members of this group policy should belong. You can set the role as Team Member, Team Lead, or Team Manager. These roles play a significant part in the Dashboard feature of the representative console. Click Add.
Added teams are shown in a table. You can edit the role of members in a team or delete the team from the list.
Remove Support Teams Membership
Search for teams from which members of this group policy should be removed, and then click Add. Removed teams are shown in a table. You can delete a team from the list.
Add Jumpoint Membership
Search for Jumpoints which members of this group policy should be allowed to access, and then click Add. Added Jumpoints are shown in a table. You can delete a Jumpoint from the list.
Remove Jumpoint Memberships
Search for Jumpoints from which members of this group policy should not be removed, and then click Add. Removed Jumpoints are shown in a table. You can delete a Jumpoint from the list.
Add Jump Group Memberships
Search for Jump Groups to which members of this group policy should belong. You can set each user's Jump Item Role to set their permissions specific to Jump Items in this Jump Group, or you can use the user's default Jump Item Roles set in this group policy or on the Users & Security > Users page. A Jump Item Role is a predefined set of permissions regarding Jump Item management and usage.
Note
For more information see Jump Item Roles.
You can also apply a Jump Policies to manage user access to the Jump Items in this Jump Group.
Added Jump Groups are shown in a table. You can edit a Jump Group's settings or delete the Jump Group from the list.
Remove Jump Group Memberships
Search for Jump Groups from which members of this group policy should be removed, and then click Add. Removed Jump Groups are shown in a table. You can delete a Jump Group from the list.
Add Vault Account Memberships
Search for an account, select the Vault Account Role, and then click Add to grant members of the policy access to the selected Vault account. Users may have memberships added by other group policies. View Vault > Accounts to see all members within each group. Users may be assigned one of two roles for using the Vault account:
- Inject (default value): Users with this role can use this account in Remote Support sessions.
- Inject and Checkout: Users with this role can use this account in Remote Support sessions and can check out the account on /login. The Checkout permission has no affect on generic SSH accounts.
Note
Enable the Add Vault Account Membership permission to assign a Vault Account Role to a Vault account in a group policy. The Vault Account Role is visible in the list of accounts added to the group policy.
Add Vault Account Group Memberships
Search for an account group, select the Vault Account Role, and then click Add to grant members of the policy access to the group of Vault accounts. Users may have memberships added by other group policies. View Vault > Accounts to see all members within each group. Users may be assigned one of two roles for using the group of Vault accounts:
- Inject (default value): Users with this role can use this account in Remote Support sessions.
- Inject and Checkout: Users with this role can use this account in Remote Support sessions and can check out the account on /login. The Checkout permission has no affect on generic SSH accounts.
Note
Enable the Add Vault Account Group permission to assign a Vault Account Role to a group of Vault accounts in a group policy. The Vault Account Role is visible in the list of account groups added to the group policy.
Export Policy
You can export a group policy from one site and import those permissions into a policy on another site. Edit the policy you wish to export and scroll to the bottom of the page. Click Export Policy and save the file.
Note
When exporting a group policy, only the policy name, account settings, and permissions are exported. Policy members, team memberships, and Jumpoint memberships are not included in the export.
Import Policy
You may import exported group policy settings to any other BeyondTrust site that supports group policy import. Create a new group policy or edit an exiting policy whose permissions you wish to overwrite, and scroll to the bottom of the page. Browse to the policy file and then click Select Policy File. Once the policy file is uploaded, the page will refresh, allowing you to make modifications. Click Save to put the group policy into effect.
Note
Importing a policy file to an existing group policy will overwrite any previously defined permissions, with the exception of policy members, team memberships, and Jumpoint memberships.
Sample policy matrix
The diagram below is an example of how multiple policies can work together.
Updated 5 days ago