Easier Cyber Essentials Plus Compliance
Meet UK certification requirements while strengthening your privileged access security, with no special training or infrastructure overhaul
Cyber Essential Plus Support For All 5 Controls
Control 1
Firewalls
- Secure Remote Access without opening traditional firewall ports like RDP (3389)
- IP Restrictions for gateway enhance firewall administrative security
- Application Control Policies prevent unauthorized software from creating network connections
Control 2
Secure Configuration
- Local Administrator Clean-up helps identify and remove unused or rogue local admin accounts
- Break Glass Accounts provide a secure alternative to default admin privileges
- Fire Blocking/Blacklisting prevents unauthorized software execution
- System Settings Lockdown restricts access to specific settings panels like Users, Groups, Network, and sharing
- Session Time Limits ensure administrative sessions don’t remain open
Control 3
User Access Control
- Principle of Least Privilege (POLP) grants users temporary admin access only when needed
- Role-based Access Control (RBAC) implements granular least privilege access based on user roles and responsibilities
- Run As Admin application elevation minimizes access scope
- Break Glass Accounts eliminate persistent emergency accounts that could be forgotten or left enabled
- Multi-factor Authentication strengthens requirements for accessing elevated privileges
Control 4
Malware Protection
- OPSWAT MetaDefender Integration provides an additional layer of malware protection
- Application Control Policies block web browsers or applications before they access malicious websites
- Whitelisting ensures applications come from approved sources
- Comprehensive Audit Logging provides an audit trail for malware detection and incident response
Control 5
Security Update Management
- Blacklisting blocks the execution of unlicensed or unsupported software
- Whitelisting ensures patch management tools can run without approval
- Admin Session Management for manual patch deployment when automatic updates fail
- Comprehensive Audit Logging helps identify unsupported applications for removal
Reporting Capabilities
The audit and reporting tools allow you to extract anything in real-time, such as a graphical representation of the requests and elevations happening – as they happen. Admin By Request’s management tools put you in the front seat of the whole operation.
Device Location
See where all of your devices are on a scalable Google Map. Click for detailed info on each device.
Inventory
Get extensive details on hardware, software, local admins, events, and more for each endpoint.
Activity
Tracked activity includes API, Login, and SCIM activity, mobile app usage, and a settings changelog.
New Devices
At a glance, see which devices have recently installed Admin By Request software.
Local admins
Track and manage your local administrators from a central, birds-eye-view point.
Elevated apps
Use the Auditlog to see which apps have been elevated, by who, and when.
Get Your Detailed Compliance Report
Tell us a bit about your company and we’ll send you a detailed compliance report with information, timeline, checklists, and helpful advice to get you audit-ready.
Trusted by thousands, managing millions
Happy Customers
Malware Preventions
Managed Endpoints
Countries
Compliance Pack
We’ve made it easy to get your hands on all the necessary documentation needed for our compliance checks at your organization. Our Compliance Pack contains all the docs that you’ve got access to on this page – download it below.
Because you're not logged in, you'll only get the Public documents when you download the Compliance Pack. Log in to access all compliance documentation.
What is Compliance by Design?
Rather than retrofitting security solutions to meet audit requirements, forward-thinking organizations are building their IT infrastructure with compliance as the foundation. This proactive approach eliminates the costly scramble of implementing disconnected point solutions when audit deadlines loom, instead creating integrated systems where security controls naturally align with regulatory frameworks from day one. By Designing infrastructure around compliance requirements companies achieve stronger security posture and audit readiness as inherent qualities of their systems, not afterthoughts.
How Can Privileged Access Management Help You with Cyber Essentials Compliance?
Cyber Essential Plus provides a comprehensive framework for managing cybersecurity through five core technical controls: Firewall, Secure Configuration, Access Control, Malware Protection, and Security Update Management. Admin By Request helps organizations meet these requirements through effective privilege management and secure access control implementation.
Easy Integration
Admin By Request integrates with Windows, macOS, and hybrid cloud environments without requiring major infrastructure changes. This allows you to strengthen your access controls and meet Cyber Essentials Plus requirements without disrupting daily operations or existing security configurations.
Enhanced Security
Control privileged access through just-in-time elevation, approval workflows, and session time limits. This directly supports the Access Control technical control by enforcing least privilege principles and providing detailed monitoring of all administrative actions to protect sensitive systems and data from unauthorized access.
Simple Implementation
Deploy access policies at scale while maintaining the secure configuration standards required by Cyber Essentials Plus. Admin By Request simplifies privilege governance with intuitive controls and automation that help maintain consistent security policies across both endpoints and remote sessions.
Compliance Support
Generate comprehensive logs, reports, and dashboards that provide verifiable evidence for Cyber Essentials Plus certification assessments. Admin By Request delivers detailed audit trails and policy enforcement documentation that directly map to the technical controls assessed during the hands-on testing phase
Credential Protection
Eliminate the use of shared administrator accounts and unsecured credentials. Admin By Request delivers temporary, authenticated access that expires automatically, helping reduce identity-based risks.
Reduced Attack Surface
Remove standing privileges and secure remote access to prevent lateral movement and privilege escalation attacks. This approach directly supports multiple Cyber Essentials Plus technical controls by maintaining secure configurations and limiting access pathways that could be exploited by malicious actors.
