{"id":3751,"date":"2020-05-25T22:27:00","date_gmt":"2020-05-25T22:27:00","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=3751"},"modified":"2026-01-25T08:42:18","modified_gmt":"2026-01-25T08:42:18","slug":"the-light-at-the-end-of-the-funnel","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel","title":{"rendered":"The Light at the End of the Funnel"},"content":{"rendered":"\n<p>You invest some serious money into keeping your IT environment safe from malware. Firewalls, mail scanning tools, web scanning software, proxy servers, endpoint anti-malware \u2013 you even stay up to date with patches and run the latest and greatest operating system.<\/p>\n\n\n\n<p>But malware still worms its way in.<\/p>\n\n\n\n<p>There is a light at the end of the tunnel (or funnel, in this case), but it doesn\u2019t involve buying into yet another endpoint anti-malware solution that claims it will keep you 100% safe.<\/p>\n\n\n\n<p>It won\u2019t.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Malware Protection Funnel<\/h2>\n\n\n\n<p>Malware can weasel its way into a computer network via several entry points, such as the internet, external storage devices and through email.<\/p>\n\n\n\n<p>The malware protection funnel is the system of security measures in place from the network down to the end user:<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"650\" height=\"739\" src=\"\/wp-content\/uploads\/2022\/10\/image-3.png\" alt=\"\" class=\"wp-image-3752\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/image-3.png 650w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/10\/image-3-264x300.png 264w\" sizes=\"auto, (max-width: 650px) 100vw, 650px\" \/><\/figure>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Firewalls establish a barrier between the external network, typically the internet, and your internal business network<\/li>\n\n\n\n<li>Web and mail traffic scanning tools do exactly that: scan your users\u2019 incoming and outgoing HTTP and email traffic<\/li>\n\n\n\n<li>Endpoint anti-virus software helps prevent malware on your users\u2019 devices using a variety of scanning and detection techniques<\/li>\n<\/ul>\n\n\n\n<p>As for Admin By Request\u2026 we\u2019ll get to that further on.<\/p>\n\n\n\n<p>All of these security tools help to decrease the percentage of malware that manages to infiltrate your IT environment, and with each layer, the opening for infiltration narrows.<\/p>\n\n\n\n<p>However, there is still an opening &#8211; the biggest vulnerability of them all:<\/p>\n\n\n\n<p>Local administrator rights.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">One Small Gap in your Network Security, One Giant Doorway for Attackers<\/h2>\n\n\n\n<p>This single vulnerability can be catastrophic for your company.<\/p>\n\n\n\n<p>Many hackers today have financial motivation and create complex ransomware programs that often begin the process of infiltrating the system by targeting the end user.<\/p>\n\n\n\n<p>From here, malware can vertically escalate to a more privileged position from which point it can access the core of the operating system (as is the case with\u00a0<a href=\"\/en\/blogs\/robbinhood-and-his-not-so-merry-malware\" target=\"_blank\" rel=\"noreferrer noopener\">RobbinHood ransomware<\/a>) or horizontally propagate across the network by stealing user credentials of the same privilege level.<\/p>\n\n\n\n<p>Both situations spell huge data breaches and subsequent disaster \u2013 and are much more common that you may realise.<\/p>\n\n\n\n<p>In late March this year hackers gained access to hotel giant, Marriot, by obtaining the login details of two employees of the franchise. 5.2 million people were affected by the data breach which stole names, addresses, and contact information \u2013 all a result of hackers gaining access to&nbsp;<em>just two<\/em>&nbsp;user accounts.<\/p>\n\n\n\n<p>Mid-last year the US Defence Information Systems Agency (DISA), which employs over 8000 military and civilian staff, suffered a data breach that&nbsp;<em>wasn\u2019t discovered<\/em>&nbsp;until February 11th of this year \u2013 almost a year after the hackers gained initial access. The breach compromised employee\u2019s PII (Personal Identifiable Information) and social security numbers, but the exact details of the breach, and those affected, have not been disclosed.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Admin By Request: The Funnel of Love (well, of safety at least)<\/h2>\n\n\n\n<p>With Admin By Request, nothing&nbsp;<em>needs<\/em>&nbsp;to be disclosed when it comes to unauthorised activity \u2013 because this software prevents unauthorised activity from occurring in the first place.<\/p>\n\n\n\n<p>Somewhere between 80 and 100% of vulnerabilities can be eliminated by eliminating local administrator rights. But that\u2019s not always practical: your users need admin rights to be able to do simple day to day tasks, such as installing media players or PDF readers.<\/p>\n\n\n\n<p>So how do you find a happy medium between keeping your system safe and keeping productivity at a maximum?<\/p>\n\n\n\n<p>By simply&nbsp;<em>managing<\/em>&nbsp;privileged access.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Funnel your Users: Managing User Access<\/h3>\n\n\n\n<p>Admin By Request is A Privileged Access Management (PAM) solution. It deals with the open doorway that is your user endpoints, allowing you to revoke admin rights so that malware has a much harder job of gaining entry to your IT system.<\/p>\n\n\n\n<p>With Admin By Request, you can choose who gets what access.<\/p>\n\n\n\n<p>The software\u2019s sub settings allow you to create different access rules for organizational groups. You can set tight access restrictions for some users and allow more leniency for others who might need higher privileges on a more regular basis, such as the IT team.<\/p>\n\n\n\n<p>Admin By Request keeps you safe by reducing the number of potentially vulnerable privileged users &#8211; but what about productivity? What do your limited-access users do when they need to run programs and processes that require administrator credentials?<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Funnelling out: How it Works<\/h3>\n\n\n\n<p>Admin By Request provides four ways for users to do such tasks without elevating them to full-time privileged users.<\/p>\n\n\n\n<p>These methods include:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Whitelisting commonly used applications ahead of time<\/li>\n\n\n\n<li>Allowing users to request elevation of an app, which can then be run with administrator privileges<\/li>\n\n\n\n<li>Allowing users to request a timed elevated session, which gives them administrative access to their system for the duration of the session<\/li>\n\n\n\n<li>Providing a one-time-use PIN to a user (who may fall outside the scope that allows them to use either of the previous two self-initiated methods). The PIN allows them to gain elevated access for a period of time.<\/li>\n<\/ul>\n\n\n\n<p>Read more about these elevation methods&nbsp;<a href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/local-admin-rights-elevation-served-three-ways\" target=\"_blank\" rel=\"noreferrer noopener\">here<\/a>.<\/p>\n\n\n\n<p>These techniques prioritise security by:<\/p>\n\n\n\n<p>o&nbsp; &nbsp; Whitelisting and elevating&nbsp;<em>apps<\/em>&nbsp;rather than giving the user local administrator rights and<\/p>\n\n\n\n<p>o&nbsp; &nbsp; Applying the concept of Just-in-time (JIT) elevation \u2013 only elevating privileges when and where they are absolutely necessary.<\/p>\n\n\n\n<p>Just like that, Admin By Request balances security and productivity.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/balance(1).png\" alt=\"\"\/><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">Shedding Some Light: Stay in the Know<\/h3>\n\n\n\n<p>As well as managing who gets access to what, Admin By Request\u2018s auditlog allows you to stay on top of what\u2019s going on when users request administrator access.<\/p>\n\n\n\n<p>When a user requests to run an application as administrator or begins an elevated session, the processes that occur during this period are recorded in the Admin By Request auditlog. This means installs and uninstalls are visible, and any attempt at privilege escalation is immediately detectable and can be addressed accordingly.<\/p>\n\n\n\n<p>You won\u2019t have to worry about discovering a data breach that happened almost a year ago with Admin By Request\u2019s auditlog tracking every administrator-move \u2013 with requests for admin elevation and the auditlog being accessible from your phone via the Admin By Request app.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Funnel Vision: When \u2018100% Safe\u2019 Isn\u2019t Really That Safe<\/h2>\n\n\n\n<p>Admin By Request tackles the end-user vulnerability, and with it, 80 to 100% of vulnerabilities within your network. But what about that other potential 20%?<\/p>\n\n\n\n<p>This is where the anti-malware portion of the malware protection funnels comes back into play.<\/p>\n\n\n\n<p>Single end-point anti-virus solutions often claim to be 100% successful at detecting malware. But with the ever-growing and mutating malware threats appearing every year, no anti-malware engine can realistically claim 100% safety and security.<\/p>\n\n\n\n<p>Admin By Request recognises that eliminating 80 to 100% of vulnerabilities isn\u2019t guaranteeing you 100% security &#8211; so they have integrated with Opswat\u2019s MetaDefender Cloud to get you as close to 100% as possible.<\/p>\n\n\n\n<p>Opswat\u2019s&nbsp;<a href=\"https:\/\/metadefender.opswat.com\/reports\/statistics?lang=en\" target=\"_blank\" rel=\"noreferrer noopener\">Detection Efficacy overview<\/a>&nbsp;gives an honest reflection of just how safe you are using four, through to more than twenty, anti-virus engines:<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/www.adminbyrequest.com\/Images\/Blogs\/Detection%20Efficacy%20Overview-01.png\" alt=\"\"\/><\/figure>\n\n\n\n<p>With Admin By Request\u2019s partnership with Opswat, your files are multiscanned with over 30&nbsp;anti-malware engines. The detection rate is much higher than using just one anti-virus solution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Funnel Out<\/h2>\n\n\n\n<p>The next time you suffer a data breach and consider investing in the latest next-gen firewall and a \u2018100% successful\u2019 end-point anti-virus solution\u2026 stop.<\/p>\n\n\n\n<p>Target the real vulnerability: local administrator rights.<\/p>\n\n\n\n<p>And with <a href=\"\/en\/freeplandownload\">Admin By Request<\/a>, you really will get pretty darn close to 100% security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.<\/p>\n","protected":false},"author":2,"featured_media":7851,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[148,187,237,67,238,68],"ppma_author":[10],"class_list":["post-3751","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cybersecurity","tag-detection","tag-malware-protection","tag-pam","tag-prevention","tag-privileged-access-management","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"cybersecurity,detection,malware protection,pam,prevention,privileged access management\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"The Light at the End of the Funnel \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2020-05-25T22:27:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T08:42:18+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"The Light at the End of the Funnel \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel#blogposting\",\"name\":\"The Light at the End of the Funnel \\u00bb Admin By Request\",\"headline\":\"The Light at the End of the Funnel\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Edited5.png\",\"width\":1437,\"height\":1000,\"caption\":\"A photo of a lit up orange neon Admin By Request sign with a dotted background.\"},\"datePublished\":\"2020-05-25T22:27:00+00:00\",\"dateModified\":\"2026-01-25T08:42:18+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel#webpage\"},\"articleSection\":\"Blogs, Cybersecurity, Detection, Malware Protection, PAM, Prevention, Privileged Access Management, Steve Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel#listItem\",\"name\":\"The Light at the End of the Funnel\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel#listItem\",\"position\":3,\"name\":\"The Light at the End of the Funnel\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel\",\"name\":\"The Light at the End of the Funnel \\u00bb Admin By Request\",\"description\":\"Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2020\\\/05\\\/Edited5.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel\\\/#mainImage\",\"width\":1437,\"height\":1000,\"caption\":\"A photo of a lit up orange neon Admin By Request sign with a dotted background.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/the-light-at-the-end-of-the-funnel#mainImage\"},\"datePublished\":\"2020-05-25T22:27:00+00:00\",\"dateModified\":\"2026-01-25T08:42:18+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>The Light at the End of the Funnel \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"The Light at the End of the Funnel \u00bb Admin By Request","description":"Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cybersecurity,detection,malware protection,pam,prevention,privileged access management","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel#blogposting","name":"The Light at the End of the Funnel \u00bb Admin By Request","headline":"The Light at the End of the Funnel","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2020\/05\/Edited5.png","width":1437,"height":1000,"caption":"A photo of a lit up orange neon Admin By Request sign with a dotted background."},"datePublished":"2020-05-25T22:27:00+00:00","dateModified":"2026-01-25T08:42:18+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel#webpage"},"articleSection":"Blogs, Cybersecurity, Detection, Malware Protection, PAM, Prevention, Privileged Access Management, Steve Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel#listItem","name":"The Light at the End of the Funnel"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel#listItem","position":3,"name":"The Light at the End of the Funnel","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel","name":"The Light at the End of the Funnel \u00bb Admin By Request","description":"Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2020\/05\/Edited5.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel\/#mainImage","width":1437,"height":1000,"caption":"A photo of a lit up orange neon Admin By Request sign with a dotted background."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel#mainImage"},"datePublished":"2020-05-25T22:27:00+00:00","dateModified":"2026-01-25T08:42:18+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"The Light at the End of the Funnel \u00bb Admin By Request","og:description":"Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel","og:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","article:published_time":"2020-05-25T22:27:00+00:00","article:modified_time":"2026-01-25T08:42:18+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"The Light at the End of the Funnel \u00bb Admin By Request","twitter:description":"Admin By Request tackles almost 100% of vulnerabilities within your network by managing local administrator rights and scanning files with 30+ anti-malware engines.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg"},"aioseo_meta_data":{"post_id":"3751","title":"#post_title #separator_sa #site_title","description":"#post_excerpt","keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":null,"og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":null,"robots_max_videopreview":null,"robots_max_imagepreview":"large","priority":null,"frequency":null,"local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:57:37","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2023-05-22 21:56:16","updated":"2026-01-25 08:57:37"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tThe Light at the End of the Funnel\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"The Light at the End of the Funnel","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/the-light-at-the-end-of-the-funnel"}],"authors":[{"term_id":10,"user_id":0,"is_guest":1,"slug":"steve-dodson","display_name":"Steve Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"Steve","job_title":"","description":"Steve provides research, analysis, insight and commentary on topical issues and events. He lives in New Zealand and has been working at FastTrack Software for 12 years as a cyber security analyst and technical writer."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3751","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=3751"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3751\/revisions"}],"predecessor-version":[{"id":11299,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/3751\/revisions\/11299"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/7851"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=3751"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=3751"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=3751"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=3751"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}