We've unified Citrix solutions and our portfolio. Learn more .

PowerBroker for Windows

Citrix Ready Product Image / Logo

PowerBroker for Windows, an agent residing within windows operating systems, reduces the risk of accidental or intentional privilege misuse on physical and virtual Microsoft Windows servers and desktops hosting or published by the Citrix software stack. PowerBroker for Windows enables IT organizations to remove administrator privileges, enforce standard user permissions, simplify the enforcement of least-privilege policies, maintain application access control, and log privileged activities – all without hampering productivity.

Request Product Details

Compatible with

  • XenApp 7.12
  • XenApp 7.13
  • XenDesktop 7.12
  • XenDesktop 7.13

Compatibility

  • Citrix Virtual Desktops (XenDesktop)
  • Citrix Virtual Apps (XenApp)

Product Details

PowerBroker for Windows, an agent residing within windows operating systems, reduces the risk of accidental or intentional privilege misuse on physical and virtual Microsoft Windows servers and desktops hosting or published by the Citrix software stack. PowerBroker for Windows enables IT organizations to remove administrator privileges, enforce standard user permissions, simplify the enforcement of least-privilege policies, maintain application access control, and log privileged activities – all without hampering productivity. Protect yourself and your infrastructure against malware, inappropriate changes, or users running privileged operations without approval. This product is primarily intended to be used either within the underlying Citrix foundation (infrastructure) or within a published desktop environment.

Features

  • Least-privilege access to applications using roles, policies, MFA, or vulnerability profile
  • File integrity monitoring of windows operating system and application files
  • Windows Event Log Monitoring
  • Session Monitoring that includes command logging, screen recording, and automated alerting
  • Centralized monitoring and reporting
  • GPO based or non-GPO based central policy control for domain and non-domain hosts
  • Individual user, group, or machine based policies
  • API Driven policy including automated deployment and dynamic policy
  • Integration into other BeyondTrust solutions
  • Integration into other BeyondTrust solutions