Privilege Elevation.
Controlled. Audited.

Remove local admin rights without killing productivity. Users request elevation, you approve in seconds. Full audit trail, automatic rules, zero friction.

Start Free Trial See How It Works

How It Works

1

User Needs Admin

End user right-clicks the ElevateGuard tray icon, browses to the application they need to run elevated, and adds a justification.

2

Request Submitted

The agent captures the file hash, publisher signature, and user details, then sends the request to the cloud. Auto-approve rules are checked instantly.

3

Admin Reviews

Pending requests appear in your web console in real-time. You see the app name, publisher, hash, user, machine, and justification. One click to approve or deny.

4

Process Launches Elevated

On approval, the agent receives the decision via MQTT in under a second and launches the process with admin privileges in the user's session. No passwords shared, no persistent admin rights.

Everything You Need

Real-Time Approve/Deny

Requests arrive in your console instantly via MQTT push. Approve or deny with one click and the agent acts within a second. No polling delays.

Auto-Approve Rules

Create rules by SHA256 hash, publisher certificate, file path, or path prefix. Known-good apps get elevated automatically without admin intervention.

Full Audit Trail

Every request, approval, denial, and execution is logged with timestamps, user identity, machine name, and file details. Complete compliance-ready history.

Authenticode Verification

The agent extracts the digital publisher signature from executables so you can verify the software source before approving elevation.

Multi-Company Support

Built for MSPs. Manage elevation policies across all your client companies from a single console with per-company rules and settings.

Lightweight Agent

Single Windows executable runs as a SYSTEM service. Under 5MB, no dependencies, no PowerShell, no shell execution. Elevation only.

Simple, Transparent Pricing

Free

$0
Up to 5 endpoints
  • Web console
  • Real-time approve/deny
  • Auto-approve rules
  • Audit log
  • 7-day history

Starter

$1/endpoint/mo
Up to 100 endpoints
  • Web console
  • Real-time approve/deny
  • Auto-approve rules
  • Audit log
  • 30-day history

Enterprise

$2/endpoint/mo
Unlimited endpoints
  • Everything in Pro
  • SSO (SAML)
  • SIEM integration
  • Unlimited history
  • Priority support

Free forever for up to 5 endpoints. No credit card required.

Frequently Asked Questions

How does privilege elevation work without giving users admin rights?

ElevateGuard installs a Windows service that runs as SYSTEM. When an elevation request is approved, the service launches the specified application with elevated privileges in the user's desktop session using Windows API calls (CreateProcessAsUser). The user never receives admin credentials or persistent admin rights — only the specific approved application runs elevated.

What if the agent loses internet connectivity?

Without connectivity, new elevation requests cannot be submitted or approved. The agent will queue the request locally and submit it when connectivity returns. Previously approved auto-approve rules are cached locally, so matching applications can still be elevated offline.

Can users run anything elevated once approved?

No. Each approval is for a specific application identified by its SHA256 hash, file path, and publisher signature. The agent verifies the file hash before launching. If the file has been modified or replaced, the elevation will not proceed. Approvals are single-use by default.

How is this different from UAC or just making users admins?

UAC prompts can be clicked through by any local admin. Making users admins gives them permanent, unrestricted access. ElevateGuard provides just-in-time, just-enough privilege: specific apps, specific times, with approval, audit trail, and automatic rules. You maintain least-privilege while keeping users productive.

Does it work with RMM tools like NinjaOne or ConnectWise?

Yes. ElevateGuard is a standalone agent that works alongside any RMM tool. It doesn't conflict with existing management agents and can be deployed via your RMM's software deployment feature.