Management tools elevated with a privileged account

Discover how to manage tools with elevated privileges using the PowerShell Remote session type in Remote Desktop Manager. It establishes a connection to a remote host through ps-sessions with different credentials.

Prerequisite

  • WinRM HTTPS listener is properly configured on the target workstation.

  • A valid SSL certificate is used with an appropriate thumbprint.

Configuring a PowerShell terminal (Remote) entry

  1. Open Remote Desktop Manager.

  2. Click on New entry and search for PowerShell terminal (Remote).

  3. Select PowerShell terminal (Remote) as the session type.

  4. Enter the name, the host and the credentials.

    You can configure multiple hosts and select the destination at the startup of the session.

  5. The elevated credentials could be a custom one from AD, a privileged access management account, or any other credentials entry from Remote Desktop Manager.

  6. To elevate permissions, the session must be configured to run as an administrator.

  7. Navigate to the Run as tab.

  8. Enable the setting Run as administrator. Note that port 5986 - HTTPS (WinRM) is used when running the PowerShell entry as an administrator.

    Run as tab - Enable the setting Run as administrator
    Run as tab - Enable the setting Run as administrator
  9. Click Add to save the PowerShell entry.

  10. Execute the PowerShell entry.

  11. To confirm that the session is running under a privileged account, use the following PowerShell commands:

  • Check the current user

whoami
  • Verify elevated permissions

$currentPrincipal = New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())
$currentPrincipal.IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)
Devolutions Forum logo Give us Feedback