Welcome to Endpoint Privilege Management for Linux

What is Endpoint Privilege Management for Linux?

Endpoint Privilege Management for Linux (EPM-L) is a cloud-based application that streamlines compliance, controls root access, enforces least privilege, and centrally manages zero trust security controls with a solution purpose-built for Linux.

How is it useful to my organization?

Use EPM-L to set up endpoint management features such as least privilege access and application protection.

  • Root access control: Control root access and eliminate credential sharing by dynamically elevating privileges for standard users.
  • Audit and compliance assurance: Ensure compliance with increasingly complex regulations by providing an unimpeachable audit trail of all user activity.
  • Change visibility and tracking: Gain full visibility into all privileged user activity, including full session recordings, so you can achieve change confidence.

How do I access Endpoint Privilege Management for Linux?

After accepting the email invite and activating your access to EPM-L, you can log in using your updated credentials.

After you complete the initial invite login:

  1. Go to epm.beyondtrust.io (or login.beyondtrust.io), enter your credentials and log in.
  2. On the organization home page, select your tenant name from the list.

The EPM-L Home page opens.

Managing tenants is an Identity Security Insights (Insights) application feature, and is not used with EPM-L.