How do I request elevated (admin) access to my workstation?

Modified on Thu, 31 Jul at 12:59 PM

1. Overview

Elevated access, often referred to as "administrator privileges" or "admin rights," provides extensive control over a computing device, enabling tasks like software installation, core system configuration changes, and driver updates. Due to fundamental security principles, this level of access is typically restricted. The following steps outline how to request it for necessary operational tasks.


2. When to Request Elevated Access

Elevated access is generally required for specific, non-routine activities. Common situations include:


Installing specialized applications not deployed through standard channels.


Performing system-level diagnostics or troubleshooting.


Installing or updating specific hardware drivers unique to a particular function.


Most routine activities (e.g., creating documents, using standard applications, connecting common peripherals) do not require elevated access.


3. How to Request Elevated Access

To submit a request for administrator access, follow these general steps:


3.1. Initiate a Support Request

Preferred Method: Online Help Portal.


Access the designated online help or support portal (typically provided by the IT support provider).


Look for an option to "Submit an Access Request" or "Request Privileges."


Alternative (if portal inaccessible): Email Support.


Send an email to the designated IT support email address.


Use a clear subject line, such as: "Admin Access Request - [Name of Requester]"


3.2. Provide Essential Information in the Request

Include these details to help expedite the evaluation process:


Contact Information: Full name and preferred contact methods.


Device Identification:


The name or identifying tag of the computing device.


(Tip: This information is usually found in the device's system settings or properties.)


Specific Justification:


Clearly state what specific action needs to be performed (e.g., "Install [Application Name]," "Update [Component Name]," "Perform [Specific Task]").


Explain why this action is necessary for a functional requirement.


Duration: Indicate if this is a one-time need or if ongoing access is required. If ongoing, provide the rationale.


Approver Awareness: Note if the need has already been discussed with a relevant manager or lead.


4. What Happens After Request Submission

Request Logging: A support request will be recorded.


Review: A review process will be initiated. This may involve seeking additional information from the requester or a relevant manager/lead.


Outcome:


Approval: If approved, support will typically either assist remotely with the task requiring elevated access, or, in specific justified cases, grant temporary or standing elevated access with clear usage guidelines.


Denial: If denied, a reason will be provided, along with alternative methods to accomplish the task if available.


5. Responsibilities if Access is Granted

If elevated access is provided, adherence to strict guidelines is expected:


Exclusive Work Use: Utilize privileges solely for approved work-related tasks.


No Unauthorized Modifications: Avoid installing unapproved applications or making non-essential system changes.


Report Anomalies: Immediately report any unusual device behavior, errors, or security warnings to the support team.

Was this article helpful?

That’s Great!

Thank you for your feedback

Sorry! We couldn't be helpful

Thank you for your feedback

Let us know how can we improve this article!

Select at least one of the reasons
CAPTCHA verification is required.

Feedback sent

We appreciate your effort and will try to fix the article