For Windows environments it is critical that organizations can delegate administration and establish granular privileges quickly and efficiently to restrict administrators so they only access the servers and resources required to perform their job. Given the limitation of native tools, it has been common practice in Windows environments to assign privileged users high levels of administrative privilege so that IT staff could fix any problem that might occur at any time. And the requirement to meet compliance demands, mitigate insider risk and manage access and privileges of temporary workers, contractors and third-parties is driving the requirement for least-privilege security across the Windows environment and beyond to UNIX and Linux systems regardless of where these systems run – on-premise or in the cloud.