Best Practices for Remote Support and Privileged Remote Access
Here are a few best practices for delivering secure and efficient remote support. Following these guidelines can help improve performance, reduce risk, and maintain compliance.
-
Review the supported version lifecycle at least once a year and keep up to date. Having older software, more than two years behind, may make it more complex to get to the latest version. In some cases, a new appliance will need to be created. Refer to How to upgrade or update version 20.1.x and lower.
-
If self-hosted, stay up-to-date with current releases and activate the Apply Critical Updates Automatically option found in the /appliance interface. For instructions, refer to Automatic critical update options in /appliance.
-
Consider using an external authentication security providers (for example, SAML) over local accounts, and be sure to delete accounts not in use. For more information, refer to PRA Security providers or RS Security providers.
-
Consider using outbound events to trigger notifications for session events. For information, refer to RS outbound event guide or PRA outbound events.
-
Integrate with a SIEM using one of our various middleware for Session Data and periodically review for suspicious activity. Refer to integration guides list.
-
Configure syslog to send all configuration changes and authentication events to your SIEM.
-
Practice least privilege for setting up user roles and capabilities, and for endpoint access.
-
Periodically, review all Security Settings and leverage the Session Policy simulator to validate that policies are being applied as intended.
-
Periodically, review all active accounts on your appliance(s), especially those with admin privileges. Deactivate those not in use and rotate passwords at recurring intervals where possible.
-
Enable network restrictions where possible. Refer to How to restrict access to /login, Desktop and Mobile Rep or Access Console and Web Console.
Latest Available Version:
Remote Support 25.1.1 - April 2025
Beekeepers Hot Topics
Supporting Highly Secured PCs Behind a Firewall
“We have the on prem Bomgar setup. We also have computers that are on our LAN that are LOCKED DOWN. These PCs have full access to the Bomgar server in our DMZ. These PCs do not have Internet Access. Internet Access is blocked for these PCs. When Internet is blocked, we cannot manage these PCs over Bomgar. As soon as we open up Internet, we can manage the PCs. Here’s the other thing, we can enable internet access, jump to the PC, disable internet access, and we still have the remote access session up without issue. Is there a way to manually add these PCs into Bomgar and not worry about this “phone home” check in that is happening?.”
Click here for the most popular articles In our Beekeepers Community
Upcoming and In Case You Missed It Webinars:
Road Maps
Upcoming RS Road Map Monday, August 11th, 2025
2025 July Product Road Map: Remote Support
User Groups:
Q2 PRA Virtual User Group Recording
Announcements
Earn $25 by reviewing BeyondTrust!
Your feedback not only helps us but also assists other businesses in making informed decisions. As a token of appreciation, we are offering $25 for each published review through G2 using the link below. Leave a review on G2 and earn $25!

Who To Contact
Need to reach someone from the team or have questions?
Find your main points of contact below.
Support:
Technical Support – Best Practice
Customer Success Management: