Category Guidance Document Organisation Australian Signals Directorate's Australian Cyber Security Centre (ASD's ACSC) Type Standard Access Open Status Active Created Jun-11 Updated Nov-23 This publication provides guidance on how to effectively restrict administrative privileges. This is one of the most effective mitigation strategies to ensure IT system security. Restricting administrative privileges forms part of Essential Eight, which is designed to protect organisations' internet-connected IT networks against cyber threats.Main sections:- Introduction- Why administrative privileges should be restricted- Approaches which do not restrict administrative privileges- How to restrict administrative privileges Access Restricting Administrative Privileges By accessing this content, you are leaving this website. The Agency takes no responsibility for the accuracy of content on the destination page.