
A Jumpoint is needed only for a Remote Jump, when the BeyondTrust user's computer cannot access the target computer directly. Within a LAN, the BeyondTrust user's computer can initiate a session to a Windows system directly without using a Jumpoint, if appropriate user permissions are enabled. A single Jumpoint installed on a computer within a LAN is used to access multiple systems, eliminating the need to pre-install software on every computer you might need to access. To run Microsoft® Remote Desktop Protocol sessions while maintaining a consistent audit trailĪ Jumpoint acts as a conduit for unattended access to computers on a known remote network.Access to SSH, Telnet, or vPro systems on that network, like servers, routers, POS systems or ATMs.To troubleshoot all Windows systems in a network without predeploying BeyondTrust clients on each system prior to connecting.A Jump Client Management interface in the representative console helps you manage your deployments. For example, customers who require unique support handling might be set up with Jump Client deployment to enhance administrative capabilities.

The Jump Client is pinned to a Jump Group, thus enhancing administrative oversight and efficiency, benefiting from the robust management accommodations present throughout BeyondTrust.

Privileged representatives may deploy Jump Clients dynamically from their representative console or download a mass deployable Jump Client from the /login administrative interface.

