Privileged User Monitoring & Auditing

Settings, logs and policy rules can be secured for all UserLock’s privileged users. Protect against bad or careless behavior by those who have administration rights and answer the needs for major regulatory compliance.


Secure privileged users

In addition to the risk of any malicious privileged user, privileged users pose great risks to an organization because they are high-value targets to hackers and adversaries eager to penetrate a company’s defenses.

All modifications performed by UserLock privileged users are now stringently monitored, audited and archived in a Windows application event log. Additionally an alert can be triggered for any setting or policy modification.

By verifying the trust given to privileged users, UserLock now goes further to help protect an organization from insider threats and adhere to numerous best practices and regulatory requirements for privileged user monitoring.

Delegating privileges in UserLock

UserLock now offers further granularity when setting permission rights for privileged users. Access to the different features is split on two privileges, ‘Read’ to display the section information and ‘Write’ which authorizes modifications.

In parallel with the new monitoring of all privilege user actions, this delegated administration feature allows organizations to extend the administration and management of UserLock across different trusted users.

Depending on the specific privileges assigned to the user, several operators can now manage UserLock and create and enforce policies to meet their business requirements and the changing needs of their organization.

The securing of all system administrators actions ensures organizations can follow and audit the different modifications made by different users who have been granted permission rights to manage UserLock.