Find where a user is logged on in a domain – and more

To detect where your users are logged on in real-time, watch this 2-minute overview of UserLock. It will also show you how to react and respond to any login, direct from the UserLock console, and how to start controlling and restricting how your users can connect.

Video Transcription:

Real-Time Visibility

UserLock allows you to see and react in real-time to all user activity across your network. The intuitive console gives you real-time information on user habits such as currently active and locked sessions, users with multiple sessions and connections to web applications such as Outlook Web Access.

React & Respond to Access Activity

From the console, you can interact with your users by sending a pop-up message to an open session. You can also perform daily tasks such as logging off an open or locked session. For helpdesk requests, you can easily identify where the user has an open session and remote desktop into that machine, to troubleshoot the issue.

Report on all Session History

You can right-click on a specific user to access some quick reports such as the session history, where you can see all the connections of that user for the last 30 days. You can customize your reports by selecting a predefined one under the reports tab. Simply enter the criteria you’d like to add such as session types, a specific group of users, as well as a time frame. You can choose to schedule this report or launch it in real-time. And here I see all the connection attempts for those users during that time.

Report on Working Hours

You can use the working hours reports to see how long your users are connected throughout the day. This report quickly shows you the users first and last connection of the day as well as total active time. Use the dynamic filters below to search for users’ first logon after a certain time for example or those with the total session time of under 8 hours. Click print data to export the report as proof of users total working hours including active versus locked time.

Control Access Restrictions

To manage who connects to your network, create a protected account for a user, group or OU from your Active Directory to put in place access policies that secure your environment without disrupting your users. To comply with security policies you can limit your users to a maximum amount of concurrent sessions. Then use the workstation restrictions to further reduce your attack surface by allowing these users access to a specific computer OU from your Active Directory.

So that’s how you can manage access policies across your network while monitoring and protecting all connections with UserLock.

A Free Fully Functional 30 Day UserLock Trial

Don’t take our word for it, download now the fully functional free trial and see for yourself how easily UserLock can help you identify and manage all logins to your domain.

Share this post :

Chris is Directeur Général Adjoint of IS Decisions. IS Decisions software offers organizations proven and effective solutions to help protect a Windows Active Directory Network against external attacks and the insider threat.

Secured By miniOrange