Configuration guides
Learn how to apply additional protection settings to tailor UserLock to your environment.
Configure the client certificate authentication in UserLock Anywhere
Replace NTLM authentication.
Set idle time
Configure automatic logoff of inactive sessions.
Configure proxy handling to detect the real client IP
Detect the real client IP behind a proxy.
Secure remote access mailbox
Protect Exchange mailboxes accessed through IIS sessions.