Secure privileged users
In addition to the risk of any malicious privileged user, privileged users pose great risks to an organization because they are high-value targets to hackers and adversaries eager to penetrate a company’s defenses.
All modifications performed by UserLock privileged users are now stringently monitored, audited and archived in a Windows application event log. Additionally an alert can be triggered for any setting or policy modification.
By verifying the trust given to privileged users, UserLock now goes further to help protect an organization from insider threats and adhere to numerous best practices and regulatory requirements for privileged user monitoring.
Delegating privileges in UserLock
UserLock now offers further granularity when setting permission rights for privileged users. Access to the different features is split on two privileges, ‘Read’ to display the section information and ‘Write’ which authorizes modifications.
In parallel with the new monitoring of all privilege user actions, this delegated administration feature allows organizations to extend the administration and management of UserLock across different trusted users.
Depending on the specific privileges assigned to the user, several operators can now manage UserLock and create and enforce policies to meet their business requirements and the changing needs of their organization.
The securing of all system administrators actions ensures organizations can follow and audit the different modifications made by different users who have been granted permission rights to manage UserLock.