User Access Security for Windows Active Directory. Getting Started

Network security in Active Directory Windows-based networks relies heavily on user’s login credentials. This video tutorial shows you how to install UserLock and start securing access to your Windows Active Directory environment.

Basic User Access Security with Active Directory

Active Directory provides basic user security, checking the passwords supplied match stored user profiles and then opening up access to resources. Active Directory is however just the starting point for most organizations when it comes to controlling, restricting and recording what users can do.

Applying further restrictions beyond native Windows Active Directory controls is addressed by the unique enterprise solution UserLock. It addresses very specific but important gaps in managing the security of a Windows network.

Enhance Active Directory Security for all User Access

With UserLock, an organization can restrict, control, and monitor all user access to protect and secure a Windows Active Directory network environment across all session types (including Wi-Fi).

Used in tandem with Group Policy (GP) to keep stringent control of a Windows network, an organization can keep users from accessing specific network resources with GP and also restrict login access by machine/device, location, time and prevent concurrent sessions.

Install UserLock in minutes on a standard Windows Server

To take users logon security controls far beyond native Windows functionality, install the UserLock primary server in the network zone you want to protect. The protected zone can be the whole network or one or multiple network domains or organizational units.

The installation can be done on any server member of the domain. There is no requirement to use a Domain Controller server. Any Windows 2003/2008/2008R2/2012 server can be the host.

As the video tutorial shows, a wizard walks you through the installation and takes just a few minutes.

Managing Windows Logon Session Events

To store all collected logon session events, UserLock requires the use of a database. It can be a Microsoft Access File, Microsoft SQL Server or Microsoft SQL Express. To make things easy during the evaluation process we include an Access database for you.

Setting and Enforcing User Access Restrictions

UserLock is intuitive and easy to use. Working in the modern Windows Server 2012-style interface, you simply specify the customized access restrictions and network protection and visibility automatically follows. With real-time monitoring of all login and session events you can track all access activity to have complete visibility across the Windows environment.

Quick Response to Security Threats from the Web Interface

The option to install the UserLock web interface allows you to manage UserLock remotely from anywhere in your network through a console in the web browser. This allows IT teams to quickly respond to any security threat at any time and from anywhere.