+1-800-492-3951 or +3184.108.40.206.20 (GMT+1)
Secure Active Directory user logins with two factor authentication, contextual access controls and real-time monitoring and reporting.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems and in the cloud.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
See all insights
Two-Factor Authentication Solution for Windows & RDP Logons
Under a Cloud of Suspicion
Auditing File Access in the Cloud
Information Security Advice for SMB (Infographic)
The Role of File Auditing in Compliance
Key Indicators of Compromise to Prevent a Breach
Network security in Active Directory Windows-based networks relies heavily on user’s login credentials. This video tutorial shows you how to install UserLock and start securing access to your Windows Active Directory environment.
Active Directory provides basic user security, checking the passwords supplied match stored user profiles and then opening up access to resources. Active Directory is however just the starting point for most organizations when it comes to controlling, restricting and recording what users can do.
Applying further restrictions beyond native Windows Active Directory controls is addressed by the unique enterprise solution UserLock. It addresses very specific but important gaps in managing the security of a Windows network.
With UserLock, an organization can restrict, control, and monitor all user access to protect and secure a Windows Active Directory network environment across all session types (including Wi-Fi).
Used in tandem with Group Policy (GP) to keep stringent control of a Windows network, an organization can keep users from accessing specific network resources with GP and also restrict login access by machine/device, location, time and prevent concurrent sessions.
To take users logon security controls far beyond native Windows functionality, install the UserLock primary server in the network zone you want to protect. The protected zone can be the whole network or one or multiple network domains or organizational units.
The installation can be done on any server member of the domain. There is no requirement to use a Domain Controller server. Any Windows 2003/2008/2008R2/2012 server can be the host.
As the video tutorial shows, a wizard walks you through the installation and takes just a few minutes.
To store all collected logon session events, UserLock requires the use of a database. It can be a Microsoft Access File, Microsoft SQL Server or Microsoft SQL Express. To make things easy during the evaluation process we include an Access database for you.
UserLock is intuitive and easy to use. Working in the modern Windows Server 2012-style interface, you simply specify the customized access restrictions and network protection and visibility automatically follows. With real-time monitoring of all login and session events you can track all access activity to have complete visibility across the Windows environment.
The option to install the UserLock web interface allows you to manage UserLock remotely from anywhere in your network through a console in the web browser. This allows IT teams to quickly respond to any security threat at any time and from anywhere.
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.