See all insights
Apply 2FA on Windows AD logins, IIS, VPN, RDP & RD Gateway, Off-network and SaaS connections.
Choose between push notifications, hardware devices, or authenticator apps as MFA methods.
Secure access to cloud apps with SSO combined with MFA and context-aware restrictions.
Monitor, alert, and respond in real time to all user access activity.
Control how users access the network based on machine or device, time, session type or simultaneous connections.
Get centralized auditing across your network and report on all Windows user access events.
Network security in Active Directory Windows-based networks relies heavily on user’s login credentials. This video tutorial shows you how to install UserLock and start securing access to your Windows Active Directory environment.
Active Directory provides basic user security, checking the passwords supplied match stored user profiles and then opening up access to resources. Active Directory is however just the starting point for most organizations when it comes to controlling, restricting and recording what users can do.
Applying further restrictions beyond native Windows Active Directory controls is addressed by the unique enterprise solution UserLock. It addresses very specific but important gaps in managing the security of a Windows network.
With UserLock, an organization can restrict, control, and monitor all user access to protect and secure a Windows Active Directory network environment across all session types (including Wi-Fi).
Used in tandem with Group Policy (GP) to keep stringent control of a Windows network, an organization can keep users from accessing specific network resources with GP and also restrict login access by machine/device, location, time and prevent concurrent sessions.
To take users logon security controls far beyond native Windows functionality, install the UserLock primary server in the network zone you want to protect. The protected zone can be the whole network or one or multiple network domains or organizational units.
The installation can be done on any server member of the domain. There is no requirement to use a Domain Controller server. Any Windows 2003/2008/2008R2/2012 server can be the host.
As the video tutorial shows, a wizard walks you through the installation and takes just a few minutes.
To store all collected logon session events, UserLock requires the use of a database. It can be a Microsoft Access File, Microsoft SQL Server or Microsoft SQL Express. To make things easy during the evaluation process we include an Access database for you.
UserLock is intuitive and easy to use. Working in the modern Windows Server 2012-style interface, you simply specify the customized access restrictions and network protection and visibility automatically follows. With real-time monitoring of all login and session events you can track all access activity to have complete visibility across the Windows environment.
The option to install the UserLock web interface allows you to manage UserLock remotely from anywhere in your network through a console in the web browser. This allows IT teams to quickly respond to any security threat at any time and from anywhere.
Free number for US & Canada: + 1-800-492-3951
GMT +1: +33 5 59 41 42 20
© IS Decisions