UserLock presentation

UserLock provides a comprehensive layer of security over Windows-based networks at logon.
Reduce the risk of external attacks, internal security breaches and compliance issues.

Latest release

Working Hours Reports

UserLock 9.7 - Detailed and interactive reporting on users’ connection times. Manage and react to employees’ attendance, overtime thresholds, productivity and suspicious access times. Learn more

Sorry no results found with your filters. Please try another search.

Tutorials

 

Getting started

User Access Security for Windows Active Directory

Network security in Active Directory Windows-based networks relies heavily on user’s login credentials. This video tutorial shows you how to install UserLock and start securing access to your Windows Active Directory environment.

 

Tutorial

How to Restrict and Monitor Windows User Access

Knowing who your users are and managing their access is central to effective IT security. UserLock extends Windows Active Directory security by applying further restrictions to authorized users based on a range of criteria. UserLock gives an important extra layer of control.

 

Tutorial

How to Restrict and Monitor Terminal Sessions

UserLock protects and supports all terminal sessions. You just need to install the agent on Terminal Servers. There is nothing to install on thin clients (terminals) themselves. To monitor terminal sessions you first need to deploy the UserLock desktop agent on the Terminal Server. This is the same micro agent that is used for workstation protection and with the same requirements.

 

Tutorial

How to Restrict and Monitor IIS Sessions

In addition to workstation, terminal and RAS sessions, UserLock can control, restrict and monitor IIS (Internet Information Services) sessions. This feature allows an organization to define by protected account the number of maximum concurrent IIS sessions on a specific IIS application such as Outlook Web Access or Intranet site. The generated logs for all logon actions can also be used for reporting.

 

Tutorial

Report and Audit on all Windows Active Directory Access Sessions

With restrictions set and enforced UserLock then empowers IT teams to track and record all user activity and gives network administrators a way to remotely control user sessions.

 

Tutorial

Managing User Access Policies with UserLock

Different properties and option settings are available on the UserLock server to help manage user access within an organization. This is important when setting a customized access policy that reflects the needs for different groups and individuals that work within the organization.

 

Tutorial

Cleaning the Windows Session Logon Events History

The logon cleaner in UserLock deletes session events from the database. By default UserLock keeps logon events indefinitely. Removing old logon events prevents the database from becoming too large. Deciding when to remove old logon events will depend on your organizations regulations and compliance policies.

 

Tutorial

Ensuring Access Security with the UserLock Backup Server

A UserLock backup server can be installed on the protected zone, to guarantee failover if the primary UserLock server experiences any hardware or network issues.

 

Tutorial

Advanced Agent Deployment of UserLock

With simple, intuitive deployment processes, IT managers can rapidly install UserLock and instantly control user access and protect their Windows Network. Three different ways exist to deploy the UserLock Desktop agent.

 

Tutorial

React Instantly to access events with Computer Commands

UserLock offers the possibility to launch from the console personalized commands targeting any computers. With this tutorial we can see how to define and use these Computer commands.