UserLock presentation

UserLock provides a comprehensive layer of security over Windows-based networks at logon.
Reduce the risk of external attacks, internal security breaches and compliance issues.

Latest release

Multi-Factor Authentication (MFA)

UserLock 10 makes it easy to enable multi-factor authentication on Windows logon and RDP connections. Verify the identity of all users and secure access to your network. Learn more

Sorry no results found with your filters. Please try another search.



Getting started

User Access Security for Windows Active Directory

Network security in Active Directory Windows-based networks relies heavily on user’s login credentials. This video tutorial shows you how to install UserLock and start securing access to your Windows Active Directory environment.



How to Restrict and Monitor Windows User Access

Knowing who your users are and managing their access is central to effective IT security. UserLock extends Windows Active Directory security by applying further restrictions to authorized users based on a range of criteria. UserLock gives an important extra layer of control.



How to Restrict and Monitor Terminal Sessions

UserLock protects and supports all terminal sessions. You just need to install the agent on Terminal Servers. There is nothing to install on thin clients (terminals) themselves. To monitor terminal sessions you first need to deploy the UserLock desktop agent on the Terminal Server. This is the same micro agent that is used for workstation protection and with the same requirements.



How to Restrict and Monitor IIS Sessions

In addition to workstation, terminal and RAS sessions, UserLock can control, restrict and monitor IIS (Internet Information Services) sessions. This feature allows an organization to define by protected account the number of maximum concurrent IIS sessions on a specific IIS application such as Outlook Web Access or Intranet site. The generated logs for all logon actions can also be used for reporting.



Report and Audit on all Windows Active Directory Access Sessions

With restrictions set and enforced UserLock then empowers IT teams to track and record all user activity and gives network administrators a way to remotely control user sessions.



Managing User Access Policies with UserLock

Different properties and option settings are available on the UserLock server to help manage user access within an organization. This is important when setting a customized access policy that reflects the needs for different groups and individuals that work within the organization.



Cleaning the Windows Session Logon Events History

The logon cleaner in UserLock deletes session events from the database. By default UserLock keeps logon events indefinitely. Removing old logon events prevents the database from becoming too large. Deciding when to remove old logon events will depend on your organizations regulations and compliance policies.



Working Hours Reports

Detailed and interactive reporting on users’ connection times. Manage and react to employees’ attendance, overtime thresholds, productivity and suspicious access times.



Ensuring Access Security with the UserLock Backup Server

A UserLock backup server can be installed on the protected zone, to guarantee failover if the primary UserLock server experiences any hardware or network issues.



Advanced Agent Deployment of UserLock

With simple, intuitive deployment processes, IT managers can rapidly install UserLock and instantly control user access and protect their Windows Network. Three different ways exist to deploy the UserLock Desktop agent.



Force Remote Logoff after Idle Time

With UserLock, watch how IT administrators can set an automatic forced logoff, on all locked or open machines, after a certain idle time. This includes remote desktop sessions opened by the domain user.



React Instantly to access events with Computer Commands

UserLock offers the possibility to launch from the console personalized commands targeting any computers. With this tutorial we can see how to define and use these Computer commands.


No Easy Feat: The Challenge of Securing the SMB

Whether you’re an MSP or the IT pro in an SMB, watch the educational webcast No Easy Feat: The Challenge of Securing the SMB, hosted by cybersecurity expert Nick Cavalancia, and Kate Fleming from IS Decisions.