SOLUTION
IAM Identity Authentication Management
SCENARIO

Intranet-accessed devices must be identified and managed, and be granted the minimal authority based on the identities, making digital identities visual for managers.

• Enterprises hope to force all computers to comply with their security policies, including using specific AD accounts for logging in specific PC, controlling all Windows devices, etc.

• Enterprises need to monitor changes in files in shared file folders, and detect latent security risks and abnormalities.

SOLUTION

• Through binding AD accounts and computers, forbidden local login, forbidden unauthorized domain exit, etc., UPAS forces all computers to follow companies’ security policies and use specific AD accounts for logging in specific PC, integrates AD information and device information, and provides account use records.

• It can detect changes in files in shared file folders, including operations of addition, revision, deletion, etc., and detect latent security risk in a timely manner to protect company data security.

• Thorough detecting SID repetition events, and privileged account login and logout records and local accounts, and other information, it assists the administrator in discovering and responding to abnormalities, and control all devices which should be accessed to the AD domain.

FEATURES
Mandatory login via Active Directory (AD)
All devices must be logged in via AD accounts, and logging from the host is prohibited. The AD account can be bound to the computer name, so users only log in to the designated account.
Integration of identity and asset information
The system integrates employee information, including IP usage record, IP configuration list, Computer name, AD account, MAC address, brand of network card and login type, and provides the date, time, and the AD domain usage report. 
Raise AD management standard
Automate detection of leaving AD domain or device not added into the domain with AD login/online information. Force the blocking and remediate the device upon adding into the AD domain. Additionally, the blocked device is able to be added into the domain. Raise AD management rate by up to 98%.
 
MODULES
ADVantage
Through binding AD accounts and computers, forbidden local login, forbidden unauthorized domain exit, etc., it forces all computers to follow companies' security policies, use specific AD accounts for logging in specific PC, make security politics and management cover all Windows devices, integrates over 20 AD information and device information, and provides account use records.