Would you like to see the site in a different language?
Automatically blacklist known dangerous IP addresses using community threat intelligence, blocking millions of hacker IPs daily.
View a world map of incoming connections in real time. Pins highlight blocked threats and allowed clients for instant visibility.
Restrict remote access by country. Administrators can whitelist specific countries (or block others), ensuring only allowed nations' IPs gain entry.
Enforce LAN-only mode: block all public Internet IPs, allowing connections only from private or pre-approved IP addresses.
Define which programs and network ports are monitored by geographic protection, including RDP, VNC, Telnet, and the TSplus HTML5 web service.
Single interface for blocked/whitelisted IPs. Easily toggle between viewing all, blocked, or trusted IPs, simplifying access-list administration.
Quickly filter the IP list using keywords to streamline large-list management.
Add descriptive notes to IP entries so administrators can identify them quickly during audits.
Select multiple IP entries and apply actions (block or whitelist) in bulk, saving time when updating large address sets.
Easily unblock IPs from the firewall tab. Any blocked address can be removed or moved to the whitelist through the advanced interface.
Monitors failed Windows logins and automatically blocks IPs after a set number of failures, thwarting brute-force attacks on RDP and TSplus portals.
Administrators set the maximum failed login attempts and counter reset interval, tuning the defense to their risk tolerance.
Exempt specific IPs (e.g. admin workstations) from brute-force blocking, ensuring legitimate users are never locked out.
Optionally ignore all LAN/private addresses so attacks originating from private subnets won't trigger the brute-force counter.
Failures first trigger temporary soft lock blocks. If an IP repeatedly triggers blocks, it is escalated to a permanent ban after a configurable number of soft locks.
Define precise access schedules per user or group, specifying days of week and time ranges during which logins are allowed.
Option to simply always permit or always deny an account regardless of time, bypassing schedules as needed.
Assign a time zone for each user's work hours, so schedules align with users' actual office hours across different locations.
User sessions are forcibly disconnected once the permitted time window ends, ensuring no one stays logged in beyond allowed hours.
Schedule an in-session warning prompt before auto-logout, giving users time to save work.
If a user belongs to multiple groups with different schedules, the system applies the most permissive access to avoid unintended lockouts.
Continuously scans file operations to instantly catch ransomware-like behavior such as rapid file encryption or extension changes.
Uses behavior-based algorithms to detect zero-day and unknown ransomware. The system plants bait files in key folders to lure threats.
A seamless learning period observes normal file and user activity patterns, minimizing false positives and adapting automatically to distinguish legitimate operations from threats.
Upon detecting ransomware, Advanced Security instantly halts the offending process and quarantines the affected files for administrator review.
Generates incident reports revealing the attack's source and affected processes to help admins understand threats and improve future defenses.
Configure notifications for security incidents via email (SMTP), SMS, or Microsoft Teams, keeping admins informed of critical events in real time.
Before remediation, the system creates snapshots of modified files. Admins can quickly restore snapshots and configure retention policy.
Define harmless file extensions to exclude from ransomware scans, reducing unnecessary alerts and overhead.
Three built-in session modes (Windows, Secured Desktop, Kiosk) implement industry best-practice restrictions from standard desktop to fully locked-down kiosk.
Each mode can be customized. Administrators toggle specific elements (desktop icons, drives, applications) on or off to tailor the lock-down level per user.
Prevent users from right-clicking or opening context menus in any session by enabling Restrict Right Click and Remove Context Menu options.
Restrict each user to connecting only from pre-registered devices by machine name. Unknown devices are automatically blocked.
Enforce two-factor-like security by binding a user account to specific devices. An attacker cannot connect without the recognized device, even with valid credentials.
The first time a user connects from a device, Advanced Security can auto-add that device to their allowed list after one full workday, simplifying initial setup.
A side-by-side GUI lists users/groups and resources (folders, files, printers). Administrators quickly grant or deny four access levels to any resource for any user or group.
Drill down into any specific file or folder to see exactly which users/groups have what permissions, enabling fast auditing of access rights.
View a history of permission modifications via Windows Event Viewer to track who changed permissions and when, providing accountability for resource security.
A unified interface displays the latest security events and feature statuses, letting admins see disabled protections and navigate quickly to detailed settings pages.
All security-related events are logged in real time. The log auto-refreshes every few seconds, and admins can search or filter entries to identify critical incidents.
Use the log's search bar to find specific events quickly. Right-click on a log entry to perform instant actions such as Unblock IP directly from the event log.
Configure Advanced Security to notify you through email, SMS, and Microsoft Teams for flexible, real-time alert delivery.
Generate and email periodic security summaries. Admins choose the frequency and which events to include for concise overviews of key security activity.
Visual indicators (green/red icons) at the top of the security log show whether each protection feature (firewall, brute-force, etc.) is active.
The dashboard includes shortcuts to key sections (Firewall, Active Sessions, Ransomware Protection, etc.) for one-click navigation to common administration tools.
For local (console) users, admins can hide desktop elements (taskbar, Control Panel, etc.) similarly to Kiosk mode, extending security lockdown beyond remote sessions.
Every remote client's machine name is verified. Connections from unrecognized machine names are blocked, preventing unauthorized devices from bypassing security.
Administrators can add specific user accounts or AD groups to an ignore list, exempting whitelisted users from all Advanced Security rules.
Select programs can be excluded from scanning. Trusted backup or system utilities can be placed on a Programs Allow List so they are ignored by Ransomware Protection.
All rules can be set individually for users or groups. The system applies the most permissive setting among them, allowing granular security policies with clear precedence.