TSPLUS REMOTE ACCESS FEATURES

Network Access & Firewall Security

Block Malicious IPs

Automatically blacklist known dangerous IP addresses using community threat intelligence, blocking millions of hacker IPs daily.

Live Connection Map

View a world map of incoming connections in real time. Pins highlight blocked threats and allowed clients for instant visibility.

Country-Based Filtering

Restrict remote access by country. Administrators can whitelist specific countries (or block others), ensuring only allowed nations' IPs gain entry.

Internet-Only Restriction

Enforce LAN-only mode: block all public Internet IPs, allowing connections only from private or pre-approved IP addresses.

Watched Processes & Ports

Define which programs and network ports are monitored by geographic protection, including RDP, VNC, Telnet, and the TSplus HTML5 web service.

Unified Firewall Management

Single interface for blocked/whitelisted IPs. Easily toggle between viewing all, blocked, or trusted IPs, simplifying access-list administration.

Firewall IP Search Bar

Quickly filter the IP list using keywords to streamline large-list management.

IP Address Annotations

Add descriptive notes to IP entries so administrators can identify them quickly during audits.

Bulk IP Editing

Select multiple IP entries and apply actions (block or whitelist) in bulk, saving time when updating large address sets.

Blocked-IP Unblocking

Easily unblock IPs from the firewall tab. Any blocked address can be removed or moved to the whitelist through the advanced interface.

Intrusion Prevention (Brute-Force Protection)

Automatic Login Blocking

Monitors failed Windows logins and automatically blocks IPs after a set number of failures, thwarting brute-force attacks on RDP and TSplus portals.

Configurable Failure Threshold

Administrators set the maximum failed login attempts and counter reset interval, tuning the defense to their risk tolerance.

Brute-Force Whitelist

Exempt specific IPs (e.g. admin workstations) from brute-force blocking, ensuring legitimate users are never locked out.

Ignore Local/Private IPs

Optionally ignore all LAN/private addresses so attacks originating from private subnets won't trigger the brute-force counter.

Soft Lock & Permanent Ban

Failures first trigger temporary soft lock blocks. If an IP repeatedly triggers blocks, it is escalated to a permanent ban after a configurable number of soft locks.

Time-Based Access Control

Working Hours Scheduling

Define precise access schedules per user or group, specifying days of week and time ranges during which logins are allowed.

Always Allow / Always Block

Option to simply always permit or always deny an account regardless of time, bypassing schedules as needed.

Time Zone Support

Assign a time zone for each user's work hours, so schedules align with users' actual office hours across different locations.

Automatic Session Logout

User sessions are forcibly disconnected once the permitted time window ends, ensuring no one stays logged in beyond allowed hours.

Pre-Logout Warning

Schedule an in-session warning prompt before auto-logout, giving users time to save work.

User/Group Priority Rules

If a user belongs to multiple groups with different schedules, the system applies the most permissive access to avoid unintended lockouts.

Ransomware Protection

Real-Time Ransomware Detection

Continuously scans file operations to instantly catch ransomware-like behavior such as rapid file encryption or extension changes.

Predictive Behavioral Analysis

Uses behavior-based algorithms to detect zero-day and unknown ransomware. The system plants bait files in key folders to lure threats.

Self-Learning Mode

A seamless learning period observes normal file and user activity patterns, minimizing false positives and adapting automatically to distinguish legitimate operations from threats.

Automated Threat Quarantine

Upon detecting ransomware, Advanced Security instantly halts the offending process and quarantines the affected files for administrator review.

Detailed Ransomware Reports

Generates incident reports revealing the attack's source and affected processes to help admins understand threats and improve future defenses.

Email/SMS/Teams Alerts

Configure notifications for security incidents via email (SMTP), SMS, or Microsoft Teams, keeping admins informed of critical events in real time.

File Snapshots

Before remediation, the system creates snapshots of modified files. Admins can quickly restore snapshots and configure retention policy.

File Type Exclusions

Define harmless file extensions to exclude from ransomware scans, reducing unnecessary alerts and overhead.

Session Security

Security Mode Profiles

Three built-in session modes (Windows, Secured Desktop, Kiosk) implement industry best-practice restrictions from standard desktop to fully locked-down kiosk.

Customizable Security Profiles

Each mode can be customized. Administrators toggle specific elements (desktop icons, drives, applications) on or off to tailor the lock-down level per user.

Disable Right-Click/Context Menus

Prevent users from right-clicking or opening context menus in any session by enabling Restrict Right Click and Remove Context Menu options.

Device & Endpoint Security

Trusted Device Whitelisting

Restrict each user to connecting only from pre-registered devices by machine name. Unknown devices are automatically blocked.

Device-User Pairing (Endpoint Protection)

Enforce two-factor-like security by binding a user account to specific devices. An attacker cannot connect without the recognized device, even with valid credentials.

Automatic Device Learning

The first time a user connects from a device, Advanced Security can auto-add that device to their allowed list after one full workday, simplifying initial setup.

Permissions Management

Permissions Dashboard

A side-by-side GUI lists users/groups and resources (folders, files, printers). Administrators quickly grant or deny four access levels to any resource for any user or group.

Permissions Inspector

Drill down into any specific file or folder to see exactly which users/groups have what permissions, enabling fast auditing of access rights.

Permission Change Audit

View a history of permission modifications via Windows Event Viewer to track who changed permissions and when, providing accountability for resource security.

Monitoring, Alerts & Reporting

Centralized Dashboard

A unified interface displays the latest security events and feature statuses, letting admins see disabled protections and navigate quickly to detailed settings pages.

Live Security Event Log

All security-related events are logged in real time. The log auto-refreshes every few seconds, and admins can search or filter entries to identify critical incidents.

Event Interaction

Use the log's search bar to find specific events quickly. Right-click on a log entry to perform instant actions such as Unblock IP directly from the event log.

Multi-Channel Alerts

Configure Advanced Security to notify you through email, SMS, and Microsoft Teams for flexible, real-time alert delivery.

Scheduled Reports

Generate and email periodic security summaries. Admins choose the frequency and which events to include for concise overviews of key security activity.

Administration & Miscellaneous

Feature Status Indicators

Visual indicators (green/red icons) at the top of the security log show whether each protection feature (firewall, brute-force, etc.) is active.

Quick-Access Tiles

The dashboard includes shortcuts to key sections (Firewall, Active Sessions, Ransomware Protection, etc.) for one-click navigation to common administration tools.

Secure Desktop Interface

For local (console) users, admins can hide desktop elements (taskbar, Control Panel, etc.) similarly to Kiosk mode, extending security lockdown beyond remote sessions.

Endpoint Validation

Every remote client's machine name is verified. Connections from unrecognized machine names are blocked, preventing unauthorized devices from bypassing security.

User Whitelisting

Administrators can add specific user accounts or AD groups to an ignore list, exempting whitelisted users from all Advanced Security rules.

Program Whitelisting

Select programs can be excluded from scanning. Trusted backup or system utilities can be placed on a Programs Allow List so they are ignored by Ransomware Protection.

Per-User/Group Policy

All rules can be set individually for users or groups. The system applies the most permissive setting among them, allowing granular security policies with clear precedence.

back to top of the page icon