Average Ratings 0 Ratings
Average Ratings 9 Ratings
Description
Conduct a thorough search within your Active Directory domain to identify user and computer accounts that are inactive by examining criteria such as last logon time and DNS record timestamps, among other factors. Once you have filtered the accounts, you can take several actions, including relocating them to a different organizational unit, disabling them, generating a random password, removing them from all associated groups, and more. It is crucial to efficiently identify and eliminate accounts that are no longer in use in your Active Directory environment, providing a clear report on both types of accounts. You have the option to search throughout the entire domain or limit your search to a specific organizational unit, accommodating multi-domain scenarios by specifying any domain and using alternate credentials if needed. Additionally, you can retrieve last logon details from all domain controllers or target specific ones, utilizing either the lastLogon or lastLogonTimeStamp attributes. For precision, you can filter the results to show only those accounts that have not logged in for a defined number of days, and you can verify the activity status of computer accounts by performing a Ping test along with a check on the DNS record timestamp to ensure they are still operational. This comprehensive approach ensures that your Active Directory remains organized and secure by removing unnecessary clutter.
Description
Protectimus SAAS two factor authentication service is already in the cloud and accessible 24/7. Register and start the integration via API, or a ready-made plugin. Protectimus On Premise MFA platform is available on your premises or in a private cloud. Radius, Citrix netScaler, XenApp VMWare and Active Directory, LDAP and Windows Logon and OWA, RoundCube and Dynamic Passwords, API and SDK, customized individual and development. Dynamic Strong Password authentication integrates directly to Microsoft Active Directory (or any user directory) to add six-digit passwords to users' static passwords. Today, data violation happens regularly. Strong authentication methods are essential if you want to ensure that your data is fully protected. Personal information is likely to be displayed without any external intervention. However, when it comes to business, we wouldn't limit user authentication or identification to a single password.
API Access
Has API
API Access
Has API
Pricing Details
$99 one-time payment
Free Trial
Free Version
Pricing Details
$33 per month
Free Trial
Free Version
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Deployment
Web-Based
On-Premises
iPhone App
iPad App
Android App
Windows
Mac
Linux
Chromebook
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Customer Support
Business Hours
Live Rep (24/7)
Online Support
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Types of Training
Training Docs
Webinars
Live Training (Online)
In Person
Vendor Details
Company Name
CJWDEV
Founded
2014
Country
United Kingdom
Website
www.cjwdev.com/Software/ADTidy/Info.html
Vendor Details
Company Name
Protectimus Limited
Founded
2013
Country
Ireland
Website
www.protectimus.com
Product Features
IT Management
Capacity Monitoring
Compliance Management
Event Logs
Hardware Inventory
IT Budgeting
License Management
Patch Management
Remote Access
Scheduling
Software Inventory
User Activity Monitoring
Product Features
Authentication
Biometric
Credential Management
Knowledge-Based Authentication
Mobile Authentication
Multifactor Authentication
Out-of-Band Authentication
Policy Management
Self Service Portal
Single Sign On
Social Sign On