SuggestSoft.com

User Deprovision

Cayo | Suspend™ for Active Directory 1.0.1

Cayo | Suspend™ for Active Directory 1.0.1: Temporary or Permanent User/Group Suspension that is secure and compliant. user`s accounts. To properly suspend and secure AD users and groups, a complex and potentially error prone manual process must be followed. Because native tools lack a `suspend` process, security and compliance requirements such as SOX 404, HIPPA, and PCI are put at risk. Improperly suspending a user or group can also subject the organization to security breaches, audit failures and potential fines. AD`s disable or delete are NOT ENOUGH! Deleting






Secret User Pro 2.4: Create a hidden Windows user account and use your PC without leaving any history
Secret User Pro 2.4

User Pro allows you to easily create hidden Windows user accounts. With Secret User Pro, you`ll never need to delete internet history, recent file lists or personal files. The files within a Secret User Pro account are automatically protected from other users and will not show up in file searches made by other users. Secret User Pro accounts are properly hidden. They do not show on the welcome screen or in the "documents and settings" or "users"

hide user account, clearing history, history, internet history, hidden files, file protection, privacy software, secret user accounts, hidden user accounts, delete internet history, delete history, online privacy, security





Active Directory User Editor 1.0.0.0: Ever wanted to delegate editing of User content to HR or Admin staff?
Active Directory User Editor 1.0.0.0

User Editor, End users can edit user content without getting in touch with sensitive profile data. Using Active Directory User Editor, you can let the receptionists or team leaders manage all phone records, name and address management while IT staff takes care of the IT related tasks in the user profiles. With Active Directory User Editor you can safely let non tech staff to edit user related content as it is not possible to delete users or other

active, update active directory, directory, active directory manager, edit active directory users, delegate, edit active directory content, management



NetWrix Inactive Users Tracker 3.0.106: Automatically disables inactive user accounts based on last logon time
NetWrix Inactive Users Tracker 3.0.106

user account, leave it untouched for many days, and then use it to perform malicious activity against an organization. Another example is employee retirement: User accounts are usually disabled when an employee quits an organization. Most HR databases only keep information about "primary" user account, but what if a user had additional user accounts? Inactive Users Tracker automates the management of inactive user accounts. The program periodically

real last logon, disable inactive user, true last logon, freeware, block inactive user, identity management



LASsie for MS Access 5.0: A library you can reference to implement form/rpt level security in MS Access.
LASsie for MS Access 5.0

user`s sign on/user name. LASsie includes a friendly user sign-on form that prompts for a login user name and password. Users can change their own passwords via the included "change password" form. Optionally, the sign-on form can be bypassed and the user`s Windows login user name can be used. Once the user name is verified, the security groups that the user belongs to are loaded. Based on permissions/restrictions assigned to these groups, LASsie

filter, access, permission, protect, restrict, user level, microsoft, password, security, sign on, grant



LASsie 5.0: A library you can reference to implement form/rpt level security in MS Access.
LASsie 5.0

user`s sign on/user name. LASsie includes a friendly user sign-on form that prompts for a login user name and password. Users can change their own passwords via the included `change password` form. Optionally, the sign-on form can be bypassed and the user`s Windows login user name can be used. Once the user name is verified, the security groups that the user belongs to are loaded. Based on permissions/restrictions assigned to these groups, LASsie

filter, access, permission, protect, restrict, user level, microsoft, password, security, sign on, grant



No Image
ProfileLink 3.00

user to make different kinds of selections when launching applications. When the user logs on to the computer ProfileLink will start automatically and launch the applications that the user has assigned to the current hardware profile. ProfileLink will also set up the users default printer depending on hardware profile. If the user changes the default printer ProfileLink will register this and use this setting the next time the user logs on using

laptop, hardware profile, startup, profilelink


More Results: 1  2  3  4  5  6  

World IT News