The Lock XP
|License:||Free to try|
|Op. System:||Win7 x32, Win7 x64, Win98, WinServer, WinVista, WinVista x64, WinXP|
|File size:||22.13 MB|
Publisher description for The Lock XP
The Lock provides user audit and monitoring, access control, Internet and system security for any computer running Windows XP, Server 2003, Server 2008, Windows Vista, Windows 7. The Lock now supports 64 bit versions of Windows 7. Running on Windows 9x/ME may work, but is no longer supported. The Lock is PL-1 compliant to Chapter 8, NISPOM. It also meets Sarbanes-Oxley Access Control, Intrusion Detection, and PC Auditing requirements, as well as meets HIPPA, Access, Authorization, and Security control requirements. All user security is group based configurable by any members of the Administrators group. User security can define system policy, logon times, internet access times, web site restrictions, and access to local resources such as programs and files and folders, including removable media (USB, flash, etc.), that can be restricted as it is plugged into the system. Restrict printer access in any Windows application. Restrict access to screen capture via the Print Screen key. Logging features will record web sites visited, programs run, and any security violations occurring while the user is logged in, and now supports the Firefox browser. Passwords can be verified on the local Windows system, a Windows server, or a remote Lock Security Manager server. A Netware Server is supported for password verification on Windows XP. The Lock has a built in cloning feature designed to make network installations a simple one step process. When used in conjunction with the Lock Security Manager Server, all remote systems may be kept up to date when The Lock has been updated on the SMS system. Tools are included with the Security Manager that will allow remote monitoring of any systems running The Lock and connecting to the Security Manager. Active Password monitoring is used to combat modification of Windows user passwords (usually with a bootable hacking disk) outside of the Windows GUI.