- Free Edition
- Quick Links
- MFA
- Self-Service Password Management
- Single Sign-On
- Password Synchronizer
- Password Policy Enforcer
- Employee Self-Service
- Reporting and auditing
- Integrations
- Related Products
- ADManager Plus Active Directory Management & Reporting
- ADAudit Plus Real-time Active Directory Auditing and UBA
- Exchange Reporter Plus Exchange Server Auditing & Reporting
- EventLog Analyzer Real-time Log Analysis & Reporting
- M365 Manager Plus Microsoft 365 Management & Reporting Tool
- DataSecurity Plus File server auditing & data discovery
- RecoveryManager Plus Enterprise backup and recovery tool
- SharePoint Manager Plus SharePoint Reporting and Auditing
- AD360 Integrated Identity & Access Management
- Log360 (On-Premise | Cloud) Comprehensive SIEM and UEBA
- AD Free Tools Active Directory FREE Tools
What is an air-gapped network?
An air gap is a security measure that physically or logically isolates systems from unsecured networks such as the internet or corporate intranets. This ensures that air-gapped systems remain protected from external threats like malware, ransomware, or unauthorized access. Industries handling sensitive information, such as defense, healthcare, finance, and manufacturing, rely on air-gapped environments to safeguard their operations.
However, even with strong isolation, threats can arise from compromised external devices, insider activity, or poorly controlled data transfers. Additionally, air-gapped network attacks have proven that physical separation alone is not enough to prevent cyber intrusions.
Understanding air-gapped security challenges
Organizations often believe that an air gap is enough to keep their systems secure. While isolation reduces risk, attackers have found ways to exploit human error, hardware vulnerabilities, and insider threats. Without additional layers of protection, sensitive resources in air-gapped computers or air-gapped cloud environments remain vulnerable. Here are some common security risks organizations utilizing air-gapped systems face:
- Human error and insider threats: Even in isolated systems, misconfigurations, weak passwords, or malicious insiders can expose air-gapped environments to risk.
- Infected external storage devices: Malware can infiltrate air-gapped computers through USB drives, external hard disks, or other removable media.
- Exploitation of hardware vulnerabilities: Attackers may leverage compromised endpoints, software flaws, or supply chain risks to breach air-gapped networks.
- Lack of continuous monitoring: Since air-gapped infrastructure operates offline, delayed detection of intrusions makes recovery harder and increases potential damage.
Why MFA is crucial even in air-gapped environments
Implementing MFA for air-gapped networks ensures that access to crucial systems requires multiple forms of identity verification, making it harder for attackers to breach defenses—even when systems are offline or disconnected from domain controllers. This layered approach helps organizations mitigate risks and protect sensitive data effectively.
Frameworks such as NIST guidelines support this approach by recommending strong authentication controls and network segmentation for critical systems—principles that align perfectly with the use of MFA in air-gapped infrastructure.
An effective MFA solution to fortify isolated, air-gapped systems
A security solution designed for air-gapped setups must support authentication methods that function without internet access or continuous network connectivity. It should be easy to deploy and integrate with existing environments while enforcing strict access controls.
ADSelfService Plus enables organizations to implement MFA for air-gapped networks using only an Active Directory (AD) domain for setup. It provides a secure, offline authentication mechanism that ensures users are verified even in highly isolated environments. This solution supports a range of authentication methods without compromising the integrity of air-gapped systems or relying on external services.
Step-by-step air-gapped MFA process
Here's how an MFA attempt works in an air-gapped system through ADSelfService Plus:
- A user attempts to log in to an air -gapped computer in the isolated network.
- ADSelfService Plus prompts the user to complete the first step of authentication by entering their login credentials.
- Once successful, the second factor for air-gapped MFA is initiated without requiring internet connectivity.
- If the authentication is successful, access is granted. If not, the login attempt is blocked, preventing unauthorized access even in the event of an air-gapped network attack.
- Every authentication attempt is logged locally, ensuring traceability and compliance within the air-gapped environment.
Key features that strengthen MFA for air-gapped networks
ADSelfService Plus offers the following capabilities that aid with setting up an advanced MFA flow for the air-gapped security framework.
Authentication methods without internet dependency
ADSelfService Plus supports authentication methods such as FIDO2 passkeys, other custom hardware tokens, time-based one-time passwords (TOTP), and smart card—all configurable without internet access. These options are ideal for securing air-gapped computers, and other offline assets.
Offline MFA even without domain connectivity
When systems are disconnected from the air-gapped network or domain controller, ADSelfService Plus' offline MFA ensures that users still authenticate using locally cached credentials combined with secondary factors. This safeguards air-gapped environments from unauthorized access, even during extended periods of isolation.
Protection against air-gapped network attacks
By enforcing authentication at every machine login, the solution mitigates threats from bad insider actors, removable storage, or hardware manipulation. It is a vital defense against air-gapped network attacks, ensuring that system isolation is reinforced by strong identity verification.
Simple setup using only the AD domain
With setup requiring only an Active Directory domain, organizations can implement ADSelfService Plus' MFA for air-gapped networks without relying on cloud services or internet access. This makes deployment easier while maintaining the integrity of air-gapped infrastructure.
Benefits of implementing air-gapped MFA
Here's why implementing air-gapped MFA with ADSelfService Plus can be beneficial for your organization:
- Seamless login experience : Enable secure, consistent logins to air-gapped computers and devices without internet dependency.
- Prevent sophisticated cyberattacks : Block insider threats, credential theft, and air-gapped network attacks with strong MFA.
- Ensure compliance : Align with NIST SP 800-63B, GDPR, and HIPAA requirements for isolated systems.
- Secure isolated logon attempts : Protect local and remote logins across Windows, macOS, and Linux with advanced MFA.
- Fine-grained MFA flows: Apply custom MFA rules for specific OU, groups, and domains based on users' privilege and job role.
- Conditional access enforcement : Automatically adapt MFA based on time of access, device used, and IP address for stronger air-gapped security.
Highlights of ADSelfService Plus
Password self-service
Unburden Windows AD users from lengthy help desk calls by empowering them with self-service password reset and account unlock capabilities.
Multi-factor authentication
Enable context-based MFA with 20 different authentication factors for endpoint, application, VPN, OWA, and RDP logins.
One identity with single sign-on
Get seamless one-click access to more than 100 cloud applications. With enterprise single sign-on (SSO), users can access all their cloud applications using their Windows AD credentials.
Password and account expiry notifications
Notify Windows AD users of their impending password and account expiry via email and SMS notifications.
Password synchronization
Synchronize Windows AD user passwords and account changes across multiple systems automatically, including Microsoft 365, Google Workspace, IBM iSeries, and more.
Password policy enforcer
Strong passwords resist various hacking threats. Enforce Windows AD users to adhere to compliant passwords by displaying password complexity requirements.
