Pricing  Get Quote
 
 

An MFA solution to solve your unique use cases

     

Account compromises—that can result in unauthorized access to sensitive information, identity theft, financial loss, and reputational damage—have become a prominent threat in today's digital landscape.

Microsoft says MFA blocks 99.9% of account compromises. Despite this, only 28% of users use MFA during login. To mitigate unnecessary risks and enhance security measures, individuals and organizations should implement MFA.

With ManageEngine ADSelfService Plus, you can implement various MFA options in your authentication process. Here are some use cases highlighting how ADSelfService Plus' MFA can protect you from cyberattacks.

  • Use case 1
  • Use case 2
  • Use case 3
  • Use case 4
  • Use case 5
  • Use case 6
Use case 1

Secure against credential-based attacks

 Secure against credential-based attacks

Most organizations use directory services like AD to verify usernames and password combinations to authorize account access. The same password is used for multiple accounts by 68% of users. If an attacker gains access to a user's single password, they can potentially access resources across various accounts. To prevent credential-based attacks, it is essential to implement MFA. Even if the attacker compromises the user's credentials, they cannot gain access to resources without the additional authentication factor.

How ADSelfService Plus helps

ADSelfService Plus' Endpoint MFA secures access to:

  • Windows, macOS, and Linux machines
  • VPN providers, like Fortinet, Cisco AnyConnect, Pulse, and more
  • Endpoints supporting RADIUS authentication, such as Citrix Gateway, VMWare Horizon, and Microsoft Remote Desktop Gateway (RDP)
  • Outlook Web Access (OWA) logins
  • User Account Control (UAC)
  • Cloud applications
Use case 2

MFA when not connected to the internet

MFA when not connected to the internet

MFA isn't possible when an authentication server is offline or inaccessible. In such cases, offline MFA plays a crucial role in hardening endpoint and network security.

For instance, your laptop is stolen and your network connectivity is disabled. If offline MFA is enabled, both the initial login credentials and the offline authentication factor must be bypassed. The attacker would need multiple factors for authentication, which significantly increases the difficulty.

How ADSelfService Plus helps

ADSelfService Plus' Offline MFA enables remote users to securely authenticate via MFA even if,

  • The user has an internet connection but is not connected to the MFA server.
  • The user is not connected to the internet or the MFA server.

ADSelfService Plus supports offline MFA for Windows, RDP, and UAC logons.

The supported authenticators are

  1. Google Authenticator
  2. Zoho OneAuth TOTP Authenticator
  3. Microsoft Authenticator
  4. Custom TOTP authenticators
Use case 3

Role-based authentication

Role-based authentication

Organizations ensure that each user is given access appropriate to their job function and privileges.

For example, in an educational institution, there are user groups with specific roles and access privileges. For instance,

  • Students submit assignments, access course materials, and participate in online forums. SMS-based codes or push notifications can be used for MFA without overwhelming users.
  • Faculty and staff have access to student records, research databases, and learning management systems. To strengthen security, they can use hardware tokens, fingerprint scans, or time-based authentication apps.

How ADSelfService Plus helps

With ADSelfService Plus' MFA, admins can select a self-service policy and configure authentication methods. It can be applied to all users or only to users in specific OUs or groups within the selected domain.

It supports 19 authentication methods, including SMS verification, email verification, push notifications, DUO security, Google Authenticator, and Microsoft Authenticator.

Use case 4

Risk-based authentication

Risk-based authentication

Remote users are more vulnerable to cyberattacks because they might access corporate resources through public networks, use personal devices with potentially weaker security measures, and expose themselves to a wider range of potential threats.

To enhance security, admins should enforce MFA for remote users. Conditional access policies empower admins to manage access effectively by allowing complete and unrestricted access, limited access, or no access to resources.

How ADSelfService Plus helps

  • ADSelfService Plus' conditional access automatically assigns access policies to determine whether to enable endpoint MFA based on the users' parameters such as IP address, device, time of access, and geolocation.
  • Based on the risk level, ADSelfService Plus prompts users to provide additional authentication factors. This protects endpoints against unauthorized access attempts.
Use case 5

Machine-based authentication

Machine-based authentication

Machine-based MFA provides device-level security for servers and devices, regardless of user login. It ensures the authenticity of the device by registering it, collecting and validating authentication factors, and granting access only if the factors match the device profile. This provides security for critical machines, supports a variety of authenticators, and benefits RDP users.

How ADSelfService Plus helps

ADSelfService Plus machine-based MFA supports the following :

  • Windows
  • Linux
  • macOS

When this feature is enabled, all users logging on to a particular machine must prove their identities using MFA. The authenticators prompted to the user will be based on the authenticators configured for them in the machine logon MFA.

Use case 6

Complying with IT regulations

Complying with IT regulations

To protect sensitive data, organizations must adhere to various compliance rules and regulations, such as HIPAA, PCI DSS, the GDPR and more.

For example, PCI DSS 8.3 requires MFA whenever a third party or portable computer accesses the network remotely, while NIST's SP 800-63B recommends to use 2FA or MFA methods such as TOTPs, Google Authenticator, or RADIUS.

How ADSelfService Plus helps

ADSelfService Plus helps organizations meet compliance standards such as NIST SP 800-63B, GDPR, HIPAA, SOC, FFIEC, PCI DSS and more. It enables MFA for application access in cloud and on-premises environments, as well as for endpoints, supporting 19 authentication factors like biometrics, Duo Security, TOTPs, Google Authenticator, YubiKey, and smart cards.

Benefits of using
MFA
with ADSelfService Plus

 

Prevent data breaches and save IT costs

Implementing MFA can provide significant cost savings for organizations by decreasing the risk of data breaches and cyberattacks.

Comply with IT regulations and avoid penalties

Regulations such as HIPAA, PCI DSS, the GDPR, and more prioritize the protection of sensitive data and reduce compliance fines.

Save money on insurance premiums

Many insurance agencies require organizations to have MFA to qualify for cyber insurance coverage.

Prevent 99% of cyberattacks with adaptive MFA.

Schedule demo

*source: Microsoft

Email Download Link