To help you secure your mission, we’ve made it easy to see who is accessing what at your organization with extensive reporting, data and logs, available by logging into Duo’s Admin Panel.
The first step to securing everything is getting insight into your users and administrators. Our security logs show you where and how users and administrators authenticate, letting you track any major changes and activity.
With this data, you can create custom access policies based on different parameters to fit your security needs. For example, you can block any authentication attempts from countries you don’t do business in, or you can block any requests originating from anonymous networks, like Tor.
Plus, you can create authentication method policies that customize which methods your users can use. For stronger access security, you can require only the use of Duo Push or U2F. To enforce the use of two factor, you can also create enrollment controls that block unenrolled users.
We make it fast and easy to manage your users with one single interface, so you can spend less time supporting your security solution and more time on growing your business. Choose from any number of our user provisioning methods to enroll users.
Through Duo’s Admin Panel, admins can easily manage user accounts and devices, generating bypass codes and activating or disabling users. They can also allow users to manage their own devices by enabling the Self-Service Portal.
It’s also easy to customize security policies per user group, and quickly disable a group of high-privilege users for your company’s safety in the event of an emergency.
This complete security solution prevents modern attackers that often target multiple areas - including credential theft and the exploitation of known software vulnerabilities affecting outdated software versions.
“With Duo, we are able to control who has access to what assets and resources that are highly sensitive.”
“Duo has provided us with security for our remote users when connecting to our infrastructure as well our internal employees when using security applications. It offers great reporting and granular security controls.”