Connect with Duo users and security professionals in our Community.
Can't find what you're looking for? Contact Sales or Contact Support.
← Back to Index
A record of entities, such as users, IP addresses, or countries, that are blocked or denied privileges or access. Implementing these precise controls over who can gain entry to a network increases the chances of keeping out remote attackers.
How to Block Access by Country
Blocking Authentication Attempts from Anonymous Networks
The 2016 Duo Trusted Access Report: Microsoft Edition
The Essential Guide to Securing Remote Access
Device Access Policies
Trusted Devices is part of a complete Trusted Access solution. Duo’s endpoint security software ensures only the most up-to-date devices can access your applications.
Prevent risky devices from accessing your enterprise applications with Duo’s Endpoint Remediation, a device access policy that ensures Healthy Devices as part of a complete Trusted Access solution.
User Access Policies
Ensure Trusted Users as part of a complete Trusted Access solution by using Duo’s contextual user access policies, letting you gain greater control over who can access your applications.
With Duo’s Trusted Endpoints, you can secure BYOD and protect access to your applications with device access policies and device certificates.
Subscribe to get a monthly email featuring blog posts, research, infographics, videos, e-books, security industry news, all handcrafted by Duo. You may unsubscribe any time.
Thanks for signing up!