Security Settings
Introduction
Security Settings are a set of crucial features that allow system administrators to implement and manage security measures. These settings cover aspects such as session time, password change policy and two-factor authentication, providing an additional layer of protection against unauthorized accesses and potential security threats.
Way: System Menu > Settings > Security Settings.
Value Delivery
- What? Improved protection: Reduces the risk of unauthorized access.
- What? Compliance: Helps meet security requirements.
- Flexibility: Allows you to adjust settings according to the organization's specific needs.
- What? Access control: Offers tools to effectively manage user access.
Main Features
1. Session Time
This feature allows you to adjust the downtime after which the user session is automatically closed.
- How to configure:*
- Access System > Settings > Security Settings.
- Locate field Session time.
- Set the desired time.
Number of Days to Change Password Defines how often users should change their passwords, reinforcing the security of accounts.
- How to configure:*
- Access: System > Settings > Security Settings > Number of days to change password.
- Set the desired number of days (minimum recommended: 45 days).
3. Two Factor Authentication (2FA)
It implements an additional layer of security, requiring users to confirm their identity through two different methods.
- How to activate:*
- In the Security Settings, activate the Authentication button in two mandatory factors.
- Process for users:*
- Install an authentication application (Microsoft Authenticator, Google Authenticator or FreeOTP).
- Scan the QR code provided by the system.
- Insert the authentication code generated by the application.
Final considerations
Security Settings are essential to maintain a secure and secure system environment. By properly implementing and managing these settings, organizations can significantly reduce security risks, protect sensitive data and ensure system integrity. It is important to regularly review and adjust these settings to adapt to changes in security needs and emerging threats.
