Machine restrictions

Machine restrictions control from which machines users are allowed or denied logon.

Published August 26, 2025

Typical use cases

  • Ensure sensitive accounts (e.g., administrators, finance) can log on only from secured or dedicated machines.

  • Prevent users from connecting from unmanaged or shared devices.

  • Restrict VPN or terminal sessions to specific sets of machines.

Key points to know

  • Policies can target individual users, groups, or organizational units.

  • Modes available:

    • Authorized → only the listed machines are allowed.

    • Denied → only the listed machines are blocked.

  • Machines can be added by:

    • Machine name (manual entry or LDAP search).

    • IP range (start and end IP included).

    • Organizational unit (select via LDAP).

  • Restrictions can apply per session type (workstation, terminal, Wi-Fi/VPN, IIS).

  • For Wi-Fi sessions, restrictions are enforced using MAC addresses.

  • For other session types, restrictions use IP addresses and, when available, NetBIOS names.

Best practice

Use Authorized mode for high-security accounts, as it provides stricter control.

Configured policies

A list of all machine restriction policies is available in the Access Policies section, under the Machine restrictions page.