Security Settings
Security Settings provide tools to protect your ZenDash HRM platform through IP-based access controls, device management policies, and other security configurations.
IP Groups
- Navigate to Settings > IP Groups to manage IP address groups.
- Create named groups of IP addresses or IP ranges (e.g., "Office Network", "VPN Addresses").
- IP groups are used as building blocks for access restriction rules.
IP Restrictions
- Navigate to Settings > IP Restriction to configure access rules.
- Create rules that restrict system access to specific IP groups.
- Configure restrictions at the organization level or for specific user groups.
- When enabled, employees can only access the system from approved IP addresses.
Setting Up IP Security
- Define your approved IP ranges by creating IP Groups.
- Create IP Restriction rules that reference these groups.
- Test the restrictions with a pilot group before rolling out organization-wide.
- Ensure VPN and remote access IPs are included if remote work is supported.
Security Best Practices
- Regularly review and update IP groups to reflect network changes.
- Enable IP restrictions for sensitive operations like payroll and admin settings.
- Monitor access logs for unauthorized access attempts.
- Keep device management policies up to date with current security requirements.