Skip to main content

Security Settings

Security Settings provide tools to protect your ZenDash HRM platform through IP-based access controls, device management policies, and other security configurations.

IP Groups

  • Navigate to Settings > IP Groups to manage IP address groups.
  • Create named groups of IP addresses or IP ranges (e.g., "Office Network", "VPN Addresses").
  • IP groups are used as building blocks for access restriction rules.

IP Restrictions

  • Navigate to Settings > IP Restriction to configure access rules.
  • Create rules that restrict system access to specific IP groups.
  • Configure restrictions at the organization level or for specific user groups.
  • When enabled, employees can only access the system from approved IP addresses.

Setting Up IP Security

  • Define your approved IP ranges by creating IP Groups.
  • Create IP Restriction rules that reference these groups.
  • Test the restrictions with a pilot group before rolling out organization-wide.
  • Ensure VPN and remote access IPs are included if remote work is supported.

Security Best Practices

  • Regularly review and update IP groups to reflect network changes.
  • Enable IP restrictions for sensitive operations like payroll and admin settings.
  • Monitor access logs for unauthorized access attempts.
  • Keep device management policies up to date with current security requirements.