

Instead, we’ll offer a link to some solid suggestions about how to strengthen your password management techniques in a blog post they wrote in November in response to the BlackHat exploit.

We tried to get a screenshot showing many of them but the list was too long. There are lots more choices and they can be applied across all of your users or selectively to specific groups. You can specify password lengths, prevent mobile logins, control logoff behavior, prevent the tool from being used on TOR exit nodes, and restrict to particular IP address ranges. Speaking of those security policies, this is a very extensive collection, the largest of any of the 10 products we examined.
