Advanced Search
Search Results
8 total results found
Azure Portal
Azure Portal or specific Azure services can be further protected through the use of the Knocknoc Entra back end. This helps prevent or reduce ransomware and common Business Email Compromise (BEC) attacks and data theft/exfiltration through isolating user logi...
Ivanti Connect Secure
Ivanti Connect Secure devices that have an outer firewall or control layer can be protected from unauthorised threat actors by implementing Knocknoc and firewall orchestration This prevents direct Internet access to the Ivanti Connect Secure devices prior to ...
FortiOS, FortiProxy, Palo Alto, or SSL VPN
Protect your existing Fortigate or Palo investments from direct internet exposure by introducing Knocknoc. This can be achieved in multiple ways through direct or indirect firewall orchestration , effectively adding network application whitelisting after a su...
Knocknoc with ADFS
The following example assumes your Knocknoc instance is located at https://your-knocknoc.cloud/. Wherever you see that, please substitute it for your own instance URL. Knocknoc SAML config Login In the Knocknoc admin interface (eg: https://your-knocknoc....
v7.0
Announcing Knocknoc 7.0 🚀 We’re excited to introduce Knocknoc 7.0, a landmark release packed with features to enhance security, usability, and performance. Here's what's new: Enhanced Security • 'Require Click' for User Access Grants: Access controls ca...
SAML with CyberArk
CyberArk integrates with Knocknoc via the "Web Apps" component, passing through SAML assertions. Knocknoc SAML config Log in to the Knocknoc Admin interface On the Settings page configure the PublicURL (eg: https://knocknoc.yourserver.com) Create and ...
How Knocknoc removes attack surface
Knocknoc enables you to remove the attack surface of systems, by enacting just-in-time network/application-based allow-listing. It can operate in a number of ways - from orchestrating network access controls (eg: adding to firewall rules - whilst presenting n...
Additional client IP addresses
Additional client IP addresses A client may exhibit behaviour where multiple IP addresses are observed (or may be) as part of the authentication request. Situations such as: Internal IP addresses (eg: 10.0.x.x / RFC1918), should the Server be externally ho...