Skip to main content
Advanced Search
Search Terms
Content Type

Exact Matches
Tag Searches
Date Options
Updated after
Updated before
Created after
Created before

Search Results

8 total results found

Azure Portal

Admin Guide Use Cases

Azure Portal or specific Azure services can be further protected through the use of the Knocknoc Entra back end. This helps prevent or reduce ransomware and common Business Email Compromise (BEC) attacks and data theft/exfiltration through isolating user logi...

Ivanti Connect Secure

Admin Guide Use Cases

Ivanti Connect Secure devices that have an outer firewall or control layer can be protected from unauthorised threat actors by implementing Knocknoc and firewall orchestration This prevents direct Internet access to the Ivanti Connect Secure devices prior to ...

FortiOS, FortiProxy, Palo Alto, or SSL VPN

Admin Guide Use Cases

Protect your existing Fortigate or Palo investments from direct internet exposure by introducing Knocknoc. This can be achieved in multiple ways through direct or indirect firewall orchestration , effectively adding network application whitelisting after a su...

Knocknoc with ADFS

Admin Guide Authentication

The following example assumes your Knocknoc instance is located at https://your-knocknoc.cloud/. Wherever you see that, please substitute it for your own instance URL. Knocknoc SAML config Login In the Knocknoc admin interface (eg: https://your-knocknoc....

v7.0

Changelog and Roadmap

Announcing Knocknoc 7.0  🚀 We’re excited to introduce Knocknoc 7.0, a landmark release packed with features to enhance security, usability, and performance. Here's what's new: Enhanced Security •    'Require Click' for User Access Grants: Access controls ca...

SAML with CyberArk

Admin Guide Authentication

CyberArk integrates with Knocknoc via the "Web Apps" component, passing through SAML assertions.   Knocknoc SAML config Log in to the Knocknoc Admin interface On the Settings page configure the PublicURL (eg: https://knocknoc.yourserver.com) Create and ...

How Knocknoc removes attack surface

Admin Guide

Knocknoc enables you to remove the attack surface of systems, by enacting just-in-time network/application-based allow-listing. It can operate in a number of ways - from orchestrating network access controls (eg: adding to firewall rules - whilst presenting n...

Additional client IP addresses

Admin Guide ACLS

Additional client IP addresses A client may exhibit behaviour where multiple IP addresses are observed (or may be) as part of the authentication request. Situations such as: Internal IP addresses (eg: 10.0.x.x / RFC1918), should the Server be externally ho...