Machine restrictions
Machine restrictions control from which machines users are allowed or denied logon.
Useful resources
- Ensure sensitive accounts (e.g., administrators, finance) can log on only from secured or dedicated machines. 
- Prevent users from connecting from unmanaged or shared devices. 
- Restrict VPN or terminal sessions to specific sets of machines. 

- Policies can target individual users, groups, or organizational units. 
- Modes available: - Authorized → only the listed machines are allowed. 
- Denied → only the listed machines are blocked. 
 
- Machines can be added by: - Machine name (manual entry or LDAP search). 
- IP range (start and end IP included). 
- Organizational unit (select via LDAP). 
 
- Restrictions can apply per session type (workstation, terminal, Wi-Fi/VPN, IIS). 
- For Wi-Fi sessions, restrictions are enforced using MAC addresses. 
- For other session types, restrictions use IP addresses and, when available, NetBIOS names. 
Best practice
Use Authorized mode for high-security accounts, as it provides stricter control.
A list of all machine restriction policies is available in the Access Policies section, under the Machine restrictions page.
