Enhance Acumatica security with well-defined passwords and account lockout policies. Our guide provides step-by-step instructions for seamless implementation and protection.
Discover the art of configuring password and account lockout policies, the cornerstone of robust cybersecurity. In this guide, we delve into the vital steps necessary to ensure unauthorized access remains at bay. A well-implemented strategy not only safeguards your data but also ensures seamless operations. Join us on this exploration of fortifying your digital fortress through effective policy configuration.
Step 1: In the main menu, select the User Security module.
Then, under the Preferences category, select the Security Preferences (SM201060) form and open it.
Step 2: Setting up the Password Policy
Select the Force User to Change Password. Every check box in the Password Policy part of the form, then enter 120 in the Days box that appears next to it. Check the Minimum Password Length check box and put 8 into the Characters box next to it. Check the Password Must Meet Complexity Requirements check box to compel users to create complicated passwords that include capital letters, numbers, and special characters.
Step 3: Account Lockout Policies Configuration
Under Account Lockout Policy, specify the following:
• Lock Account After x Unsuccessful Login Attempts: 2
• Lock Account for x Minutes: 30.
• Reset Lockout Counter After x Minutes: 15.
After specifying the details on the form toolbar, click save.
Discover the power of GerminIT’s specialized expertise in Acumatica security. Our adept solutions perfectly complement configuring password and account lockout policies, reinforcing data protection. With a seamless implementation guided by our experience, fortify your system’s security. Elevate your Acumatica experience with GerminIT for enduring confidence in safeguarding your valuable information.
What We Do: GerminIT, one of the oldest ERP providers, is well known for its ERP implementation and customizations. We provide complete end-to-end assistance for data migration, system integrations, technical consultations, implementation competence, third-party add-on development, and product customizations for clients across the US, UK, Middle East, Australia, Asia, and Africa.