This page is not yet available in your language.

Use Windows users with Active Directory

There are two types of users in XProtect VMS:

Milestone recommends that, whenever possible, you use Windows users in combination with Active Directory (AD) to authorize access to the VMS. This allows you to enforce:

  • A password policy that requires users to change their password regularly
  • Brute force protection, so that the Windows AD account is blocked after a number of failed authentication attempts, again in line with the organization password policy
  • Multi-factor authentication in the VMS, particularly for administrators
  • Role-based permissions, so you can apply access controls across your domain

If your organization does not use AD, you can add Windows users to workgroups on the management server instead. Workgroups give you some of the same advantages as Windows users with AD. You can enforce a password policy, which helps protect against brute force attacks, but Milestone recommends that you use a Windows Domain because this gives you central control over user accounts.

Windows users have the advantage of being authenticated via the directory as a single authoritative source and enterprise service for the network and not ad hoc for their local machine. This lets you use role based access controls to assign permissions to users and groups consistently across the domain and the computers on the network.

If you use local Windows users, the user must create a local user name and password on each machine, which is problematic from security and usability perspectives.

To add Windows users or groups to roles in Management Client, follow these steps:

  1. Open Management Client.
  2. Expand the Security node.

  3. Select the role to which you want to add the Windows users.
  4. On the Users and Groups tab, click Add, and select Windows user. A pop-up window appears.
  5. If the domain name does not appear in the From this location field, click Locations.
  6. Specify the Windows user, and then click OK.

To verify that the Windows user is an AD user, the domain name must appear as a prefix, for example "Domain\John".

Learn more

The following control(s) provide additional guidance:

  • NIST SP 800-53 CM-6 Configuration Settings
  • NIST SP 800-53 SA-5 Information System Documentation
  • NIST SP 800-53 SA-13 Trustworthiness