Home

Users Add user
972
Get recommendations →
Close security gaps around new user enrollment. How can I improve the security of my new user policies?
516
Locked out
View locked out users
1
Bypass users
View bypass users
970
Inactive
View inactive users
Devices View insights
986
Out-of-date OS
38  ·  0% change  ·  Past 7 days
View all
Out-of-date browsers
1  ·  0% change  ·  Past 7 days
View all
Authentication Methods Authentication summary
Last 7 days
Auth method breakdown · 1 total auths
Roaming authenticator (2fa) 100%
1 authentications
In the last 48 hours, shown at every 30 minutes.
12PM 6PM 12AM Mon.Apr20 6AM 12PM 6PM 12AM Tue.Apr21 6AM 12PM
Authentication log
User Application Factor Result Time
angela.ro@example.com Duo Admin Panel Roaming authenticator (2fa) Success Apr 21, 6:12 PM
jsmith@example.com Cisco VPN Duo Push
mlee@example.com Workday SSO TOTP

Make your Duo Premier edition as secure as possible

Login fatigue and application sprawl
Not configured

Users juggling multiple credentials often resort to weak passwords or reuse. For IT, managing disparate login points makes it difficult to audit access or offboard users quickly.

How Duo solves this

Duo Single Sign-On (SSO) creates a centralized, cloud-hosted gateway. Users authenticate once for instant access to all applications, giving IT a single point of control to enforce security policies.

Password fatigue and help desk strain
Not configured

The majority of help desk tickets and account lockouts are caused by traditional passwords. Frequent reset requests and complex requirements frustrate users and interrupt workflows.

How Duo solves this

Duo Passwordless replaces passwords with phishing-resistant authenticators like passkeys (Touch ID, Windows Hello, FIDO2) and Duo Push with proximity verification to streamline logins and increase security.

Identity fragmentation
Not configured

Scattered user data across Active Directory, Azure, and manual lists prevent a single "source of truth." This fragmentation leads to orphaned accounts and inconsistent MFA enrollment.

How Duo solves this

Duo Directory centralizes user management by syncing with your existing identity providers. It automates the user lifecycle ensuring access is instantly revoked the moment a user is removed from your primary directory.

Inconsistent app coverage
Not configured

Limited time and budget often lead to cherry picking which apps to protect. While the VPN might have MFA, tools like payroll and email are left vulnerable. Attackers exploit these forgotten apps to gain a foothold and move throughout the network.

How Duo solves this

Duo provides unlimited integrations to secure every entry point, from Microsoft 365 to legacy on-prem servers and custom tools, ensuring no windows remain unlocked for an attacker to find.

Unmanaged device gap
Not configured

IT can't secure what it doesn't manage. When employees use personal devices to access corporate data, they bypass the security controls of managed hardware creating a visibility gap and entry point for threats.

How Duo solves this

Duo Trusted Endpoints identifies the management status of every device, allowing organizations to enforce access policies for sensitive data so only authorized, known devices can connect.

Too many authentications and session hijacking
Enabled

Users are frustrated by repeated authentication prompts when switching between apps or browsers. Meanwhile, traditional session cookies remain a target for attackers and can be used to remotely impersonate users if stolen.

How Duo solves this

Duo Passport uses Duo Desktop to tie sessions to the device itself, rather than a susceptible cookie. Users authenticate once and Passport securely extends that trust across web and desktop apps, reducing login friction while preventing token theft.

Identity sprawl and hidden risks
Not configured

Fragmented identities across cloud and on-prem providers create blind spots. Without a unified view, orphaned accounts, MFA-exempt users, and suspicious privilege escalations go unnoticed until they're exploited in a breach.

How Duo solves this

Cisco Identity Intelligence correlates identity data across your entire ecosystem to surface high-risk anomalies, like session hijacking or dormant accounts. It provides actionable insights to proactively harden your identity attack surface.

One-size-fits-all security
Not configured

Static security rules lack context. A user logging in from a known office network requires a different level of scrutiny than a user logging in from a new country or an anonymous proxy.

How Duo solves this

Adaptive access policies enable granular, context-aware rules. You can adjust requirements based on user location, network reputation, and app sensitivity, for the right level of security at every login.

Anomalous login patterns
Not configured

Threats like session cookie theft and MFA bypass techniques often evade static security rules that can't easily detect anomalies like impossible travel or unusual authentication behavior.

How Duo solves this

Risk-Based Authentication analyzes real-time signals to identify suspicious behavior. Duo secures high-risk logins by automatically escalating to more secure verification methods.

Insecure device gateway
Not configured

Even a trusted user is a risk if their device is unhealthy. Outdated operating systems, disabled firewalls, or missing screen locks create vulnerabilities to malware and data theft.

How Duo solves this

Duo Desktop performs automated health checks at login. It blocks access from non-compliant devices and provides users with self-remediation steps, so systems are patched and secured before gaining access.

VPN bottlenecks and over-privilege
Not configured

Traditional VPNs are cumbersome and often grant broad network access by default. Once a single VPN account is compromised, an attacker can move laterally across the entire internal network.

How Duo solves this

Duo Network Gateway (DNG) provides secure, VPN-less access. It enforces least privilege by granting users access only to the specific internal web apps, RDP, or SSH servers they need—all protected by Duo's MFA and policy engine.

Inactive security agents
Not configured

A healthy device is still a liability if the security agents are disabled. If antivirus or endpoint protections are inactive or failing to report, the device is silently exposed to malware and breaches.

How Duo solves this

Duo Desktop verifies that required security agents, such as Cisco Secure Endpoint or CrowdStrike, are active and running before granting access. If the agent is disabled or missing, access is blocked until protection is restored.

Early access features

Manage early access features for your organization. These features are in development and may change or be removed.

Feature Description Status Action

Settings

General

Account ID
DAZ2JSJ2RBL9AHLAGRNL
Account Name
Country/region
This country/region will be used to format dates and times in the Admin Panel.
Preferred timezone
This timezone will be used when displaying timestamps in the Admin Panel.

Custom Branding

Customize the branding your users see in the Duo Prompt and other Duo feature areas.

Your draft branding changes aren't currently published to anyone. Change publishing settings.

Current branding Live

Verify your identity

Secured by Duo

Draft branding Editing

Verify your identity

Secured by Duo
Logo
PNG file only, transparent background is best
Accent Color
#
Publishing

User Communication

Default language
This is the language users will see in the traditional prompt regardless of browser setting.
Custom message

Add information for users to reach your help desk when they're having trouble.

Links (Universal Prompt only)

Notifications

Email
Note: Users must have an email address associated with their account.
Push notification

Enrollment

Enrollment experience
Subject
Message
Enrollment link
Expires after being emailed

Admin Role Permissions

We've launched Custom Admin Roles. Manage permissions by creating a custom admin role.
Bypass status
Enrollment emails

Phone Calls

Outgoing caller id
Optional. If set, automated calls will appear to come from this number.
Phone callback keys

SMS Passcodes

SMS message prefix
This description will be sent with every batch of SMS passcodes.
SMS batch size
SMS expiration

Lockout and Fraud

Notification email
Failed attempts
Set a user's status to Locked Out after consecutive failed attempts
Frequent attempts

Telephony Credits

Low-credit alerts
Low-credit alert email
If left blank, all administrators will be notified.
Max credits per action
Default: 20 credits.

User Deletion

Inactive users
Trash duration
Permanently delete users from trash after days

Duo Mobile App

Passcodes
Security Checkup
Usage analytics
Instant Restore

Logging

Log retention
You can choose to automatically and permanently delete log entries older than a certain number of days.