Loading ...
IS Decisions
IS Decisions makes it easy to manage and secure your Microsoft Windows and active directory infrastructure.

With user access control, file control, server and desktop reporting, and remote deployment solutions, IS Decisions combines the powerful security required by today's business world with the innovative simplicity modern users expect. More than 3.400 customers worldwide rely on IS Decisions to prevent security breaches, comply with key regulations such as SOX, FISMA and HIPAA, and save time and costs for IT.

Founded in 2000, IS Decisions is a Microsoft business partner based in Biarritz, France.



Security Starts with Login

An inattentive employee only needs to share a password or leave a workstation unattended. Even the most vigilant worker can be abused and suffered from theft of their identity information. UserLock enables IT teams to extend their login security far beyond group policies and actual Windows Active Directory.

Access Security and Control for Windows Networks

UserLock limits simultaneous access to a Windows network under the same username and the number of computers that users and groups can log into. System administrators can accurately monitor the connection activities in the entire communication network in real time.

Windows Server does not provide sufficient security opportunities for system administrators to effectively manage their login and logout processes in domains.

UserLock solves this problem by monitoring, reporting, and reporting on all login / logout transactions performed on your domain. It also restricts the number of simultaneous connections to the entire Windows network with the same username.

UserLock works as a service and uses agents that are installed automatically without hindering the end user from working.

System Features
  • It limits the simultaneous access of specified users and groups to the system.
  • Ability to set workstation restrictions based on computer name and IP range.
  • Sends alert (email or popup) for successful and / or unsuccessful system logins.
  • It stores all login / logout and open / close operations in an ODBC database.
  • Supports workstation and terminal sessions.
  • It displays and dumps reports of user sessions as well as session statistics.
  • Ability to lock or end user sessions (logoff) from a central console.
  • Protection of all secure domains, a single domain, a unit, or a single terminal server in a workgroup in a network.
  • UserLock backup server upload capability for ultimate reliability.
  • Easy installation of intermediary programs to all workstations with the help of an integrated installer.
UserLock Server UserLock Console For Workstations to be Protected For Terminal Servers to be protected For RRAS, NPS and IIS Servers
Windows Client versions
Windows 10
Windows 8.1
Windows 8
Windows 7
Windows XP
MAC Client versions
High Sierra
El Capitan
Windows Server versions
Windows Server 2016
Windows Server 2012 R2
Windows Server 2012
Windows Server 2008 R2
Windows Server 2008
Windows Server 2003 R2
Windows Server 2003
Windows Server 2000
Terminal Servers
Citrix Metaframe XP
Citrix Presentation Server 4
Any terminal server using RDP sessions (Microsoft) or ICA sessions (Citrix)
Remote App

For detailed information about UserLock

click here

Sensitive Data Control

FileAudit monitors access or attempts to access sensitive files and folders on Microsoft Windows servers. FileAudit allows you to proactively monitor, control, report and generate alerts to files and folders on your file servers. You can control your servers remotely without installing anything.

Sensitive data control and archiving

FileAudit enables Windows file and directory inspection functions to be performed. Thus, there is no need for tedious work to analyze and understand thousands of diary lines. FileAudit provides an ordered list of access or attempts to access one or more files or directories as an integral part of Windows Explorer. With its convenient interface, FileAudit allows instant determination of the type of access (reading, modification, deletion), accessing user, date and time.

UserLock works as a service and uses agents that are installed automatically without hindering the end user from working.

System Features
  • Lists access to files
  • Shows access to files in a directory and all subdirectories.
  • It enables the relevant access data to be transferred as an ASCII file.
  • It only uses standard Windows APIs.
  • Allows multiple files to be selected.
  • Symbols that show read and write access openly, as well as information about change of ownership and access rights and whether they have been accepted or not.
  • Shows in detail the audit events generated by NT.
  • No server or workstation agent is required.
  • It searches by computer name, as well as the date and time of users connect and leave.
  • Integrated with Windows, FileAudit can be accessed directly with one click from the file and directory menu.
  • It displays a notification in order of the username, domain name, access date, access type and containing information that the request was successful or rejected.

Using FileAudit provides the following benefits:

  • Security for confidential and sensitive data
  • Reducing the time spent on data auditing
  • Ensuring compliance of information systems with international regulations and standards (HIPAA, Sarbane-Oxley, GLBA, NIST / FIPS, ITIL, COBIT, CISP, ISO 17799,…)
  • Ease of use: Contextual menu, agentless solution
  • Efficiency: Instant viewing, multiple selection possibility.

System requirements

FileAuditsupports the following operating systems for audit service setup (As with the console setup)

  • Windows Server 2019
  • Windows Server 2016
  • Windows 10
  • Windows 8
  • Windows Server 2012 R2
  • Windows Server 2012
  • Windows Server 2008 R2
  • Windows Server 2008
  • Windows Vista
  • Windows Server 2003
  • Windows XP

.Net Framework 4 is required.

  • Microsoft Access database file (mdb)
  • Microsoft SQL Server Express 2008/2008 R2 / 2012/2014/2016
  • Microsoft SQL Server 2008/2008 R2 / 2012/2014/2016
  • MySQL 5.6 and above

For detailed information about FileAudit

click here

Dramatically reduce the workload and speed up processes when updating your Windows systems

Application deployment and updating of Windows systems can be time consuming and complex tasks, especially in large networks. Tool-free, thanks to multi-use technology RemoteexecEnables IT administrators to easily perform executions on thousands of remote systems in minutes.

Remote install, update, run

RemoteExec is a very powerful tool that you can use to update your Windows networks.

With RemoteExec, you can run the same program on many computers at the same time. Moreover, you do not need to install any agent software on the computers beforehand.

You can update all your Windows computers. For example, you can install Service Pack, patch and hotfix release, registry (.reg) fix, Windows Installer packages (.msi file) from your management console.

In addition, RemoteExec allows you to notify users of known events such as server shutdowns, power outages. You can edit your information messages as an html page or a Word document.

Finally, with RemoteExec, you can shut down your entire network before a power failure, or terminate all user sessions outside of working hours to create a more secure environment.


Easily install MSI packages, Service Packs, patches, hotfixes etc. Deploy and get instant results.

Remote execution

Execute remote programs, scripts, and associated files, or schedule a later date or time.

Remote configuration management

Change the registry, change local administrator (LocalAdmin) passwords, disable local accounts, copy / update / delete files and folders.

Interaction with remote systems

Remote shutdown, wake up, reboot servers and workstations, lock or shutdown user sessions, etc.

Other Features
  • Program files (.exe, .bat, .cmd), scripts (.vbs, .js) and all associated file types (.doc, .wav, .reg, .msi…)
  • Service Pack, patch, hotfix release, Internet Explorer updates, and other Microsoft updates
  • Easy installation of Windows Installer packages (.msi)
  • Schedule for remote shutdown, upload and session termination
  • Ability to visually monitor scripts or batches launched from the management console
  • Ability to initiate a "telnet-like" session on the remote computer
  • Ability to create templates for RemoteExec operations and target host lists for later use
  • Command line mode
  • An integrated and useful planning interface
  • Detailed transaction log

System requirements

Remoteexecsupports the following operating systems for installation as well as for target machines.

  • Windows XP
  • Windows Server 2003
  • Windows Vista
  • Windows Server 2008
  • Windows 7
  • Windows Server 2008 R2
  • Windows 8
  • Windows Server 2012
  • Microsoft Access (mdb)
  • Microsoft SQL Server Express 2005/2008/2008 R2
  • Microsoft SQL Server 2005/2008/2008 R2 / 2012?

For detailed information about RemoteExec

click here

Dramatically reduce the workload and speed up processes when updating your Windows systems

WinReporteris a powerful review and reporting management tool. In addition to user definitions, it takes a remote inventory of software and hardware device settings. It also includes 58 ready-made reports for system administrators to proactively manage the ongoing enterprise-wide patch and update processes.

Hardware and Software Inventory

Easily collect comprehensive hardware information and installed software packages from all your Windows systems.

Security Audit

Check for security flaws: improperly configured systems, suspicious services, insufficient permissions, problem devices, etc.

Event Log Centralization and Analysis

Track your Windows network and system usage, then identify and resolve problems quickly.

Automatic Reporting

Get an up-to-date and detailed view of your Windows infrastructure instantly with 58 predefined reports.

Other Features
  • Selecting the computers to be examined from within the AD, within the network, by entering the IP range and / or manually
  • Examination of safe areas and unsafe areas and workstations
  • Ability to use snapshots to monitor network progress
  • Multithreading technology for high speed inspection within the network
  • Easy installation without agents for installation
  • Ability to schedule review jobs
  • The ability to update a review that has been made
  • Reporter, which provides a list of computers in RemoteExec file format and provides a very powerful patch management solution
  • Sort Tab in most reports
  • Command Line Mode (Reporter Command Line Mode) for automatic reporting
  • Advanced transfer capability.

CPU, memory, memory used, BIOS, video adapters, network adapters (TCP / IP configuration), partitions, physical disks, printers, memory units, manufacturer model and serial, devices ...

  • Computer inventory
  • General configuration
  • Memory upgrade
  • Disk space inspection
  • Developments in disk space over time
  • Advances in the field of memory over time
  • CPU time improvements
  • Video configurations
  • Devices (Modems etc.)
  • Detailed specifications of the printers
  • Registry Value
  • Scheduled Tasks
  • System Login Analysis
  • Updates (Service Packs and Hotfixes)
  • Users within groups
  • Analysis of services
  • Analysis of local accounts
  • Analysis of local administrators
  • Analysis of shares
  • Sharing permissions

Registry values, operating system version & SP, Internet Explorer version & SP, hotfixes, services, SAM / AD (users and groups), shares, sharing permissions, swap files, Microsoft DNS servers, IIS servers active services, Active Directory domain checking operations ...


Installed applications, file information, file versions, file permissions…

  • Loading statistics
  • Placement of products: PC selection depending on software installation
  • Recently installed software
  • Software analysis policy
  • General report
  • File access report
  • Login / Logout (Logon / Logoff) Operations
  • Inventory history report
  • Process monitoring
  • Service errors
  • Computers that started and shut down
Event Logs

Access to files, input / output operations, dump operations, service errors, computer startup and shutdown ...

System requirements

WinReporterrequires the following minimum system requirements.


For the computer that will run WinReporter:

  • Windows XP
  • 1 GB memory
  • 100 MB free disk space
  • CPU PIV 3 GHz or Core2 / Athlon 64 2GHz

For the computer to be scanned:

  • XP/2003/Vista/2008/7/2008 R2/8/2012
  • Microsoft Access (mdb)
  • Microsoft SQL Server Express 2005/2008/2008 R2
  • Microsoft SQL Server 2005/2008/2008 R2 / 2012

For detailed information about WinReporter

click here



UserLock is licensed perpetual. The "maintenance and support" service for the first year is included in the license. It is recommended to obtain an optional "maintenance and support" license for the following years.

The number of licenses for UserLock is determined per maximum concurrent session you will watch on your network. If you want to maintain user workstation sessions, this usually equates to total workstations. Terminal session (Terminal Server, Citrix, etc.), RAS session, IIS session, and / or one license per virtual machine, if applicable.

UserLock does not protect sessions that exceed the number of licenses.

UserLock supports many operating systems from Windows, Mac and Citrix.

Bu on the page you will find detailed information.

You can install the UserLock console on a workstation. You can use the same package as the server installation.

Please click the link below.



FileAudit is licensed through an annual subscription method. For one server and up to 100 users Team Packfor three servers and up to 500 users Small Pack receivable.

Also; Additional licenses can be obtained to control data stored in cloud environments such as Box, Dropbox, GoogleDrive, OneDrive.

Each FileAudit package allows you to control a certain number of servers and users. Servers are counted as systems hosting the files and folders you want to control. Users are counted as the total number of users accessing these files.

If you exceed the number of servers or users allowed by your subscription, the software will stop auditing events. In this case, you will need to upgrade to the next package.

The number of users in FileAudit is calculated by the number of users accessing the files being checked.

FileAudit supports the following operating systems:

Windows Server 2019

Windows Server 2016

Windows 10

Windows 8

Windows Server 2012 R2

Windows Server 2012

Windows 7

Windows Server 2008 R2

Windows Server 2008

Windows Vista

Windows Server 2003

Windows XP

Your FileAudit series Settings configuration License You can save in the section. Just copy and paste the series and apply.

No. There is no need to install FileAudit on the system you want to control. You can install FileAudit on a machine and remotely control your desired system. Nothing is installed on the target remote system.