Resources




SessionLimit


Q1. What is SessionLimit and why is it needed?

SessionLimit is a session management and monitoring solution that prevents multiple concurrent risky logins, ensuring that user access is secure and compliant with organizational policies.

Q2. Can SessionLimit help us comply with regulations?

Yes. SessionLimit supports compliance with BDDK, NIST, and ISO/IEC 27001 standards by controlling unauthorized simultaneous logins.

Q3. What happens if SessionLimit is not used?

Without session management, stolen credentials may be used from multiple devices or locations at the same time, leading to fraud or data breaches.



SessionAudit


Q1. What problem does SessionAudit solve?

It eliminates anonymity in shared environments by mapping every action to a real user identity, even when common credentials are used.

Q2. How does it technically work?

SessionAudit uses an overlay lock screen that integrates with Active Directory to authenticate the actual user without terminating the shared session.



Device2Mail


Q1. Why do organizations need Device2Mail?

Because mobile email clients typically rely only on username and password, Device2Mail adds an additional validation layer to prevent unauthorized access.

Q2. Is it compatible with security regulations?

Yes. It supports ISO/IEC 27001, NIST, and Turkish Digital Transformation Office guidelines for mobile access security.

Q3. How is Device2Mail implemented?

It runs on a separate server, integrates with Active Directory, and uses ActiveSync protocol to enforce trusted device access.

Q4. What happens if the device is lost or stolen?

Device2Mail allows administrators or users to block data transmission to the device immediately via its management portal.

Q5. What authentication methods are supported by Device2Mail (D2M)?

D2M supports multiple authentication methods, including SMS codes, Authenticator applications (e.g., Microsoft Authenticator, Google Authenticator), and Push Notifications. This flexibility allows organizations to enforce stronger security while adapting to user preferences and device availability.



ArkSSPR


Q1. What is ArkSSPR?

ArkSSPR is a self-service password reset solution that allows users to reset forgotten passwords, unlock accounts, and change credentials without contacting IT.

Q2. How does it improve efficiency?

It reduces IT helpdesk calls related to password issues, saving time and lowering operational costs.

Q3. What authentication methods are supported?

ArkSSPR supports secondary validation via SMS, email, and authenticator apps (Google/Microsoft Authenticator).

Q4. Can administrators delegate permissions?

Yes. Admins and users can delegate reset/unlock rights to others, and administrators can also perform resets on behalf of users.

Q5. Is it possible to replace the “Forgot My Password” option on the Windows lock screen with Arksoft’s agent?

No. This functionality is controlled and restricted by Microsoft. The lock screen password reset process relies on Microsoft’s native service provider, and it cannot be overridden or substituted by third-party solutions.

Q6. We would like to enforce only authenticator-based login without SMS verification. Is this possible?

No. Currently, the solution requires either SMS verification or a valid mobile attribute in the directory. Without these, users cannot be granted access through the interface, even if an authenticator application is assigned.



E-Kache


Q1. What is E-Kache?

E-Kache is a centralized email signature management solution integrated with Microsoft Exchange Server, ensuring professional and consistent corporate email communication.

Q2. How does it work with Active Directory?

It automatically pulls user details from Active Directory and applies them to signature templates, ensuring accuracy and consistency.

Q3. Can we manage different policies for internal and external emails?

Yes. Policies can be applied per user, group, or organizational unit, with customizable priority rules.

Q4. What makes E-Kache different from competitors?

It is optimized not to affect Exchange performance, provides detailed logging, and offers advanced design tools for signatures including QR codes and logos.



Ark2FA


Q1. What is Ark2FA?

Ark2FA is a two-factor authentication solution that works with Microsoft Active Directory Federation Services (ADFS) to strengthen login security.

Q2. What authentication methods does it support?

It supports SMS OTP, authenticator apps (Google, Microsoft, etc.), and RADIUS integration for VPN/Wi-Fi.

Q3. Which applications can benefit from Ark2FA?

It secures applications such as Exchange OWA, VPNs, and any system using ADFS or RADIUS authentication.

Q4. Why is Ark2FA important for organizations?

Because single password protection is no longer enough, Ark2FA adds a critical second layer to block unauthorized access.

Q5. Can we enable VPN 2FA for users who are not part of the domain?

No. Currently, the product only supports requests authenticated via LDAP.

Q6. We would like to enforce only authenticator-based login without SMS verification. Is this possible?

No. Currently, the solution requires either SMS verification or a valid mobile attribute in the directory. Without these, users cannot be granted access through the interface, even if an authenticator application is assigned.

Q7. We already have a software/product in place. Can we implement 2FA together with Ark2FA?

Yes, if the software supports integration with Active Directory Federation Services (ADFS). In such cases, Ark2FA can be configured as an MFA adapter to provide an additional authentication layer.



DMARCAnalyze


Q1. What is DMARCAnalyze?

DMARCAnalyze helps organizations implement and monitor DMARC, SPF, and DKIM protocols to protect against phishing and email spoofing.

Q2. What are the benefits of DMARC enforcement?

It prevents attackers from sending fake emails using your domain, protecting your brand reputation and customers.

Q3. Does DMARCAnalyze provide reporting?

Yes. It offers detailed analysis dashboards, aggregate reports, and forensic data for visibility into email authentication results.

Q4. Is it suitable for all organizations?

Yes. From government institutions to enterprises, any organization relying on email communication benefits from DMARC implementation.



Consulting


Q1. What kind of consulting services do you provide?

We deliver end-to-end consulting across core Microsoft technologies and enterprise IT systems, including:

  • Active Directory Health Checks, Security Hardening & Migration
  • Exchange Server optimization and migration
  • SCCM, SCOM, MIM, SQL, SharePoint, Power BI, and Microsoft 365 services
  • Security-focused solutions such as MFA, email security, and compliance frameworks

Q2. How does Arksoft ensure service quality and security?

All our consulting is based on Microsoft Best Practices, CIS Benchmarks, and internationally recognized standards such as ISO/IEC 27001 and NIST. Every project includes health checks, risk assessments, and documentation to guarantee long-term stability and compliance.

Q3. Can Arksoft adapt solutions to our specific business needs?

Absolutely. We deliver tailor-made consulting services, aligning technical design with your organizational structure, regulatory obligations, and industry-specific requirements.

Q4. What industries do you have experience in?

Arksoft has successfully delivered projects in Banking & Finance, Government, Defense, Telecom, Healthcare, Education, and Manufacturing. Each engagement is supported by industry-specific expertise.

Q5. How does Arksoft manage complex migration projects?

We follow a controlled migration methodology that ensures zero data loss and minimal downtime. Our team prepares detailed project plans, fallback scenarios, and risk assessments to guarantee smooth transitions (e.g., AD/Exchange migrations).

Q6. Do you also provide training?

Yes. Arksoft offers a wide range of customized training programs on Microsoft technologies, identity management, cybersecurity, endpoint management, and enterprise IT governance, helping your IT staff build sustainable in-house expertise.

Q7. What is the typical engagement model?

We offer project-based consulting, ongoing managed services, and long-term partnerships. Clients can choose flexible engagement models such as fixed-scope projects, time & material, or subscription-based managed services.




Let’s get to work.

Arksoft transforms how you operate. Email our team to discover how one platform can solve your biggest pain points.