Yes, you can write security policies as you describe. We're running over 30 User-ID Agents (version 4.1.2). They're collecting AD account logon information from the security logs of our Windows domain controllers. We found it best to place one (or more for redundancy) at each site ... they can consume a considerable amount of bandwidth if you have an agent monitoring a domain controller over a WAN link. We have yet to address the many wireless devices in our company that do not log on to our Windows domain ... Android phones and tablets, iPads, warehouse barcode scanners, etc. The plan is to glean user/IP information from the RADIUS MS-PEAP authentication records and feed it into the User-ID Agent using it's API support. Jeff
... View more