Block, deauthorize, and deactivate

Overview

Code42 administrators can use block, deauthorize, and deactivate actions to control access to data and manage accounts. This article explains the impact each of these actions have on organizations, users, and devices in your Code42 environment.

Considerations

  • You must have administrative role permissions to perform block, deauthorize, and deactivate actions from the Code42 console.
  • You should understand the basic information hierarchy of your Code42 environment, including the definitions below:
    • Agent: An installed instance of Code42 software. A single device may have a combination of the insider risk, backup, and legacy agents installed.
    • Device: The physical endpoint upon which an agent is installed.

    • Organization: The hierarchical level in the Code42 environment for users and agents. Each user can belong to only one organization. You can define many settings at the organization level; different organizations can have different settings. An organization can contain child organizations, and an organization can exist without containing any users.
    • User: A single account in your Code42 environment. A user always belongs to one (and only one) organization. A user licensed for backup has a single set of sign-in credentials (username and password) and a single encryption key unique to their backups.

Blocking, deauthorizing, and deactivating at a glance

  • Blocking is a non-destructive action that prevents user access to your Code42 environment.
  • Deauthorizing signs a user out of the backup agent. The user can sign in again at any time.
  • Deactivating is a destructive action that stops all activity for an agent, user, or organization.

The following table provides additional details about each action:

  Incydr monitoring Backup activity1 Possible Backup Data Loss1 Applies to agents Applies to users Applies to organizations
Block1 n/a Continues No Yes Yes Yes
Deauthorize1 n/a Stops No Yes No No
Deactivate Stops Stops Yes Yes Yes Yes

1 Backup agent only

Block

Backup agent only

Blocking prevents user access to the Code42 environment but is not destructive to existing data. Backups continue without interruption. Specific implications for agents, users, and organizations are detailed below.

Agent

When you block an agent:

  • Users are signed out of the backup agent on the device and cannot sign in again on that device.
  • Users cannot access the Code42 agent on the device to restore data or change settings.
  • Users can continue to use other devices.
  • Existing backups are not affected.
  • The Code42 service continues backing up new data on the device without interruption.
User

When you block a user:

  • Users cannot sign in to any part of your Code42 environment:
    • Users cannot sign in to the Code42 agent on any device.
    • Users cannot sign in to the web-based Code42 console.
    • Users cannot register or sign in from a new device.
  • Users cannot restore data or change settings.
  • Existing backups are not affected.
  • The Code42 service continues backing up new data on the device without interruption.
  • The insider risk agent for the user is not affected. Incydr monitoring continues without interruption.
Organization

When you block an organization, all users in the organization are blocked, as well as all users in child organizations.

Blocks and licenses

Blocked agents still use a license.

Use case examples

  • Theft or loss: you may want backups to continue while searching for the device, but want to prevent unauthorized access to backup archives.
  • Licensing: if you are managing backups for a third party, you may need to block a user for billing purposes.
  • Legal: in legal proceedings, you may need to restrict access to data due to a legal hold. Users on legal hold cannot be deactivated, but they can be blocked. 

Unblock

When you unblock an agent, user, or organization, normal access is restored.

Deauthorize

Backup agent only

Deauthorization only applies to agents. Users and organizations cannot be deauthorized. 

When you deauthorize an agent:

  • The current user is signed out of the Code42 agent. Users can sign in again at any time.
  • No data is deleted. However, backup activity stops until the user signs in again. 
  • Users cannot access the Code42 agent to restore data or change settings without signing in again.
  • The insider risk agent for the user is not affected. Incydr monitoring continues on the device without interruption.

Deauthorizations and licenses

Deauthorized devices still use a license.

Use case examples

  • Troubleshooting: deauthorization is sometimes requested by our Technical Support Engineers.
  • Testing: deauthorizing a device can be used to test a user's credentials or other behavior.
  • Theft or loss: the device will be unable to back up or restore files until the user has signed back in to the device.

Deactivate 

Deactivation is a destructive action that prevents access to the Code42 environment and removes user data from devices. Specific implications for agents, users, and organizations are detailed below.

Insider risk agent

Backup agent