
TL;DR
ISL Online supports multiple authentication methods for secure unattended remote access, including Access Passwords, connection and one-time passwords, and authentication using Windows, macOS, or Linux user accounts.
It also provides built-in security controls such as session locking, access filters, monitoring, and connection approval features like local consent and email authorization. Together, these features help IT teams control who can access remote devices, reduce security risks, and maintain visibility over unattended sessions.
Unattended remote access allows administrators to connect to a computer or device without requiring a user to be present at the remote endpoint.
IT teams use it to manage systems, perform maintenance, and access office computers from remote locations. Because these connections can be initiated without user interaction, security becomes critical. Without proper controls, unauthorized access or misconfigured permissions can expose systems to risk.
In practice, securing unattended access comes down to two things:
- controlling how access is authenticated
- maintaining visibility and control over remote sessions
The following sections explain how ISL Online supports both.
What Authentication Methods Are Used for Unattended Remote Access?
The most common authentication methods for unattended remote access include device-level passwords, one-time passwords, authentication through operating system accounts, and, in more advanced setups, multi-factor authentication or identity-based authentication.
Because connections can be initiated without someone present at the device, authentication must be carefully controlled.
ISL Online provides several authentication options that allow organizations to configure unattended access according to their operational and security requirements.
Traditionally, unattended access relies on an Access Password configured on each remote device. This password provides an additional security layer because it is independent of both the operating system login and the ISL Online account used to initiate the session.
Administrators can manage access using several authentication options:
- Main Access Password, defined during installation
- Connection Access Password, configured for specific users or connections
- One-Time Passwords, a list of passwords where each password allows access to a device only once
- User Account Password (native authentication), which allows authentication using the Windows, macOS, or Linux credentials of the remote computer
These options provide flexibility when different access policies are required for administrators, support engineers, or one-time sessions.
How Does Authentication with Windows, macOS, or Linux Credentials Work?
This method allows administrators to log in using the same credentials they use to access the operating system on the remote device.
ISL Online supports User Account Password, which allows administrators to authenticate using the operating system credentials of the remote computer as part of the remote desktop authentication process.

User Account Password authentication is disabled by default. You can enable this feature per device in ISL AlwaysOn → Settings → Basics → Authentication. See how to enable this in manual
When this option is enabled:
- The administrator selects the remote computer in ISL Light (Computers tab) and initiates the connection.
- The system does not request the ISL Online Access Password.
- At session start, the remote computer is locked.
- Authentication is performed using the Windows, macOS, or Linux credentials of that computer.
In this configuration, the Access Password that was configured during installation of the remote agent is not required for that device and authentication takes place through the operating system login instead.

With Windows user password enabled, no Access Password is required. Click “Connect”.
This approach may simplify remote access workflows in environments where operating system accounts are centrally managed.
For larger deployments, the configuration can also be distributed through registry-based deployment.
Secure Your Remote Access Setup
Combine authentication, access control, and monitoring in one place to keep unattended access secure.
Start Free TrialWhich Authentication Model Should You Choose?
The right authentication model depends on how your organization manages identities, access policies, and security requirements.
ISL Online allows administrators to select the authentication method that best fits their environment.
Access Password Authentication
This model is suitable when organizations want an additional authentication layer independent of operating system credentials. It works well when:
- different passwords are required for different users
- temporary or restricted access is needed
- device-level control should remain separate from OS accounts
Operating System Credential Authentication
This model may be appropriate when:
- operating system accounts are centrally managed
- authentication policies are enforced through domain or identity systems
- administrators want to reduce the number of separate device-level passwords
Authentication settings can be configured individually for each unattended device, allowing flexibility across environments.
How Can You Control and Approve Remote Connections?
In addition to authentication, many organizations require visibility or approval before a remote session begins.
ISL Online provides features that help ensure users are informed or able to approve remote connections when required.
Local Consent
Displays a notification on the remote computer before the connection is established. The user can review the request and choose whether to allow or reject the session.
You can configure:
- whether local consent is required
- how long the notification remains visible

Enable local consent in ISL AlwaysOn settings and configure the notification timeout, which determines how long the notification remains visible before the request expires.
Email Authorization
Sends a connection request to a designated recipientvia email. The recipient can:
- approve the request
- reject the request
- ignore it until it expires
If the request is approved within the defined time window, the session can begin. Otherwise, the connection is not established.

Enable email authorization for specific endpoint in ISL AlwaysOn settings and configure the authorization timeout.
These options allow organizations to combine unattended access with additional visibility and approval mechanisms when required.
What Additional Security Controls Protect Unattended Remote Access?
Beyond authentication, additional controls help prevent misuse, detect suspicious activity, and maintain control over remote sessions.
ISL Online includes several built-in security features that support this.
Automatic Device Locking
The remote computer can be automatically locked:
- when a session ends
- if a connection is interrupted
This prevents the device from being left accessible after remote work is completed.
Email Notifications for Session Activity
Administrators can enable email notifications to stay informed about activity on unattended computers.
Notifications can be triggered when:
• a session starts or ends
• a connection attempt fails
• a file is downloaded

Email notifications provide a simple way to monitor access and quickly detect unexpected activity.
Access Filters and Network Restrictions
Access can be restricted based on:
- IP addresses
- MAC addresses
- user or domain-level rules
For example, connections can be limited to trusted office networks.
These controls add an extra layer of protection, but should be used together with strong authentication, since IP and MAC addresses can be spoofed.
Monitoring, Access History, and Session Recording
ISL Online provides visibility into remote activity through:
- connection history and timestamps
- session details
- optional session recording
Session recording can be enabled in ISL AlwaysOn settings and is stored on the client side.
These features help maintain visibility over remote access and support auditing, security monitoring, and compliance requirements.

When session recording is enabled in the ISL AlwaysOn settings, all remote sessions with unattended computers will be recorded and files saved on the client’s side.
Protecting Configuration Settings
To prevent unauthorized changes to unattended access configuration, ISL AlwaysOn settings can be protected with an Access Password.
This ensures that:
- only authorized users can modify remote access settings
- security configurations remain consistent
- critical settings cannot be changed without proper authorization
For additional recommendations and best practices, see the ISL Online security tips guide.
Key Takeaways for Secure Unattended Access
The most effective approach to secure unattended remote access combines strong authentication with visibility, control, and monitoring.
ISL Online provides flexible authentication methods and built-in security features that help IT teams protect remote systems while maintaining efficient and consistent remote access workflows.
For organizations managing distributed environments, the goal is not just to enable access, but to ensure that access remains controlled, traceable, and secure.
Start a free trial of ISL Online to explore how these controls work in practice.