If your FileCatalyst deployment (e.g., WebDAV or Central) supports MFA, turn it on. This adds a critical second layer—even if a password is stolen, attackers can’t log in without the second factor.
For automated transfers (via FileCatalyst Workflow, CLI, or API), avoid embedding credentials in scripts. Use revocable transfer keys or short-lived tokens instead. Rotate them regularly. filecatalyst account protection
Whether using FileCatalyst Direct, Agent, or Central, apply patches promptly. Updates often fix security vulnerabilities that attackers could exploit to bypass account controls. If your FileCatalyst deployment (e
Not every user needs admin rights. Assign minimal required permissions (read/write per folder, transfer quotas). Remove or disable accounts for departing employees immediately. Use revocable transfer keys or short-lived tokens instead
Check audit logs for unusual activity: repeated failed logins, off-hour transfers, or unexpected IP addresses. FileCatalyst’s event logging can alert you to brute-force attempts or unauthorized access.
A compromised FileCatalyst account can lead to data theft, ransomware injection, or malicious file distribution. Protect your account—protect your pipeline. For detailed configuration guides, refer to FileCatalyst Security Best Practices or contact your system administrator.