Skip to main content

Enterprise Security at PbN

Alyssa Elso avatar
Written by Alyssa Elso
Updated this week

Practice by Numbers (PbN) is built with security in mind for all practices, and every account includes essential login protections such as Two-Factor Authentication (2FA) and secure sign-in options.

For practices that need advanced access controls, monitoring, and compliance-ready security tools, PbN also offers Enterprise Security. Enterprise Security provides enhanced safeguards that give administrators more control over where, when, and how users can access the platform.

This article explains:

  • Where to find Enterprise Security

  • What security features are included for all practices

  • What additional capabilities are unlocked with Enterprise Security


Where to Find Enterprise Security

Enterprise Security settings are located in: New Settings > General > Security Management

This centralized area allows administrators to manage security policies, monitor access, and review activity across the practice.


Security Features Available to All Practices

All Practice by Numbers accounts include baseline security features designed to protect user logins and account access.

Two-Factor Authentication (2FA)

2FA adds an extra layer of protection by requiring users to verify their identity using a second method after entering their password.

All practices can:

  • Enable or disable 2FA for the practice

  • Require 2FA for specific roles or specific users

  • Allow users to set up their own 2FA method

Supported options include:

  • Authentication apps

  • Secure verification during login

Google Sign-In

Practices can also allow users to log in securely using Google authentication, reducing password-related risk while maintaining account protection.

These login security options are available to all practices, regardless of plan.


What Is Enterprise Security?

Enterprise Security expands PbN’s security capabilities beyond login protection.

It is designed for:

  • Multi-location or enterprise practices

  • Practices with strict compliance or IT policies

  • Teams that need visibility and control over user activity

Enterprise Security allows administrators to:

  • Restrict access by IP address

  • Limit access to specific time windows

  • Monitor and revoke active user sessions

  • Track security-related changes and events

  • Centrally manage 2FA status across users


Enterprise Security Tabs & Features

Below is an overview of each tab within Security Management and what it controls.

General Settings

The General Settings tab is where Enterprise Security rules are enforced at a high level.

From here, administrators can:

  • Enable or disable IP address restrictions

  • Enable or disable time-based access restrictions

  • Enforce 2FA requirements across roles or users

  • Apply predefined security presets for faster setup

This tab acts as the control center that determines whether advanced security rules are active.


IP Allowlist

The IP Allowlist allows practices to control where users can log in from.

With Enterprise Security, you can:

  • Add approved IP addresses (e.g., office networks)

  • Restrict access so users can only log in from allowed IPs

  • Prevent access from unknown or unauthorized locations

This is especially useful for practices that want access limited to office locations or approved remote environments.


Time Windows

The Time Windows tab controls when users can access PbN.

Using time windows, administrators can:

  • Define allowed login hours by day of the week

  • Apply access windows to specific roles or users

  • Prevent system access outside approved business hours

What Users Experience When Access Is Restricted

If a user attempts to log in outside of their allowed time window, they will see an Access Restricted screen explaining:

  • That access is currently restricted

  • The current date and time

  • Their approved access times

Once the allowed time window begins, the user can retry access or will be redirected automatically.

Time-based restrictions are ideal for reducing after-hours access and improving compliance.


The Time Windows tab controls when users can access PbN.

Using time windows, administrators can:

  • Define allowed login hours by day of the week

  • Apply access windows to specific roles or users

  • Prevent system access outside approved business hours

Time-based restrictions are ideal for reducing after-hours access and improving compliance.


Active Users

The Active Users tab shows who is currently logged into PbN and how.

From this tab, administrators can:

  • View active login sessions per user

  • See users with access to multiple organizations

  • Revoke all active sessions for a user instantly

This provides real-time visibility and quick response if access needs to be removed.


IP Access Requests

When IP restrictions are enabled, users attempting to log in from a new or unapproved IP address will be prompted to submit an IP Access Request.

User Experience

Users will see a message explaining that:

  • Their current IP address requires approval

  • They must request access to the practice(s) they need

Each request includes a clear status:

  • Approved – Access has been granted

  • Pending – Request is awaiting review

  • Rejected – Request was denied

  • Not Requested – No request has been submitted

Admin Experience

From the IP Access Requests tab, administrators can:

  • View pending requests

  • See the requesting user and IP address

  • Approve or deny requests with one click

This workflow allows practices to maintain strict IP controls without permanently blocking legitimate users.


When IP restrictions are enabled, users attempting to log in from a new or unapproved IP can generate an IP Access Request.

Admins can:

  • Review pending IP access requests

  • Approve or deny access

  • Maintain security without fully blocking legitimate users


Security Events

The Security Events tab provides a detailed audit log of security-related activity.

Here you can:

  • See what security changes were made

  • Identify which user made each change

  • Track events like:

    • Settings changes

    • Role updates

    • IP approvals

    • Security preset applications

  • Export events for reporting or audits

This tab is critical for accountability, troubleshooting, and compliance documentation.


2FA Management

The 2FA Management tab provides centralized visibility and control over how two-factor authentication is being used across your practice.

From this tab, administrators can:

  • View all users and their current 2FA status

  • See which users have 2FA enabled, required, or not yet set up

  • Identify the authentication method being used (such as SMS)

  • View the last time a user successfully verified their 2FA

Resetting a User’s 2FA

If a user loses access to their authentication method or needs to reconfigure 2FA, administrators can reset it.

When Reset 2FA is selected:

  • The user’s existing 2FA setup is removed

  • The user will be prompted to set up 2FA again at their next login (if required)

This action is useful for troubleshooting login issues while maintaining security controls.


The 2FA Management tab provides centralized visibility into user authentication status.

Admins can:

  • View which users have 2FA enabled

  • See last verification activity

  • Refresh or audit 2FA status across the practice

This ensures enforcement of security policies and helps identify gaps in authentication setup.


Summary

  • All practices have access to secure login features like 2FA and Google sign-in

  • Enterprise Security is a paid add-on that provides advanced access control, monitoring, and auditing

  • Enterprise Security gives practices full visibility and control over who can access PbN, from where, and when

For practices with higher security or compliance needs, Enterprise Security offers the tools required to protect sensitive data and manage access with confidence.

Did this answer your question?