Law firm document management is one of the most security-sensitive deployments in any small business vertical. Every matter file is a privileged communication. Every search hit is potentially work product. And every system on the market — NetDocuments, iManage Work, Clio, MyCase, ProLaw, PracticePanther — was built around workflow, with security configuration documented as an afterthought.
This is a practitioner hardening guide for the systems I see most often in the field. The vendors document what the software does. They do not really document how to deploy it in a way a malpractice carrier or state bar disciplinary counsel would call reasonable. The defaults are not secure, and the defaults are what most firms are running.
Why a hardening guide is necessary at all
Every legal-vertical DMS vendor publishes a deployment guide. None publishes a security baseline that maps to ABA Model Rules 1.6(c), 5.1, and 5.3, or to the state cyber-incident notification statutes that now apply in most jurisdictions. The deployment guide does not tell you to disable shared accounts, audit your SAML claims, rotate API keys, or test your restores.
That gap is what threat actors walk through. The pattern is consistent: a shared paralegal login with reused credentials, MFA on the SSO front door bypassed by a forgotten API key, a personal iPad with cached matter documents and no passcode. None of it requires a zero-day.
Access control hygiene — the single biggest problem
The most common finding on a law firm assessment is a shared account. It is usually called ParalegalDesk, Reception, or LegalAssistant, and three to five people log into it across the workday. More often than not it has firm-wide access because nobody wanted to tell a partner the floater paralegal could not open a file.
That configuration breaks several things at once. ABA Model Rule 5.1 makes partners and supervising attorneys responsible for subordinate attorneys; 5.3 extends the same obligation to nonlawyer assistants. Both presume the firm can identify which person did what. A shared login makes that impossible. When a client asks why their settlement memo was downloaded the day before opposing counsel filed a related motion, "one of four paralegals" is not an answer.
Every system in this guide supports per-user accounts and role-based matter access. NetDocuments has cabinet- and workspace-level security; iManage Work has the most granular permission model in the category; Clio Manage, MyCase, and PracticePanther all support per-user logins with matter-team scoping; ProLaw supports per-user accounts with role-based security templates.
The practical recommendation: one account per attorney, one per paralegal, one per staff member, no shared logins, and matter access scoped to the representation team rather than granted firm-wide. Do this before anything else on the list — most of the controls below depend on it.
MFA on the DMS itself, not just on the SSO that fronts it
Every DMS in this category supports MFA, either natively or through SAML SSO. The mistake firms make is assuming MFA on the Microsoft 365 or Google Workspace SSO is sufficient because all DMS logins flow through it. They do not.
NetDocuments supports MFA natively and through SAML SSO with Entra ID, Okta, and others. Both must be configured, and MFA should be required for every user — not optional and not "remembered" indefinitely.
iManage Work supports MFA and SAML SSO. The SAML configuration is where firms get bitten — the claim that determines which users can authenticate is often left permissive, and a misconfigured claim can let a federated guest user log in with an iManage account that was never deprovisioned. Audit the SAML claims and the iManage user table together; they should reconcile exactly.
Clio Manage offers MFA via Clio Identity or third-party SSO; the default is available, not required. MyCase, ProLaw, and PracticePanther all support MFA. Enable it firm-wide, do not allow per-user opt-out, and review the user list quarterly for lapsed enrollments.
The failure mode that catches every firm: the SSO front door has MFA, but a service account or API key path bypasses it. The Outlook plugin syncing sent items to NetDocuments, the e-signature integration pushing executed documents back to iManage, the e-discovery vendor with read access to a single matter — each uses a token that does not flow through the SSO MFA prompt. More on that below.
Cloud DMS versus on-prem
Cloud-hosted DMS (NetDocuments, Clio, MyCase, PracticePanther) shifts the server-hardening burden to the vendor — a real benefit for any firm without dedicated IT staff. iManage Work on-prem and older ProLaw deployments leave that burden with the firm. The threat model differs accordingly.
In cloud DMS, the dominant threat is account compromise and integration token theft. The control set is identity-layer: MFA, conditional access, managed identity threat detection on the Microsoft 365 or Google Workspace tenant, and active monitoring of API key activity inside the DMS.
In on-prem DMS, the dominant threat is server compromise. The firm owns the Windows Server build, the SQL Server hardening, the backup architecture, the patch cadence, and the EDR coverage. Most ransomware incidents I have seen in small law firms began with an on-prem document server that nobody had touched since installation.
The on-prem DMS server itself
If you are running iManage Work on-prem or an older ProLaw installation, the server is a Windows machine holding the firm's most sensitive data. Treat it like one.
A defensible baseline:
- Run a supported Windows Server release — 2019 or 2022 at time of writing — ideally Server Core for the DMS role.
- No interactive RDP from outside the LAN. Put remote admin behind an RDP gateway with MFA or a zero-trust broker.
- EDR on the server. Huntress Managed EDR runs on Windows Server SKUs and should be on every DMS server, not just workstations.
- SQL Server hardening. iManage Work and ProLaw both use Microsoft SQL Server. On older installs the
sa password is weak or vendor-default. Rotate it, remove sa from interactive use, create named SQL accounts for maintenance, and audit sysadmin membership monthly.
- NTFS permissions on the matter store. The DMS service account should have least-privilege rights to only the directories it needs. Domain Users should not have read access to the matter share.
- SMBv1 disabled, SMB signing required, and no daily-driver browsing or email from the DMS server. Ever.
Remote access — the wrong way and the right way
Remote access is where small law firms get breached. The wrong patterns repeat: TeamViewer or AnyDesk on a partner's home laptop with a static password and no MFA; port-forwarded RDP to a paralegal's desktop on TCP 3389; a shared MSP RMM agent on the DMS server with no per-technician audit trail.
The right patterns are not exotic. Entra ID conditional access on every firm device, requiring compliance and MFA before any session touches the DMS. MFA on every remote session, not just the first one of the day. Time-boxed, just-in-time access for the outside IT vendor — granted when work is scheduled, revoked when it is done, with the session recorded and the agreement in place under MR 5.3. No port-forwarded RDP from the internet.
If you only do one thing this quarter, remove the unattended TeamViewer and the port-forwarded RDP.
Audit logging — every DMS has it; almost no one reviews it
Every system in this guide records who did what to which matter at what time. Almost no small firm has ever opened the log.
- NetDocuments: Workspace then Activity Reports. Filter for after-hours access, mass-download events, and deleted matters.
- iManage Work: Audit Trail. Same focus, plus checkout events on sensitive matters and bulk exports through the iManage API.
- Clio Manage: Activity Feed with advanced filters. Pay particular attention to API key activity — the only place integration-token actions surface.
- MyCase, ProLaw, PracticePanther: Each has an admin activity log. The cadence of review matters more than the menu name.
A monthly review of fifteen to thirty minutes catches what matters: bulk downloads in the days before an associate departure, after-hours access from an unusual location, deleted documents on closed matters, permission changes nobody requested in writing, and API key activity from an integration nobody remembers enabling. The cheapest control on the list, and the one most consistently skipped.
Integration tokens and API keys — the silent threat surface
Every modern DMS lives inside an ecosystem of integrations: the Outlook plugin that files emails to the matter, OneDrive or Google Drive sync, Adobe Sign, DocuSign, court filing services, e-discovery vendors, contract lifecycle tools. Each authenticates with an API key, service account, or OAuth token, and each bypasses the front-door MFA that protects human users.
Two things to do:
- Inventory every integration. List every authorized application, API key, and service account in the DMS admin console. Cross-reference against vendors the firm is actually using today. The typical first-pass result is two to four active tokens for integrations the firm stopped using over a year ago.
- Rotate API keys quarterly and disable any integration not actively used. Rotation forces the inventory to happen. A token from a 2021 e-discovery vendor still has whatever permissions it was granted — if the firm did not revoke it, it still works.
BYOD for partners — the awkward truth
Partners want to read matter documents on personal iPads, personal laptops, and personal phones. The friction between that expectation and the firm's supervisory obligations under MR 5.1 is real and unavoidable.
The compliant pattern is a managed-app configuration on the personal device. Intune App Protection Policies on the NetDocuments or iManage mobile app create an encrypted container for firm data, require a passcode, and let the firm remote-wipe matter data without touching the partner's photos. MaaS360, Hexnode, and similar MDM platforms support equivalent per-app policies — palatable to partners who do not want the firm controlling their personal phone.
The non-compliant pattern is the partner forwarding documents to personal Gmail and working from there. We have found this configuration during onboarding more times than I care to count. It is a supervisory failure under MR 5.1 and, depending on the matter, a likely violation of 1.6(c) — and it tends to be invisible until a forensic engagement turns up the forwarded messages months later.
Backup strategy — 3-2-1-1-0 for law
The traditional 3-2-1 backup rule does not survive a ransomware-active threat model. The version I deploy for law firms is 3-2-1-1-0: three copies, two media types, one offsite, one immutable, zero errors on verification.
For cloud DMS, the firm still needs its own backup. The vendor SLA is not a backup, and the vendor's retention policy is not designed for the firm's litigation hold or matter-closure obligations. Use a third-party SaaS backup product — Backupify for Clio, Spanning for Microsoft 365 — and verify recovery quarterly.
For on-prem DMS, the immutable copy is the control that survives ransomware: S3 Object Lock, Backblaze B2 Object Lock, Wasabi compliance mode, or equivalent. Test the restore monthly on a non-production machine, open the DMS database, and confirm a recent matter document opens correctly. Most firms have not tested a restore in over a year.
Outside vendor and e-discovery risk
Outside vendors with matter access — e-discovery platforms, court reporters, expert witnesses, contract attorneys — each need a written agreement specifying data handling, breach notification, and return or destruction of data at matter close. The agreement is how MR 5.3 supervision becomes demonstrable rather than aspirational. A short standard form reviewed by ethics counsel once and applied consistently, sent before access is granted, with matter and vendor tracked on a single sheet.
Where Obsidian Ridge fits
When we onboard a small law firm, the typical sequence is straightforward:
- Deploy Huntress Managed EDR on the DMS server (if on-prem) and every workstation, including partners' laptops.
- Deploy Huntress Managed ITDR on the firm's Microsoft 365 or Google Workspace tenant.
- Where retention or correlation is required, layer managed SIEM across the DMS, the identity provider, and the endpoint fleet.
- Enable per-user accounts in NetDocuments, iManage, Clio, MyCase, ProLaw, or PracticePanther, and retire the shared paralegal and reception logins.
- Enforce MFA at the DMS itself, not just at the SSO, and audit every integration token and API key against current use.
- Configure a monthly audit-log review and a quarterly access review for every open matter.
- Rebuild the backup to 3-2-1-1-0 with an immutable copy and a tested restore.
- Provide the written security plan and incident response plan that legal ethics — and most cyber insurance applications — now require.
None of this is exotic. All of it is the difference between a firm that recovers from an incident in a week and a firm that pays a ransom, notifies clients under state breach law, and explains itself to the state bar's office of disciplinary counsel.
If you run a small law firm and are not sure where you stand against this list, book a briefing. We will walk through your DMS configuration, your audit logs, your integration tokens, your BYOD policy, and your backup strategy, and tell you honestly what to fix first.