Skip to Main Content
ADD A NEW IDEA

Security

Showing 7
1 VOTE

Deployment approval email recipients

Allow also to define email recipients for available type of deployment processes steps that require approval
Juha Haapsaari 5 months ago in Automation / Roles and Permissions / Security 0 Future consideration
12 VOTE

BROWSER EXTENSION INVENTORY/REPORT - ALL BROWSERS

For security purposes, knowing what browser extension exist, is important. This inventory must collected for all browse , Chrome, Edge, Firefox and Opera. This will cover all of the major Windows Browsers. This idea did not get moved over from the...
Garth Jones 7 months ago in Security 2 Future consideration
3 VOTE

Add BIOS version to Security tools

I'd like to be able to view what BIOS version each computer has when pulling up the Security Tools. There's a lot of BIOS/UEFI information such as TPM and secure boot, but adding a BIOS version will easily let us know if they're needing to be upda...
Chris Jameson about 2 years ago in Security 0 Future consideration
7 VOTE

BIOS Management & Firmware Upgrade

I'm looking solution for BIOS Management & Firmware Upgrade for DELL, HP, Lenovo & Surface devices.
Guest almost 3 years ago in Security 0 Future consideration
4 VOTE

Map CVE to inventory

Map a list of known vulnerabilities to the software inventory and hardware firmware so you can pull a report of vulnerable software installed on clients/servers.
Guest almost 3 years ago in Security 0 Future consideration
14 VOTE

Update/View BIOS Firmware

It would be very helpful if we can perform a BIOS upgrade (firmware upgrade) on client workstations. We mostly use Dell and some HP hardware.
Guest over 4 years ago in Security 0 Future consideration
4 VOTE

Endpoint protection Full Scan kickoff & reporting

Currently using Windows Defender/SCCM for endpoint protection. Looking for quicker methods to force a Full Scan to workstations on demand, then get detailed reporting on the status of the scan on each workstation using RCT. Would also like to see ...
Guest over 4 years ago in Security 0 Future consideration