Skip to Main Content
ADD A NEW IDEA

Security

Showing 15
4 VOTE

Map CVE to inventory

Map a list of known vulnerabilities to the software inventory and hardware firmware so you can pull a report of vulnerable software installed on clients/servers.
Guest over 3 years ago in Security 0 Future consideration
1 VOTE

Deployment approval email recipients

Allow also to define email recipients for available type of deployment processes steps that require approval
Juha Haapsaari 11 months ago in Automation / Roles and Permissions / Security 0 Future consideration
4 VOTE

Endpoint protection Full Scan kickoff & reporting

Currently using Windows Defender/SCCM for endpoint protection. Looking for quicker methods to force a Full Scan to workstations on demand, then get detailed reporting on the status of the scan on each workstation using RCT. Would also like to see ...
Guest about 5 years ago in Security 0 Future consideration
1 VOTE

Ability to require approval on a deployment step

Before starting to execute a deployment someone would need to approve that.
Prudvee Raj over 1 year ago in Security  / User Experience 0
1 VOTE

Limit what action can be elevated

I would like to specify rules to control who, what and where actions can be elevated to run with admin privileges
Juha Haapsaari over 1 year ago in Security 0 Planned