Skip to Main Content
ADD A NEW IDEA

Security

Showing 16
1 VOTE

Ability to export audit logs to syslog server

This really would be for all RMS actions. But instead of storing in the database, we could keep only a few days here and then ship them all off to our syslog server for future discovery. I'm thinking about utilizing Recast Builder more for admin t...
Travis Patenaude 9 months ago in Security 1
4 VOTE

Map CVE to inventory

Map a list of known vulnerabilities to the software inventory and hardware firmware so you can pull a report of vulnerable software installed on clients/servers.
Guest over 3 years ago in Security 0 Future consideration
1 VOTE

Deployment approval email recipients

Allow also to define email recipients for available type of deployment processes steps that require approval
Juha Haapsaari almost 1 year ago in Automation / Roles and Permissions / Security 0 Future consideration
4 VOTE

Endpoint protection Full Scan kickoff & reporting

Currently using Windows Defender/SCCM for endpoint protection. Looking for quicker methods to force a Full Scan to workstations on demand, then get detailed reporting on the status of the scan on each workstation using RCT. Would also like to see ...
Guest over 5 years ago in Security 0 Future consideration
1 VOTE

Ability to require approval on a deployment step

Before starting to execute a deployment someone would need to approve that.
Prudvee Raj over 1 year ago in Security  / User Experience 0
1 VOTE

Limit what action can be elevated

I would like to specify rules to control who, what and where actions can be elevated to run with admin privileges
Juha Haapsaari almost 2 years ago in Security 0 Planned