Skip to Main Content
ADD A NEW IDEA

Security

Showing 16
1 VOTE

Ability to export audit logs to syslog server

This really would be for all RMS actions. But instead of storing in the database, we could keep only a few days here and then ship them all off to our syslog server for future discovery. I'm thinking about utilizing Recast Builder more for admin t...
Travis Patenaude 10 months ago in Security 1
4 VOTE

Map CVE to inventory

Map a list of known vulnerabilities to the software inventory and hardware firmware so you can pull a report of vulnerable software installed on clients/servers.
Guest over 3 years ago in Security 0 Future consideration
1 VOTE

Deployment approval email recipients

Allow also to define email recipients for available type of deployment processes steps that require approval
Juha Haapsaari about 1 year ago in Automation / Roles and Permissions / Security 0 Future consideration
4 VOTE

Endpoint protection Full Scan kickoff & reporting

Currently using Windows Defender/SCCM for endpoint protection. Looking for quicker methods to force a Full Scan to workstations on demand, then get detailed reporting on the status of the scan on each workstation using RCT. Would also like to see ...
Guest over 5 years ago in Security 0 Future consideration
1 VOTE

Ability to require approval on a deployment step

Before starting to execute a deployment someone would need to approve that.
Prudvee Raj over 1 year ago in Security  / User Experience 0
1 VOTE

Limit what action can be elevated

I would like to specify rules to control who, what and where actions can be elevated to run with admin privileges
Juha Haapsaari almost 2 years ago in Security 0 Planned