Skip to Main Content
ADD A NEW IDEA

Security

Showing 28 of 831
3 VOTE

Support for passwordless login in Privilege Manager

As more people are using passwordless and/or long passwords, when using the run as domain users, writing the password is a bit legacy. Could we use Windows Hello for Business credentials to confirm the elevation without using a password?
Heikki Harsunen about 2 years ago in Security  / User Experience 0
4 VOTE

Add BIOS version to Security tools

I'd like to be able to view what BIOS version each computer has when pulling up the Security Tools. There's a lot of BIOS/UEFI information such as TPM and secure boot, but adding a BIOS version will easily let us know if they're needing to be upda...
Chris Jameson about 3 years ago in Security 0 Future consideration
4 VOTE

Map CVE to inventory

Map a list of known vulnerabilities to the software inventory and hardware firmware so you can pull a report of vulnerable software installed on clients/servers.
Guest almost 4 years ago in Security 0 Future consideration
1 VOTE

Ability to export audit logs to syslog server

This really would be for all RMS actions. But instead of storing in the database, we could keep only a few days here and then ship them all off to our syslog server for future discovery. I'm thinking about utilizing Recast Builder more for admin t...
Travis Patenaude over 1 year ago in Security 1
4 VOTE

Endpoint protection Full Scan kickoff & reporting

Currently using Windows Defender/SCCM for endpoint protection. Looking for quicker methods to force a Full Scan to workstations on demand, then get detailed reporting on the status of the scan on each workstation using RCT. Would also like to see ...
Guest almost 6 years ago in Security 0 Future consideration
1 VOTE

Deployment approval email recipients

Allow also to define email recipients for available type of deployment processes steps that require approval
Juha Haapsaari over 1 year ago in Automation / Roles and Permissions / Security 0 Future consideration
1 VOTE

Ability to require approval on a deployment step

Before starting to execute a deployment someone would need to approve that.
Prudvee Raj about 2 years ago in Security  / User Experience 0
0 VOTE

Limit what action can be elevated

I would like to specify rules to control who, what and where actions can be elevated to run with admin privileges
Juha Haapsaari over 2 years ago in Security 0 Planned