Skip to Main Content
ADD A NEW IDEA

Security

Showing 21
14 VOTE

DNS Flush of Workstations Using Right Click Tools

Since users are constantly on VPN and there are issues with duplicate IP addresses/DNS names come back to a different computer names. This is our most security flaw that we are encountering, where computers are not getting updates from WSUS/SCCM/R...
Guest about 2 months ago in Security 3
1 VOTE

Option to Block Execution of Applications in Kiosk Manager

Currently, restricting access to applications such as PowerShell, Command Prompt, Registry Editor, and Task Manager requires separate policies or scripts. It would be highly beneficial to have a built-in option within Kiosk Manager that allows adm...
Guest 7 days ago in Security 0
6 VOTE

SIEM integration for Activation Codes and Retrieved Passwords

Please add the ability to log ship Activation Code and Retrieved Password logging to a SIEM. Our Cyber Security Ops team needs the ability to see these events in the SIEM console, without having to view the logging in the RMS console or SQL. Alter...
Michael Jones 3 months ago in Security 4
22 VOTE

BROWSER EXTENSION INVENTORY/REPORT - ALL BROWSERS

For security purposes, knowing what browser extension exist, is important. This inventory must collected for all browse , Chrome, Edge, Firefox and Opera. This will cover all of the major Windows Browsers. This idea did not get moved over from the...
Garth Jones over 1 year ago in Security 5 Future consideration
16 VOTE

MacOS support for Privilege Manager

Privilege manager support would be fantastic for MacOS as there are large gaps with intune and credential management on MacOS. Even just basic support for elevation on demand would be a great first step.
Scott Erickson about 1 year ago in Security 2
1 VOTE

Remote Desktop mstsc /restrictedAdmin

If endpoints are properly configured, you can use remote desktop launching mstsc.exe with the /restrictedAdmin switch, which does not require re-entering credentials and does not send the password to the remote computer. Per Microsoft's documentat...
Guest 29 days ago in Security 0
4 VOTE

Logs for what was launched vs what was asked for

It would be extremely beneficial to show in privilege manager for any activation codes used, what was actually launched... if we give out the activation code, we are blind to what they are actually doing behind the scenes.
Guest 4 months ago in Security 1 Planned
24 VOTE

Schedule my own deployment time (not when the new version is released)

As a sys admin, I want to run my deployment process using schedule (not when the new version is released)
Prudvee Raj about 2 years ago in Automation / Security  / User Experience 2
1 VOTE

Choose user account to run browser extension under

Our environment has separate administrator logins for our endpoint team. When we launch MECM with our admin accounts, RCT uses the admin account to access and manage devices, etc. The Intune plugin uses the user context that the browser is running...
Patrick Callahan about 2 months ago in Security 0
3 VOTE

Limit the Activation Code Validity Times

In Carillon we do not allow long activation code validity times. There should be a central place where the allowed times can be configured and which one is the default. e.g. Carillon: ServiceDesk \ ActivationCodeValidityTimes .xml" <?xml versio...
Olaf Thyssen about 1 year ago in Security 1