I notice that the DSC hacker check is able to report on the number of attempts that have occurred over the past 24 hours. However, it would be nice that the hacker check would show a summary of what user name(s) caused the authentication or login failure and associate that account with the number of attempted failures Also, it would be nice to see what time the failures have occured during the day. This would be ...more »
The GFI max platform is accesable from the internet. Therefore the login processing must be protected from unauthorized access. Currently there are no or limited features to protect the servers/workstations within the portal. Only a single factor authentication from the internet is considered very weak. While we are not talking about protecting a hotmail/gmail mailbox, we are protecting a huge amount of resources like ...more »
The feature "Active Discovery" was a great enhancement for MAX RM. Finally, the Agent starts to discover the customer's subnet, too, and you can have a deeper look into his infrastructure. This is a step towards the right direction, but there's more you could add on top of "Active Discovery". How about "Network Analysis". Please, let us have a deeper look into the customer's subnet with the possibility to collect and ...more »
Integrate with the registered version of Teamviewer, so that my custom agent with my logo is used instead. This way security updates and other features are available faster and I have full Ipad functionality now, instead of later.
I am concerned that the entire GFI sales and support team has full access to my remote management dashboard and although you can artificially kind of lock it down by creating a Super User and disallowing the GFI assigned user credentials to access the console I was told that realistically the only way to know if a rep turns access back on and then off again is to watch the logs. I was told that they do not have access ...more »
Currently, scripts that are assigned to a workstation, or even ones that were assigned and then removed are stored in the location: C:\Program Files (x86)\Advanced Monitoring Agent\scripts
These scripts can easily be viewed and taken from a competing MSP
On newer agents (9.8.5 in particular), when you run it locally, it has the username filled in already. I used the Remote Worker site installation package on a system, then ran the Agent locally and it showed the email/login for our main Agent Key username. I logged in with my credentials, then the next time I ran the Agent it had my email/login stored.
The username box should be blank by default.
Configure the Advanced Monitoring Agent to support Kaspersky Endpoint Protection 10
The agent 'Alternative password' field is visible to anyone at the workstation when the password is being entered or the Options window is open. I often enter a password in this field through a Take Control session and have no idea if anyone is at the station and can see it. Needs and option to hide the password.
Generic antivirus installed/up-to-date check using Windows Security Center or Action Center
would be nice to have a web based link to deploy (pre or non configured) agents to a remote computer or server. instead of having to login to my dashboard remotely on the device, then download the agent to the selected device, or centrally on a server network share, then attempt to install it. by only providing the link, you could just download the agent specific to your client and site, without having also to show ...more »
The phone calls, emails, and numerous complaints on here should make it self-evident already. There are a ton of them so there's really no single place to post my thoughts without repeating the same information on a lot of posts. So I'll start a new one and hope the community here might see it and add their .02. The new poorly-implemented IP restrictions and 2FA crap are a huge hurdle we have to deal with every day - ...more »