Option to have Disable AV defender in the local device without logging in to N-Central.
AV scanners have evolved as has bitdefender however we are not receiving the full power of the appliaction we are paying for and as such we have started evaluating Sonicwalls Capture Client so that we receive the ability to sandbox files Solarwinds have the license to include the sandboxing feature that Bitdefender provide but are relucatant to include it until it is voted upon despite the risk of loosing 5000+ AV licenses ...more »
we have had a few customers ask to have Av Defender Servers profile to add the IDS feature.
would be nice if under the Device view and at the Add Task Tab drop down had an option to run security scans.
It would be nice to have an .msi format installer for AV Defender installation - this would simplify deployment in some environments where partners wish to script the install or deploy via MDT. Currently the supplied .exe files require some additional work to script the installation when deployment via N-Central isn't possible or practical.
Right now, if you enable AV defender for an X number of devices, you will not get feedback if it is indeed succesfully installed.
you have to go trough each agent, or hover over the device to see if the version is installed or not. Also, you will not get notified if the existing anti-virus programm was uninstalled (if there was any).
Some computers are not on during the maintenance window I have set for AV Defender updates and upgrades.
It would be awesome if similar to patch management there was an option that said "Install updates on next startup"
That way we can make sure even the devices not running during maintenance window are getting the needed updates.
The list of available Windows Wildcards are nice but they seem to be lacking. It would be nice if more variants of the Windows wildcards were accepted when creating Glocal Exclusions for AV Defender. For example %HOMEDRIVE% (Points to drive where Windows is installed, normally C) In my testing I've noticed that this is not recognized by AV Defender and I'd like to cover all my bases in case a random machine has Windows ...more »
Getting MD5/SHA2 hashes of AV Defender detections would greatly aid our SOC team in threat correlation. As of right now we have no method to perform deeper analysis other than removing the relevant files. Other than implementing a centralized sandbox, getting hashes is the next best thing to help us connect the dots.
Implement some kind of feature that prevents additional instances of console.exe from spawning with every user that logs into a terminal server.
As it stands currently, the AV Defender Status report run through N-central does not give a clear picture on which devices are considered to be "Normal" and which are "Not Monitored", which makes troubleshooting difficult
I've noticed that some of our clients' devices have not been getting AV Defender agent updates. Our maintenance windows are usually set on the weekends or late at night, so I suspect that the users are turning off their PCs despite us telling them otherwise. For Windows updates, there's an option to have the updates installed the next time the machine boots up. It would be great if there was a similar option for AV Defender. ...more »