Request for Connectwise integration into the Backup & Recovery Web Console (https://backup.management) include the ability to create a ticket in Connectwise, similar to N-Central's integration.
Right now it is very difficult to try and stop workstations from auto-updating to the latest build of Windows 10. We would like to hold out on these updates until after a few months of it being out then begin to steadily roll it out with clients. Right now the only way I've found to try to do this, with only partial success, is to search in patch management for the build number and decline the patches. Sadly even that ...more »
On the Admin website Area under Management > MSP anywhere Proxy, it would be nice to have a search function in order to speed up the process of finding a specific Proxy.
Unlike the agent the proxy name needs to be deleted when reinstalling the proxy, thus with a huge number of proxy's makes it time consuming to find the right one to delete.
We issue reports to the clients on Patch status and we are getting a lot of patches in reports that have been superseded and the client is asking why there was no record of that patch being installed, on a monthly basis. It would be nice to show in the report that the patches have been superseded.
This would be for all patch reports in N-Central and Report Manager.
In the Patch Reboot Schedule, there is an option to "place device in downtime during reboot" however it doesn't actually do anything useful. The expectation is that this would put the device into maintenance mode for the duration of that reboot so that all alerts would be suppressed. Instead, it just disconnects the agent (which happens anyhow) and I get hammered with alerts because the server is offline (like DUH). ...more »
Dear N-central team, It's now become a requirement for ourselves and a set of customers, who are going through Cyber Essentials Security Certification, that all patches are installed within two weeks of their release date. In the Patch Profile you can check the box 'Force Missed Patch Installation on Boot' but there are various issues / limitations around this: -Although it says the machine will just install the missing ...more »
The Synology NAS systems have a variety of apps available for use and some of them have desktop components. It would be nice if the patch management component of RMM had the ability to patch Synology software, such as their Drive Client (formerly Cloud Station Drive).
please setup Patch Status v2 to give us an indication of when a patch became available to a machine
let this indication show up in the service details portion of notificaions
I would hope that if a patch was released 3 years ago but wasn't available to a machine until yetserday that it would count yesterday as the approval date, but this would give us another way to verify that.
It seems that 3rd party patches by defualt are downloaded even when 3rd party patching is not enabled.
When there is an agent running there are 3rd party patches downloaded in C:\Program Files (x86)\N-able Technologies\PatchManagement\ThirdPartyPatch
Would like to have them only available when the option is active
My company uses the Solarwinds RMM agent on many thin clients and since thin clients do not need to be kept up to date with the latest security patches we would love to see the ability to completely turn off vulnerability scans without uninstalling patch management.
I'd like to manage the Power Config on the remote devices via a DirectSupport tool, and have it incorporated into Rules.
This way, if devices are set to go to sleep, we could change it remotely for maintenance windows.
Further, if we could set sleep schedules via the agents and rules, we could then schedule maintenance windows to run, then let the devices sleep when there is no maintenance cycle.
I have found (especially with Windows 10/Windows Server 2016 server devices), that the following patches will be downloaded into the Agent Patch Cache (C:\Program Files (x86)\N-able Technologies\Patch Management\archive\): - Patches that have been set to "Approved for Install" which are not yet installed, and are superseded by other another patch that is also in the list of "Approved for Install" and "Not Installed" list. ...more »