In the MSP Mail platform, users were allowed to specify enforcing TLS, enforcing TLS if possible, and not requiring it. These options are not available within the Mail Assure Platform. It would be nice to see these options within the Mail Assure platform and grant control over how certain domains process emails and handle TLS directly. Opportunistic on all the time is nice, but in certain scenario's, namely where a ...more »
As a user of MSP N-Central, we would like to use MSP Anywhere with on-premise servers for security, privacy and performance purposes. So no connection will be made to ncentral servers for this function.
A competitor is already doing this, Bomgar (https://www.bomgar.com/remote-support)
Thank you !
Since KES 11 is release since a few days, it would be nice that RMM can support virus database check on KES 11
ATM, KES 11 is not detected by RMM.
ESET has a very robust 2FA proposition. Being that N-Central is a system that has to have security in the top of it's priorities, I would suggest support for more 2FA products like ESET 2FA. ESET 2FA has all the API documentation readily available for development of support in applications.
Would like to add password proxy services.As an admin/operator I would like to put access passwords to devices like switches, routers, firewalls, and other devices. Must connect with services like SSH, Telnet, RDP, Web, etc... Then have the Agent/Representative just click to connet without putting a password in. This will help maintain the security and password integrety of devices that are typically not changed often ...more »
The fact that enabling 2 factor support for the product admin disables the ability to login to the port 10000/admin page is a huge security problem. Second to that the fact that having two factor enabled locks out the product admin when the password expires and needs changing is a major problem as well. We shouldn't have to resort to either turning off 2 factor or contacting support to unlock our accounts everytime ...more »
It appears that there is no way to separate (different IP Address or Port) "Agent Data" from "WebGUI Management". Because of the high risk a compromised N-Central server poses to all of us and our clients there should be a simple way to isolate the WebGUI Management interface while maintaining the ability to collect Agent data across the Internet.
Have an object that can pull down the distribution or security groups of a domain without having to assign a user to pull from. This could be used in creating automation scripts to create new ad users and assigning them to the correct groups.
Updating firmware/BIOS/drivers. Wondering if there is a way of automating this process through the RMM rather than going to the manufacturer website? At least for the major manufacturers? Thoughts?
RMM has a forced location-based security that leads to long delays in the ability for those of us that use RMM while at clients to deliver timely service. When you login at a new IP address, it apparently triggers this state, delaying your login until you click on a link in an email. However, I've needed to wait 5-10 minutes for this email before, delaying my ability to service my clients in a timely fashion. What adds ...more »
There is a serious usability issue for Solarwind's 2FA. They're requiring it on _every_ login, thus forcing us to wait to access our dashboards, wasting valuable time during times that might be critical. Furthermore, they're going to force everyone that is using take control in RMM to use 2FA, and have a dialog trying to get you to use 2FA. 2FA should be required at every login of a _new console device_, and at best ...more »
I can see tons of false positives in the listings.
If there was an icon indicatior as to whether the file/url is still being blocked, that would allow us to skip over those entries and focus on the ones that actually are currently blocked in the submission process for de-listing.