The GFI max platform is accesable from the internet. Therefore the login processing must be protected from unauthorized access. Currently there are no or limited features to protect the servers/workstations within the portal. Only a single factor authentication from the internet is considered very weak. While we are not talking about protecting a hotmail/gmail mailbox, we are protecting a huge amount of resources like ...more »
Love the Web Protection feature - however without reporting it is only about 50% useful.
Reports are needed on a per user basis that would show, at a minimum, (a) all activity and (b) sites that were blocked. Time spent on a site as well as overall time browsing would be useful as well.
Not sure how you can release something without the ability to generate reports.
If the web protection reports part of the web protection module in RMM could be accessible by our clients via the client dashboard it would save us a lot time having to email our clients the reports. They could then monitor the reports themselves. Or perhaps if this is not possible, GFI could provide a way to automate the sending of the web protection reports on a daily/weekly/monthly basis to our clients.
Would be great to be able to provide the same Web Protection management for OSX (Mac) clients, now that the new service has launched.
I have 100's of customers who want to purchase right now Anti-virus, Anti-malware, Web Protection on Mobile Devices, please!!! Rush, Rush, Rush I'm going to have to purchase Webroot or Emsisoft but would rather purchase GFI MaxRemoteManagement features if they are delivered very soon. They aren't going to purchase GFI MaxRemoteManagement for their Mobile devices until you can deliver the whole package.
GFI max remote management works with the old Panda Cloud Office 5.5 version but not with the new Panda Cloud Office Protection 6.0. Guys we need this update on the agent ASAP. Tks.
We should be able to allow users to temporarily disable Bitdefender. I had two users that needed their antivirus software disabled in order to install their software. The customer was perturbed because it impacted their day waiting for me to get to the console and disable their software. And, then they had to contact me again to re-enable it.
It would be really cool if the Advanced Monitoring Agent can (and will) detect public IP's, or that a check can be made for this. This can be used to track the whereabouts of machines of a Client. In case the machine gets stolen, it automatically fetches the public IP and reports this back to the dashboard. As a reseller you log in to the dashboard and the public IP will be shown in the check-result (24/7, only at startup), ...more »
Would like for the end-user have ability to request a whitelist or whitelist a blocked website themselves. This can be done by clicking on a "Proceed Anyway" button, submitting a built-in whitelist request form, or bypass by entering their dashboard credentials. A check box could be available indicating "I understand this website was being blocked for my protection and wish to proceed anyway."
It would be much more effective if we could assign web protection policies based on username instead of machine. This way we can set different levels of filtering websites based on user job description and or role. It would make for much better reporting as well, we would be able to identify heavy offenders and activity.
Hi, I don't understand why there is no blocking on Reputation, I had a customer that got infected with CryptoLocker and tracking it backwards, I can see the request to checkyourparcel.net at the time this was marked with Category Unknown and Reputation: Suspicious but web filtering still allowed access! Now the same website is listed as Malware Sites and High Risk. Please add an option to block based on Reputation, ...more »
We have discovered that exceptions set in a MAV policy only apply to scheduled quick/deep scans and not to Active Protection. Why? We have a server on which MAV is continually quarantining a benign exe file. After setting a full path exception for the file in the MAV policy, the file continues to be quarantined. We opened a case with LogicNow and were told "After speaking with some colleagues and reviewing Threattrack's ...more »