Skip to content

Ideas and Feedback

Ideas and Feedback

Categories

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback

67 results found

  1. Atera Hosted SIEM: smaller healthcare clinics, they would like to have the SIEM built in. little agent that is on the computer and its only purpose is to record and checks for vulnerability – makes a record of everything you are doing on the computer (Websites you're going into, connected to the shared, used an app to open), sort of like auditing tool. Something that you can use to catch security breach. It’s becoming more and more important.

    4 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  2. When I'm logged in to atera I have access to a lot of sensitive informations. Also it is possible to run commands or open command prompt with admin / root privileges. It would be nice to set an additional layer of authentication. For example before I get access to command prompt or change a script I have to enter my password again. FIDO Keys would also be nice to use. So I can insert my FIDO smart card while I'm using atera and can authenticate myself before I access sensitive informations. Session hijacking would work but cannot get my physical…

    6 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  3. Command prompt / terminal is opened as root. It would be great to define another user account which lower privileges. Also the terminal is not working if root has /sbin/nologin set.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  4. Add a description to the Access List. Although the IP address helps identify the location, adding a description will help navigation and identification.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  5. While the risks of ChatGPT and AI are still being identified, Atera should implement an On\Off button, giving organizations the ability to turn off ChatGPT until they are comfortable with the risks.

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  6. As other asset managers do, such as Qualys, it is often necessary to find and remove End of Life software from devices. It would be a very nice feature if Atera was able to show End of Life dates for known software, frameworks and plugins in the Software Inventory.

    9 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  7. 1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  8. Allow dashboard notification for users attempting to install their own software, that do not have administrative permissions to do so. Give technicians the ability to review and then authorize installation that would "temporarily" grant admin permissions to that specific instance

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  9. We often work with users who may need password resets or new account creations. It would be nice to have a built-in feature that allows us to encrypt these types of communications to ensure the safety and security of credentials. Currently, we have to use other software.

    10 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  10. If a user is WFH you need to be able to disable the file transfer option for users or at minimum, if you are accessing someones files/downloading them, the end user should recieve an alert/notification similar to if you connected into their machine, that "AdminXXXX has downloaded a file". I think that would be a basic security/privacy requirement. Fact you can just download files without end person knowing isn't right.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  11. To obtain custom field data in an automated script, the API Key is required to be in the script in plain text.
    The agent on the end point running the script should already have access to the custom fields in its own asset and parent customer records.
    Please create a Atera Powershell module that can obtain custom field data without requiring the API Key.

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  12. Configure the IP or FQDN that the API Key can be called from.

    5 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  13. By default AnyDesk get pushed to all endpoints (including servers which have the Atera Agent installed). While this is nice for user Machines - it's less then ideal for servers... Give us the option to exclude machines from AnyDesk Deployment. Or better yet: let us choose on which machines (machine type) we want to install anydesk

    7 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    2 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  14. Being able to enforce screen lock times in the portal and not by script would be a great way to ensure security and be able to view that status.

    6 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  15. We currently Run Mac, Windows and Linux. A way to pull the Filevault recovery key just like the bitlocker key would be useful when users are traveling and have an issue. You can not always ensure that they have a copy of their key laying around in case of damage that needs to be repaired before they can return home.

    5 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  16. ISO 27001 and 27002

    4 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  17. 4 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  18. That will be great if you integrate Atera with the Teramind platform (https://www.teramind.co/). They provide user monitoring and threat prevention solutions. They offer the following features

    Security & Compliance
    Insider Threat Prevention
    Employee Monitoring
    Compliance Management
    User & Entity Behavior Analytics (UEBA)
    Behavioral Data Loss Prevention (DLP)
    Insider Fraud Detection

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  19. Integration with Hexnode solutions. It offers Unified mobile, Desktop & IOT management.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  20. It is crucial for us to have a 2FA check when deleting bulk of data, such as a site.

    7 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  • Don't see your idea?