Skip to content

Ideas and Feedback

Ideas and Feedback

Categories

  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback

65 results found

  1. Ability to add a label/description against each IP address listed in the 2FA Access List. If you end up with a long list of IP addresses, it can be difficult to keep track of current IP addresses and identify IP address which are no longer current and should be removed.

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  2. I keep getting a message that says I should buy another license. The KB leads me to believe this message appears when techs log in from multiple locations at the same time. I would like to see a list of the offending accounts.

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  3. Ability or script to change and domain admin password or add a domain admin user / password.

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  4. Audit logs for terminal connection requests by technicians should include a transcript of the commands, or at the very least create a log locally on the endpoint that can be retrieved/reviewed.

    Simply knowing Technician 1 requested a terminal session does not aid in either validating or invalidating issues after a connection was made. Logging on endpoints is not always enabled, collected in a SIEM, or logs are overwritten beyond a certain size/date.

    This would allow for IT teams and MSP's to ensure visibility into what commands are being run by who from the Atera platform.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  5. Currently it is only possible to have one device per OS registered for Atera 2FA. If I replace my phone with a new one I have to go to Atera admin settings and reset 2FA which resets it for all devices including my Windows device which I don't need to have 2FA reset on. Please make it possible to remove devices individually from Atera 2FA settings.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  6. Show oudated software via info alert an show what is the new version and give the function to update it right away

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  7. Dashlane seems to have risen in popularity since the big LastPass hack. Any chance of a third-party password management tool like Dashlane being integrated with Atera?

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  8. Command prompt / terminal is opened as root. It would be great to define another user account which lower privileges. Also the terminal is not working if root has /sbin/nologin set.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  9. Add a description to the Access List. Although the IP address helps identify the location, adding a description will help navigation and identification.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  10. If a user is WFH you need to be able to disable the file transfer option for users or at minimum, if you are accessing someones files/downloading them, the end user should recieve an alert/notification similar to if you connected into their machine, that "AdminXXXX has downloaded a file". I think that would be a basic security/privacy requirement. Fact you can just download files without end person knowing isn't right.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  11. The idea is for the API call to provide security posture details that can then be used to make 802.1X authorization, remediation decisions. Since the agent is already installed on the device, it should be easy to remediate the issues and then grant access. Some values to include:

    Security:

    Antivirus: Bitdefender Endpoint Security Tools Antimalware (Installed or not)
    Status: Active or not active

    Anti spyware:
    Status: Active and Updated or not active and outdated

    Firewall: Bitdefender Endpoint Security Tools Firewall
    Status: Active and Updated or not active and outdated

    Patch Status:

    Also, can get windows security patch details? Like what…

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  12. Splashtop users will be aware of this feature already however, you can check which devices have been successfully authenticated and have logged into your Splashtop Account. In Atera, you can check your Activity log which will show what IP Addresses the user has successfully logged in from however, it's not particularly useful in identifying that your Atera account is secure. Given the damage that can be done if your Atera account is compromised, I think it would be reassuring that the devices using your account are easily identifiable.

    What's your thoughts?

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  13. It would be great to have to ability to block unauthorized inventoried software from launching. There are installers that does not require administrator rights to install and some of my users have learned that.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  14. The Ability to Edit Existing Stored Passwords is Paramount!
    ALso the Ability to Export stored Passwords to .CSV file.

    These two features should be implemented as they are commonly needed.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  15. We should be able to lock down recent processes by Tech. Our Techs should only be able to see the recent processes from Running Scripts, to those they have ran themselves. Alternately, Tech's should not be able to see when I have run a script against their computers.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  16. In many cases the computers belong to the company and they have a right to monitor their hardware and intellectual property so it would be helpful to either temporarily disable the notification of an admin coming on or remove it completely.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  17. Its good to have the option to only login in from IP-addresses, but would be a lot more powerful if only allowing login from certain MAC-addresses. This way it has to be your machine you are login into.

    Once the admin selects this feature in the admin portal, the change has to be approved with a MFA prompt. So the admin has to have MFA setup before moving on to the MAC-address option. When the approval is granted the MAC-address from the admin computer is automatically added as a approved MAC-address, so not to lock out the admin from the…

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  18. in the admin menu there is a possibility to use a whitelist. because we think security is really important we use both 2FA and the ip whitelist.

    we miss 2 options:
    - the possibility to whitelist IPv6 addresses
    - the possibility to ad notes next to every ip-address that is whitelisted. (Like: branch office, datacentre, etc etc.)

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  19. So imo, scripts that are batch or powershell that are ran are stored in the location - C:\Program Files\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools

    Need to be obfuscated or encrypted somehow because they show up in clear text if they are stuck, sometimes these scripts could have a hardcoded password that are needed to work for instance runas etc.... Yeah, I have a script to delete all *.bat and *.ps1 - this is not an answer though.

    All it takes is one kid that knows how to work on a vcr to mess things up!

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  20. 1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Security  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  • Don't see your idea?