- or
No existing idea results
- ~ No ideas found ~
4752 results found
-
Remove or Allow Disable of Confirmation Token
This is already mentioned in the Revamped Agent thread, but I feel like this is deserving of its own.
The Confirmation Token is the single most reason that I can't use the Help Desk Agent in our environment and why I haven't moved our ticketing to Atera. I already have a Contact Relation attached to the Device. I would think that it would know that that contact was tied to the device already, yet the user still has to use a confirmation token to submit a ticket.
3 votes -
Customization of Alert Pausing
Customize the amount of time
Mass pausing for devices
Pausing based on Automation profiles12 votesNice! The feature you requested is being reviewed by our product team. We’ll keep an eye on the number of votes, and let you know if a decision is reached to implement. Thank you for being a partner in our process!
-
13 votes
Nice! The feature you requested is being reviewed by our product team. We’ll keep an eye on the number of votes, and let you know if a decision is reached to implement. Thank you for being a partner in our process!
-
italian
It would be helpfull to have atera be translated in Italian.
I could help in this.8 votes -
Application control/Whitelisting
Integrate with ThreatLocker to control what applications send or receive, lock down ports to the system.
"
Total endpoint control over what software can run, and what resources it can access. With simple to use, robust and policy-driven Application Whitelisting and Ringfencing.
Application Whitelisting has long been considered the gold standard in protecting businesses from viruses, ransomware, and other malicious software. Unlike antivirus, Application Whitelisting puts you in control over what software, scripts, executables, and libraries can run on your endpoints and servers. This "default deny" approach not only stops malicious software, but it also stops any other unpermitted applications from running.Controlling what software can run should be the first line of defense in protecting yourself from malicious software. Ringfencing then adds the second line of defense for applications that are permitted. First, by defining how applications can interact with each other, and then controlling what resources applications can access, such as network, files, and registry. Ringfencing is an invaluable tool in the fight against fileless malware and software exploits.
Full granular audit of every executable, script, or library executed on your endpoints
Default deny application whitelisting approach to deny anything not trusted by your business
Thirty seconds single click approval
Stop fileless malware and limit damage from application exploits
Define how applications can integrate with other applications
ThreatLocker automatically adds new hashes when application and system updates are released
"Integrate with ThreatLocker to control what applications send or receive, lock down ports to the system.
"
Total endpoint control over what software can run, and what resources it can access. With simple to use, robust and policy-driven Application Whitelisting and Ringfencing.
Application Whitelisting has long been considered the gold standard in protecting businesses from viruses, ransomware, and other malicious software. Unlike antivirus, Application Whitelisting puts you in control over what software, scripts, executables, and libraries can run on your endpoints and servers. This "default deny" approach not only stops malicious software, but it also stops any other unpermitted applications…9 votesNice! The feature you requested is being reviewed by our product team. We’ll keep an eye on the number of votes, and let you know if a decision is reached to implement. Thank you for being a partner in our process!
-
Real time CPU / Memory utilization graphs
Allow user adjustment of the update interval for the CPU / Memory utilization graphs to give technicians a better real-time view of the system resources.
10 votesNice! The feature you requested is being reviewed by our product team. We’ll keep an eye on the number of votes, and let you know if a decision is reached to implement. Thank you for being a partner in our process!
-
SNMP Context Names
Some consumer devices support SNMPv3, but dont allow users the ability to change or blank the "Context Name" option.
Since there is no option to define a Context Name in Atera, its impossible to use SNMPv3 with these devices. Please add the option to define a context name so the latest security standards can be used.1 vote -
Notes in automation
A notes section for each Automation Profile created, to give a brief description and summary.
1 vote -
Possibility to bulk import from a csv file for snmp devices specifying OID template to use, customer, folder, etc.
Possibility to bulk import from a csv file for snmp devices specifying OID template to use, customer, folder, etc.
5 votes -
trendmicro and panda
want to have more antivirus products to observe. Trendmicro, Panda and so on.
5 votes -
featcher update
Full integrated acronis client onboarding
6 votes -
Option to remove Add-on Tabs
Ability to give the option to hide the Add-ons tab
12 votesNice! The feature you requested is being reviewed by our product team. We’ll keep an eye on the number of votes, and let you know if a decision is reached to implement. Thank you for being a partner in our process!
-
Password Folders/ Sections
It would be nice to have separate Folders for Password. So that it is easier to manage and sort through the passwords.
Under Passwords we can have customizable folders with the different Password types. i.e. Windows Logins, Email, and so on
9 votes -
A few more items in API
Would like in API that there was a coupling between invoices, contracts and customers.
would be nice to see which contracts / contractID an invoice/invoice line was based on ..
and to have a clientID in the billing information9 votesNice! The feature you requested is being reviewed by our product team. We’ll keep an eye on the number of votes, and let you know if a decision is reached to implement. Thank you for being a partner in our process!
-
It Automation Profile Apply in Bulk
Your IT Automation profile has no bulk changes. Can’t tick them all. Have to do it all manually
3 votes -
Dashboard
A dashboard that ACTUALLY WORKS and reflects ticket numbers, and have ticket status' update properly so that closed tickets that get replied to ACTUALLY REOPEN A TICKET.
3 votes -
Billing Batch Show Tickets
A billing batch may show XX tickets, but there's no way to see what XX tickets these are unless you bill it. If you jump over to the timesheet report there's no easy way to get the exact tickets and time totals. There should be be an easy way to check unbilled tickets before the batch is finalized.
13 votesNice! The feature you requested is being reviewed by our product team. We’ll keep an eye on the number of votes, and let you know if a decision is reached to implement. Thank you for being a partner in our process!
-
Revised Merge Function
When merging tickets, you should be able to highlight all tickets to merge, and then select which of the selected tickets to merge the others in.
Currently you have to be aware of a ticket title or number to merge into, and you need to ensure you DO NOT select the merge destination - this is counter-intuitive and makes it harder than it needs to be to merge.
10 votes -
Most Common ticket type filter
Advanced filter to show most common ticket subject line (Most common keywords, etc)
1 vote -
http/s Monitoring and if it fails not only inform, allow to connect to a PC and restart Service or reboot
Monitoring if a specific Page/Line is online like i.e. www.atera.com. if the page is not responding as expected, then allow to associate a monitored PC/Server to i.e. restart a Service or Reboot Device
1 vote
- Don't see your idea?