Settings and activity
52 results found
-
770 votes
Caleb Miller supported this idea ·
-
644 votes
Caleb Miller supported this idea ·
-
25 votes
An error occurred while saving the comment Caleb Miller supported this idea ·
-
139 votes
Caleb Miller supported this idea ·
-
139 votes
Caleb Miller supported this idea ·
-
297 votes
Caleb Miller supported this idea ·
-
377 votes
Caleb Miller supported this idea ·
-
401 votes
Caleb Miller supported this idea ·
-
516 votes
Caleb Miller supported this idea ·
-
978 votes
Caleb Miller supported this idea ·
-
53 votes
Caleb Miller supported this idea ·
-
7 votes
Caleb Miller supported this idea ·
-
54 votes
Caleb Miller supported this idea ·
-
80 votes
Caleb Miller supported this idea ·
-
11 votes
Caleb Miller supported this idea ·
-
63 votes
Caleb Miller supported this idea ·
-
38 votes
Caleb Miller supported this idea ·
-
385 votes
Caleb Miller supported this idea ·
-
1,569 votes
An error occurred while saving the comment Caleb Miller commented
You should create a section on the left hand side for Office365 in Atera similar to network discovery. Create a reporting/alerting dashboard using PowerShell scripts. On the site below they have a free demo portal which will show you hundreds of examples of all the things you can accomplish with powershell and the native office365 audit logs. https://admindroid.com/ This company provides an affordable software which you run on your own hardware and grant read access to a service in your tenants, but I don't know or trust the company.
Caleb Miller supported this idea ·
-
1,480 votes
Caleb Miller supported this idea ·
Atera should offer better vulnerability scanning and third-party software patching as part of the "patching status" of the devices. We could replace/integrate with other software vendors, such as Action1 and Nessus, to offer a complete solution for vulnerability management, device security, and third-party software patching. Endpoint security companies are noticing the value of vulnerability scanning and patching as part of overall endpoint protection. This might displace our services if customers bundle these needs with endpoint protection vendors.