Would it be possible to have a progress bar or a file counter to show the progress of the scan?
PINNED
AWS Connector
Hello, we have a customer that is utilizing resources in AWS. Would it be possible to create a cloud connector for AWS resources so we can scan for data in S3 buckets and see access permissions assigned by their IAM tool.
Add Support for macOS Software Inventory - Approve by Publishers
Software Inventory does not have the ability to approve software/publishes for macOS. Recommend using software signatures/bundle identifiers "com.apple.x.y" but truncate and reverse so they can be seached as "apple.com" and added based on approved...
Daily Updates for Dashboard Vulnerability and Benchmark History
The Vulnerability History and Benchmark History graphs on the dashboard page should update at least as frequently as scans are conducted, but at a minimum should allow for daily, weekly, monthly, and yearly granularity.
Cisco Meraki wireless API ingest new network asset discovery
Meraki access points have this phenomenal feature called host isolation that lets you completely isolate endpoints connected to Meraki APs from one another. Endpoints cannot ping the gateway or any other devices on the same SSID. You can make exce...
Add computer exceptions to Mandatory Software (Approvals)
Sometimes there are known cases where software would otherwise be mandatory, but there are extenuating circumstances. For example, we have a Mac running a Windows VM in Parallels, and that Windows instance running on ARM architecture isn't compati...
Approve a piece of software for multiple hosts (but not all) from the Search Software view
Proposed workflow: 1. Checkbox 2+ Hosts for the same piece of Software2. Push Approve Selected3. Be presented with the existing software approval dialog box to confirm adding that software as approved (and possibly required), with the Allowed host...
Read-only keys are desired at both at the organization level, and at the partner level. It feels odd to use a read-write key to fetch the installer, and we are likely to develop reports at the partner level that will only read data, not write it.
We have been asked from several auditors on what control/mechanisms as used to inventory and track software in use that is end of life or end of support. Would be great if the system could check the version from software invetory and add in a date...
Add functionally to retire asset or decommission Create tenant value for retire asset after offline for XX days Create retire status workflow for removing agent data from reporting and scheduled jobs when endpoint hits threshold above. Data will b...
We have customers that are looking to locate password within documents and files. Would it be possible, similar to finding SSN to tag found passwords within documents.