Jump to content
Pulseway 9.14 🔥

bfg9000

Members
  • Joined

  • Last visited

Reputation Activity

  1. Like
    bfg9000 reacted to Mark G38 in Manage Windows Processes via Endpoint Policies   
    Cool.  Another step in the right direction.  It would be awesome if we could have options for self-remediation on these.  Hey if this process is stopped, attempt to start it, alert if start fails or alert all the time, etc.
  2. Like
    @BurseyC Not sure your exact situation, but this seems like you should be able to work around their concerns. I have some clients the same way.  I have my patching setup for workstations, to patch but not reboot.  I then have a reboot task set up for these clients that reboots their workstations at a specified time that they agreed would not interrupt anyone.  Usually something like 1 AM for most. I have one that wants it a little earlier due to an overnight crew.  Just set the reboot tasks on schedule and never think about it again.  
    I don't know how big you are, but IMO having to manually check patching at any scale other than maybe a couple, is really a pain and not ideal.  
    I've personally also set up a custom event log alert in which I have a PowerShell script I wrote check for updates on the machine, but also check when the last update was (filtering out Defender definition updates since they happen multiple times a day and it's not in use anyway) and it it finds the last update date was 7+ days ago, it will write an error to the event log, which I then have set up in Pulseway to trigger an alert notification.  I also have it populating a custom field with the last update date for my reference. It took some work, but it does work.  I'm sure it's not 100% as there are probably some edge cases, but between that and the patch schedules and scheduled reboots, it's been pretty great so far.Â