-
Posts
58 -
Joined
-
Last visited
Content Type
Profiles
Forums
Events
Posts posted by David
-
-
-
-
I would assume it's because 3rd-party patching is a vendor-specific process and therefore takes significant time to implement properly.
-
Well done to you dev team on the 6.1 Linux Agent. Pulseway-registration tool works very well. Could you update the web-app to reflect this: (Onboarding --> Setup Guide --> Agent Setup --> Debian).
Regards,
-
On 4/11/2019 at 8:06 PM, Paul said:
Can you please send me a pm with the scan_results and logs folders
Email sent.
Regards,
-
17 hours ago, Paul said:
c:\program files\pulseway\path
Assume you mean the "\Patch" directory... I'll get onto this tonight.
-
Also, why are these "error" tags present when no errors appear in the patch logs?
-
@Paul My patch policy for the 3rd-party patching trial is ""keep up to date if already installed" for all apps but I'm getting these logs.
-
-
I'd be happy to pay for reliable 3rd-party patching but I hope there are plans to expand the application list...
-
I have this feature set to trigger a notification upon > 90% CPU load for 2 minutes... however, the list of running processes that are returned with this notification are always very low CPU usage (< 5%).
This suggests that either the Pulseway agent is not monitoring ALL running processes or it is not measuring CPU load correctly...?
-
There seems to be a delay in the Web-App AntiVirus section (Kaspersky Lab agent integration). Yesterday I received a notification that multiple threats had been detected on a client machine. Today, these threats do not appear in the "Events" tab or the "History" tab.
My understanding is that "Events" are threats that have not been dealt with yet, whereas "History" is threats that have either been quarantined or deleted... Therefore, based on the applied Group Policy, these threats should be quarantined and should appear in the "History" tab...?
This is not the first time I've noticed this delay. What am I missing?
-
Any time you include pre-paid labour in a contract, it becomes harder to manage. You then need to be using a strict policy of recording all support hours worked and reconciling that monthly, which in my view, is more hassle than it's worth.
-
No, I'm simply saying that if your admin infrastructure already runs a non-Pulseway MFA solution (eg Duo, Google), then managing Pulseway from within that infrastructure should only require 2-Step Authentication.
-
For this scenario, I just build multiple scripts and run in sequence.
-
So long as the front-end admin platforms are protected by MFA, I would argue that 2-Step Authentication (email passphrase) for Pulseway is sufficient.
-
On 2/22/2019 at 5:14 AM, Chris said:
Hi @David,
Currently Pulseway can notify you as soon as the certain notification is written into the Windows event log. For more details about this please check out the following article. Also we have the Plugin which can check for some startup events from the systems log.
Thanks, Chris. I was more interested in a search functionality within the web-app Event Log, to make regular triage work more powerful.
-
Did this ever get implemented?
-
I've found www.draw.io to be useful for static diagrams...
-
Fixed!.
Thanks.
-
-
-
Hi,
Policies --> Policy Editor --> Notifications --> Event Log
To then edit a specific filter, the button does nothing at all...
Regards,
-
Hi,
after de-activating the user account for a temporary contract technician, he was still receiving notifications on his iPhone. It was only after disabling PUSH notifications for his account, that they stopped...
I assume all notifications should stop once a user account is de-activated?
Regards,
How to change Runtime Powershell credentials/password
in General
Posted
Hi @Chris,
How would you set the "PowerShellUserImpersonationPassword" and "PowerShellUserImpersonationPasswordCtrl" across multiple hosts? You would need to use the same admin password across all hosts?
I'm guessing these are a hash result and hash function input?
Thanks,