Jump to content

Search the Community

Showing results for tags 'configuration'.

  • Search By Tags

    Type tags separated by commas.
  • Search By Author

Content Type


Forums

  • Pulseway
    • News & Announcements
    • Installation & Configuration
    • General
    • Automation
    • Applications
    • Current Features & Server Modules
    • API
    • Feature Requests
    • Bugs
  • Pulseway On-Premise Server
    • Installation & Configuration
  • Pulseway PSA
    • General

Calendars

There are no results to display.


Find results in...

Find results that contain...


Date Created

  • Start

    End


Last Updated

  • Start

    End


Filter by number of...

Joined

  • Start

    End


Group


AIM


MSN


Website URL


ICQ


Yahoo


Jabber


Skype


Location


Interests

  1. Does anyone have a working script to install Sentinel One silently on managed machines?
  2. Hi all, up until recently we've had a TV with a StickPC running Windows and the Dashboard. This had run for years without problem. Now, about once a week, the account used in the dashboard shows and error that the account needs to be re-authenticated. Is there a setting I've missed to keep this account logged in permantly?
  3. Hi all, I'm looking for more information on how to setup this feature. "1-Click" button in the Remote Control client. I assume this pulls embedded passwords from itglue, however this isnt working for me. "Pulseway Remote Control, No credentials found."
  4. A number of folks have requested the ability to manage bitlocker with Pulseway, so I thought I would share how I am doing this with Powershell scripts and Pulseway's custom fields feature. First, you will need to create a custom fields in Pulseway (Automation Tab --> Custom Fields). This fields should be a text variable that has the system context. I personally have 3, BitlockerKey, Protection Status (On/Off), and BitLockerVolumeStatus. BitlockerKey is probably the one most people will care about. . After Configuring the Custom fields, you will then need to create your PowerShell script. Notice you have inputs and outputs. You will want to click New for output. Name it what you wish, ensure it is a text variable type, and then turn on "set Custom Field Value" Now we toggle the flag for it being a windows powershell script. You should see in the top that it has created a comment #outputs with your defined output variable assigned the default value you gave it. Now we have our script: Update as of 4/18/2021, script now tracks 3 custom fields and will account for if a drive is encrypted but protection is off and no protectors have been added yet. # Outputs $ProtectionStatus = "na" $recoveryKey = "na" $VolumeStatus = "na" #region functions function Start-BitlockerEnable { Enable-BitLocker -MountPoint c: -EncryptionMethod XtsAes128 -UsedSpaceOnly -TpmProtector $today = Get-Date $scheduledtime = $today.Date.AddHours(23) [int]$SecondsToMidnight = ($scheduledtime - $today).TotalSeconds shutdown /r /t $SecondsToMidnight msg.exe * "Bitlocker Encryption has been enabled. A reboot is needed before the encryption will apply and has been scheduled for $scheduledtime local time. You can reboot before this if you prefer." #start-sleep 90 #msg.exe * "This Computer will reboot in 30 seconds to bitlocker Encryption" #start-sleep 30 #Restart-computer -force } #endregion functions #region execution $BitLockerStatus = Get-BitLockerVolume -MountPoint c: if ((Get-Tpm).tpmpresent -eq $true) { #If Volume is in the process of encrypting or decrypting the Volume status will not say fully. Don't make changes when it changes if (($BitLockerStatus.ProtectionStatus -match 'off') -and ($bitlockerstatus.VolumeStatus -notmatch 'progress')) { #NoBitlocker is enabled so run it. if ($BitLockerStatus.VolumeStatus -eq 'FullyDecrypted') { $recoverykey = $BitLockerStatus.KeyProtector | Select-Object -ExpandProperty recoverypassword if(!($recoveryKey)){ Add-BitLockerKeyProtector -MountPoint c: -RecoveryPasswordProtector } $newStatus = Get-BitLockerVolume -MountPoint c: $recoverykey = $newStatus.KeyProtector | Select-Object -ExpandProperty recoverypassword Start-Process -FilePath "$env:PWY_HOME\CLI.exe" -ArgumentList ("setVariable recoverykey ""$recoverykey""") -Wait if ($newStatus.KeyProtector -match 'Recovery') { Start-BitlockerEnable } } #Bitlocker must be Partially enabled where drive is fully encrypted, but protection is off and no protectors exist. #Typically this is using xtsAES128 so you may wish to disable-bitlocker, then re-enable it with your protectors and prefered encryption level. else{ Disable-BitLocker -MountPoint 'c:' $decryptInProgress = $true While($decryptInProgress -eq $true){ $decryptstatus = Get-BitLockerVolume -MountPoint 'c:' if($decryptstatus.VolumeStatus -match 'progress'){ Start-Sleep 2 } else{ $decryptInProgress = $false } } Add-BitLockerKeyProtector -MountPoint c: -RecoveryPasswordProtector $newStatus = Get-BitLockerVolume -MountPoint c: $recoverykey = $newStatus.KeyProtector | Select-Object -ExpandProperty recoverypassword Start-Process -FilePath "$env:PWY_HOME\CLI.exe" -ArgumentList ("setVariable recoverykey ""$recoverykey""") -Wait if ($newStatus.KeyProtector -match 'Recovery') { Start-BitlockerEnable } } } #BitLocker should already be enabled so log keys, volume status etc. else { $recoverykey = $BitLockerStatus.KeyProtector | Select-Object -ExpandProperty recoverypassword $ProtectionStatus = $BitLockerStatus.ProtectionStatus $VolumeStatus = $BitLockerStatus.VolumeStatus Start-Process -FilePath "$env:PWY_HOME\CLI.exe" -ArgumentList ("setVariable recoverykey ""$recoverykey""") -Wait Start-Process -FilePath "$env:PWY_HOME\CLI.exe" -ArgumentList ("setVariable ProtectionStatus ""$ProtectionStatus""") -Wait Start-Process -FilePath "$env:PWY_HOME\CLI.exe" -ArgumentList ("setVariable VolumeStatus ""$VolumeStatus""") -Wait } } else { $recoverykey = 'NoTpm' Start-Process -FilePath "$env:PWY_HOME\CLI.exe" -ArgumentList ("setVariable recoveryKey ""$recoveryKey""") -Wait } #endregion execution You can modify the above script as you wish. I personally have gone with a bit of a cautious approach where it will not skip the hardware check which will reboot the pc, but for me I prefer this approach to having it encrypt the drive without checking tpm is all good which could then result in the drive being encrypted and locking out the end user. At the end of all this, you now should be able to Both Enable bitlocker encryption as well as pull your recovery keys from pulseway like so :
  5. Hey Guys, So we need to automate patching and reporting for Mac OS. From the best of my knowledge I can't find this feature anywhere within pulseway (crazy I know), and I can't find any scripts within the forum. Can anyone help me out on this one? I'll update if I find anything myself. -Sam
  6. Hi, Sorry, I have a trivial problem but I don't understand. What do I need to enter in the username field to be able to log in? If I try to enter the email I use for login, the field is only 25 characters long while my email has 28 characters
  7. Can someone help explain how AD discovery is supposed to work? I have tried just having it enabled. I have tried specifying the domain. Tried specifying OU's. The only time I see domain services is when the pinging in the same subnet. I just need to get devices installed.
  8. Hi, I'm trying to register my system after installing pulseway on windows 10. However, due to some unknown reasons, the password field is disabled. This is very strange as I never experienced this in the past. Any help would be appreciated. Regards
  9. After a fresh install on Windows 10, the Pulseway Agent installs, but does not allow me to sign in. When opening the application, I am greeted with this screen When I click on "Register System" I am greeted with this screen After entering my Username and checking the box "I do not have an instance name", I get this error message I have re-installed multiple times, tried to manually start the service in services.msc, which gives me this error I have also made sure my PC is up to date, currently running Windows 10 Home build 19045.2546. Any ideas why I might be seeing this error message/ why the Password field is greyed out? Thanks Jack
  10. Deploy BitDefender antivirus to your endpoints with just the level of protection you need, all with one click. Additional In app support for Bitdefender Endpoint Detection and Full Disk Encryption further strengthens your security.
  11. Hi, I wanted to use Pulseway instead of a cloud server for monitoring, trying to upgrade from a free account to a team account but I get the following error when trying to upgrade through the pulseway web UI - I have also attached a screenshot. What do I need to do? I just want to add a few more devices. Thanks, CalvinNT "www.pulseway.com refused to connect."
  12. Bring IT Documentation in your daily workflow through the IT Glue integration. Within the system details screen you can now access asset information, related documents, and related passwords for the matching IT Glue configuration.
  13. We are busy setting up the integration between Pulseway and Autotask. When signed into the server, opening Pulseway Manager 8.50, and going to Settings>Autotask we can enable the Autotask integration and enter the credentials for the account. After that the Account and Queue dropdowns become available with the company and the queue that the tickets needs to go to and this works as expected. With the amount of servers that we manage we want to roll this setting out using endpoint policies. We go to the webapp, create a policy, go to other settings, select Autotask. After we entered the same credentials as we did in Pulseway Manager the dropdown menu's don't fill with the companies or queues which makes us unable to configure and test the setting. What could be the cause of this not working as expected?
  14. Remote Login for Windows Remotely login into monitored systems through the Pulseway ecosystem without disclosing credentials to people in front of the computer. This feature can be enabled from endpoint policies or locally on each system. Allow End-Users to Disable Remote Control Within an endpoint policy, once you enable the system tray icon for end-users, you can now also enable the option to locally disable remote control on each system from within the system tray context menu. Remote Control Performance Metrics We have added a mechanism in Remote Control to capture and measure various performance statistics to help you understand the performance of a session, and to help us continue to improve performance of the product. Much of the work is done behind the scenes, but you'll find a new menu setting in Remote Control called “Show Session Health” which, if enabled, displays a visual indication of session RTT (Round Trip Time). In addition, we have also added a menu setting called “Send Report” which allows you to provide us quickly and easily with feedback of your session, which will automatically include the performance statistics. UI Update As part of our ongoing effort to modernize and standardize the UI, the Patch Management History page has been redesigned. General Improvements Custom Fields CSV Report Template now renders custom field values as columns rather than having each value on a separate row Fixed an issue with the mobile app not rendering certain modal dialogs on iPads running iOS 12 Fixed an issue where the exported CSV document would contain data in an incorrect format
  15. Hi, I work for a small IT business that is attempting to set up Network Glue (Basically a network information collector) which uses SNMP to collect information. I'm looking for a script that can install the SNMP service, and then adjust the settings to change startup to automatic, set the service to allow sending all possible information, (example shown in screenshot), set the community name to public, allow that community READ ONLY rights, and only accept SNMP packets from the Hostname "Twiz-PC". I've seen some stuff online but we are not fluent enough in Powershell to risk editing registry stuff ourselves, and having this automation will greatly help us in deploying to our clients. I was wondering if anyone on here already has a similar script that we could adjust for our needs. Thanks in advance!
  16. You can now discover computers from Active Directory through the Discovery & Deployment probes if they are a domain member. Additionally, you can now deploy the Pulseway Windows Agent through Group Policy Objects for all domain-joined computers or for just a selection of Organizational Units. This will automatically enrol newly added computers in Active Directory to Pulseway and place them in the correct Agent Group which in turn will apply the endpoint monitoring policies, optionally install an antivirus product, and start managing operating system and 3rd party patches too.
  17. We have redesigned the Group Policies page to make it easier for you to exploit the full power of Pulseway policies. With a clean simplified navigation design and the addition of an integrated search functionality, you can find any group policy setting with just a few clicks.
  18. With the latest update to Endpoint Policies, you can configure Windows Processes directly in the Web Application using the NEW Processes category.
  19. The latest update for the All Systems page is packed with new features focused on productivity and user experience. Multi-tab support for Systems With the new support for tabs you can easily switch back and forth different views and effortlessly multitask between systems. Create shortcuts for your Favorite actions You can now pin your most used modules and create shortcuts to further enhance your productivity. Updated Search Experience & General User Interface Continuing our efforts to deliver a simple and intuitive user interface, we have redesigned our search experience and modernized the overall look and feel of the All Systems page.
  20. Further user interface improvements to four additional pages: Patch Management Policies Page Antivirus Policies Page Antivirus History Page Account Overview Page
  21. Windows Service Monitoring can now be configured directly in the Web Application, within Endpoint Policies, accessible using the NEW Monitored Service category. In addition, a new Monitored Services section has been added to the Services feature page when working with an online System, providing a distinction of general Service information and those Services being actively monitored.
  22. We continue to add new titles to the 3rd Party Patch Management application catalog, with 28 added since the last update: General Improvements Monitoring and Management of Microsoft SQL Server 2014 and higher is now supported Alligned the user session status messages to match the ones used by the Windows operating system
  23. Bitdefender integration has been enhanced to support automatic deployment and uninstallation using Antivirus Policies. Deployment configurations for Bitdefender can be created and managed from Server Admin / Configuration when defining an Antivirus Policy for an Organization, Site, or Group. Applying this type of Antivirus Policy will deploy Bitdefender on supported Systems within the given Org structure where the policy is applied, join the Systems to the selected Bitdefender company, and install the selected Bitdefender modules. Installation is automated for both existing Systems and newly provisioned Systems. NOTE: Changes to a previously configured Policy will be applied to newly provisioned Systems only Removal of the Bitdefender Antivirus Policy will result in immediate uninstallation of Bitdefender from existing Systems.
  24. We'd like to use workflows when a specific eventlog item is triggered. Now everything will send by email if you use workflows. + It is possible to send an email when a new system is registerd. It would be nice if you can also have a item in the workflow which states the total of the specified group. Thanks
  25. Search, filter and quickly find network devices with the new Device List.
×
×
  • Create New...