Forum Replies Created

Viewing 12 posts - 16 through 27 (of 27 total)
  • Author
    Posts
  • in reply to: Rollback on customized compliance benchmark #5851
    Bhuvan Srikanta
    Participant

      Yes, you can apply rollback on a customized compliance benchmark.

      in reply to: Asset Management Report #5847
      Bhuvan Srikanta
      Participant

        While we understand the importance of the “Location” field, our current system architecture doesn’t allow for the addition of custom fields in the asset management report.

        in reply to: Password Reset #5830
        Bhuvan Srikanta
        Participant

          These are a few simple steps to follow while resetting your password:

          Step 1: Try logging in to your account with an old password.
          Step 2: You will be redirected to a different page where you will get an option to reset the password.
          Step 3: You will be asked to enter your username/ email ID to send the password reset link.
          Step 4: Open your inbox and click on the password reset link.
          Step 5: Setup your new password and engage with our community:)

          in reply to: GDPR evaluation #5812
          Bhuvan Srikanta
          Participant

            We are in the process of GDPR evaluation. However, if you see this as an immediate requirement, I will recommend you choose On-prem deployment, in which case you can deploy within your premises on a physical or cloud instance.

            in reply to: VDI environment Best Practices #5810
            Bhuvan Srikanta
            Participant

              Persistent vs. Non-Persistent VDI Environments:

              Persistent VDI Environment: Each user has their own dedicated virtual desktop that retains changes and configurations.

              Non-Persistent VDI Environment: Users are provided with a standard desktop image that resets after each session.

              Integration of Agents in the Golden Image:

              Agents are included in the golden image, simplifying deployment and ensuring they’re pre-installed and ready for activation.

              Agent Activation Process:

              Agents within the golden image are initially inactive but automatically connect to the Anchor server upon VDI instance provision to activate.

              Agent Uninstallation:

              Agents can be uninstalled manually or via a silent parameter during VDI decommissioning, ensuring proper removal without manual intervention.

              If any queries persist, please feel free to reach out, and I’ll be happy to help.

              in reply to: Instructions on Preset for Golden Image #5807
              Bhuvan Srikanta
              Participant

                To have a Golden Image set up, one would have to have the SanerNow Agent installed on the image without it (agent) being activated. By default, the SanerNow Agent automatically gets activated after installation. However, when creating OS images with SanerNow Agent preinstalled, you don’t want the agent to be automatically activated. Please find the instructions on how not to have the agent activated automatically from the link below.
                Agent Installation Through Commandline Options (secpod.com)”

                in reply to: Removal of blacklisted applications #5805
                Bhuvan Srikanta
                Participant

                  That’s definitely possible under the Endpoint Management Module.

                  in reply to: Filter Hostname #5792
                  Bhuvan Srikanta
                  Participant

                    Reports can be filtered by Hostname on the product UI. We also have hostname and IP Address relationship accessible through APIs.

                    in reply to: Personally Identifialble Information #5790
                    Bhuvan Srikanta
                    Participant

                      We do not store PII. You can vet our security and privacy documentation here: https://security.secpod.com/

                      in reply to: Dependent scans configuraton #5788
                      Bhuvan Srikanta
                      Participant

                        Our agents do a complete OS and 3rd Party Application scan. If there’s anything else you expect, please elaborate your use case here and our team will respond.

                        in reply to: Asset Tagging #5786
                        Bhuvan Srikanta
                        Participant

                          At present, we do not have the provisions for Asset Tagging, but it is en route to be released. We do however have, grouping possible, wherein we can group devices based on certain conditions defined by the user.

                          in reply to: What is the Importance of Patch Management in IT Security? #5757
                          Bhuvan Srikanta
                          Participant

                            Patch management is the process of managing a network by scanning, testing, and deploying missing patches. Applying patches to lots of devices in a network becomes cumbersome. Furthermore, it can have dangerous consequences if not done correctly. Some applications might break or cause other applications not to work.

                            Patch management software ensures that patches for your apps are installed regularly and on time. Patch management tools help make this process when the number of devices increases. Great patch management tool automates the manual task by scheduling patches. These tools also help make the rollback of patches easier if an app breaks.

                            Why do we need patch management?

                            Now that we have understood “what patching” and “what patch management is,” let’s understand why we need it. Every day, we discover new vulnerabilities in OSs or 3rd party applications. The vendors must ensure fixes to these vulnerabilities, usually in the form of patches. The need for patches is further compounded by the fact that unpatched software is one of the leading causes of cyberattacks.

                            Patch management software plays an essential role in the vulnerability management process. Patches are critical as they help reduce the attack surface of your device and decrease the chance of a security breach. Patches also provide a slew of other benefits that can improve the app’s security, performance, and user experience.

                            Security:
                            Attackers exploit new weaknesses in the application as soon as they are discovered. Patches become necessary to fix vulnerabilities and installing patches as soon as they are released is vital.

                            Feasibility:
                            When the number of devices and applications installed increases, it becomes difficult and time-consuming to apply patches to each of them manually. Automated patch management helps install these patches in a streamlined manner and also improves the speed and efficiency of the vulnerability management process instead of doing it manually.

                            Performance:
                            Patches are also used to improve the application’s performance, and patch management software helps you keep your applications regularly updated. Patches are essential, whether it is quality of life or performance improvements.

                          Viewing 12 posts - 16 through 27 (of 27 total)