How do I watch a computer for nefarious activity?
I would like to watch user activity on one of the computers under management of DesktopCentral. I'm looking for things like: - files opened - capture internet cache - images opened (not necessarily in a browser) Is that possible with DesktopCentral? Cheers, Steve.
Lock Workstation after X minutes of inactivity
Looking to figure out how to lock a workstation after X minutes of Inactivity, and remaining locked until the user unlocks the screen with appropriate identification and authentication... been looking at the Display (user) configuration, which is where I think I need to be. If the user doesnt have a screen saver enabled, what happens when you choose Retain Existing Screensaver, with the wait time, then on resume show logon screen, or is there another way to do this?
Can we remove users from Local Admin?
Hi Is it possible to remove domain users from Local Admin group on Computers (with DC)? Dmitry
Estimate on when OpenSSL will be updated in Desktop Central to fix moderate vulnerabilities fixed in the 1.0.1m 2015-03-19 release?
Any estimated time-frame for an update to ManageEngine Desktop Central to fix several recent OpenSSL 1.0.1 branch moderate severity vulnerabilities fixed with their 1.0.1m release on 2015-03-19? https://www.openssl.org/news/vulnerabilities.html Current OpenSSL version in ManageEngine Desktop Central is 1.0.1j.
The connection with the server has been terminated or an incompatible SSL protocol was encountered
Hi, Please could you help for the following error? "The connection with the server has been terminated or an incompatible SSL protocol was encountered "
how do i find out my administrator password
how do i find out my administrator password
Need to seset Admin account
Hello all, I have followed the procedure to reset the admin password and am not able to login. Is there anyway to reset the admin login? I think it was changed.
DTC activity logging
I am trying to find logs of DTC admin/user activity. Specifically who would have removed a box from DTC. i find all sorts of reports for installed hosts but cant seem to find activity logs for changes made in DTC. Where is this information located?
Restrict users from stopping Desktop Central agent service
Hi In the latest release a new feature was release Ability to restrict users from stopping Desktop Central agent service has been introduced. How can i enforce this as we recently had a user stop the service to get around IT monitoring systems Thanks Adam
What is the recommended procedure to update outdated/vulnerable Desktop Central components?
1) X:\ManageEngine\DesktopCentral_Server\apache\bin\openssl.exe, libeay32.dll, ssleay32.dll using vulnerable version 1.0.1i instead of patched 1.0.1j. What is Desktop Central's procedure to update OpenSSL when vulnerable versions are discovered and updates to OpenSSL are released? 2) X:\ManageEngine\DesktopCentral_Server\pgsql is using an older potentially vulnerable version of PostgreSQL (9.2.4.13091) [http://secunia.com/advisories/57974 ] and a very old and very vulnerable version of OpenSSL (1.0.1c)
ManageEngine DesktopCentral's Initiatives on security front from the recent learnings
Dear all, We at ManageEngine DesktopCentral, put our best efforts to ensure the product is secure and protected from real-world threats that in-turn gives excellent customer satisfaction. With the recent happenings in the security front, we fell short in this commitment. My sincere apologies on behalf of the team for the frustration this has caused. The technical challenges that we faced this time and the approach has caused this situation. From the learning, we have taken our exertion to fix
Desktop Central Security Update release
Hi Folks, Greetings and New Year Wishes from ManageEngine. This security update resolves a vulnerability in Desktop Central which allows creation of users by remote code execution. An attacker who exploits this vulnerability could gain access to the Desktop Central web console for performing remote desktop management activities. For more details on this vulnerability, refer to here This vulnerability has been fixed in Desktop Central #build 90109. The current EXE available in the website includes