- Collect inventory (hardware and software)
- Collect startup items and services
- Collect machine info like (name, uptime, reboot required status, all assigned IPs, OS version/type, last seen, last login by, domain name if any, PC model, memory, CPU, HD, …)
- Collect launched executables compilation name/path per user
- Collect OS and 3rd party updates
- Collect software license count
- Monitor network devices using SNMP traps receiver
- Monitor network devices by pulling traffic statistics (Cisco , F5, Palo Alto, ForcePoint).
- Build network topology including devices to network devices connectivity tracking
- Monitor network traffic (total traffic and average of latency per process)
- Monitor print jobs by user, file name, number of pages, page size, and color
- Monitor machine performance (CPU, memory, and disk utilization per process)
- Collect Errors on Managed PCs and inspect cause of error
- Built-in general reports and real-time dashboards
- Correlating machine performance insights with network traffic insights
- PC categorization using tags
- PC finder to find any PC with specific configuration (Hardware/software)
- Tracking file operations
- User behavior analytics
- Interactive To-do list for administrators based on collected insights
- Backup PCs to cloud storage
- Create/Delete/Update registry keys
- Run executables, commands, and scripts (PowerShell/VBS/Batch) remotely on managed PCs
- Terminate process/executable on managed PCs
- Download a file to managed PCs
- Start OS update cycle on managed PCs
- Stop/Start/Restart services on managed PCs
- Reboot/Shutdown managed PCs
- Activate windows remotely
- Activate office remotely
- Bandwidth reshaping per process
- Digital asset management (Vendors, Contracts, POs) including support contracts renewals and asset transition tracking
- Terminate Idle applications after certain period of time based on policies
- Built-in remote tools
- Control printing using policies like user quota, printers while/black lists, color printing prevention
- Role based access for administrators
- Software compliance by comparing managed endpoints by a reference image or configuration
- Privilege access management on managed endpoints
- Application white/black listing
- Application behavior analytics and sandboxing integration
- Block IP Address
- Block TCP Port
- Block UDP Port
- Block Domain Name
- Collected failed security events in real-time
- MDM supports BYOD, COPE and system services through OEM installations
- MDM supports ringing, messaging devices, locking devices, mute devices remotely
- MDM supports location tracking with geo fencing capabilities
- MDM supports remote and enterprise wipe
- MDM supports enterprise store for work profiles
- MDM supports application Black/White listing
Estimated reading time: 1 min
Views: 34