Just basic stuff off the top of my head
N-Able 1. Custom Service Templates 2. Custom Rules for Desktop / Servers for maintenance windows 3. Root level notifications for main issues such as CPU, Disk, Agent Status/Connectivity etc 4. Custom Views (ESXi Hosts as an example) 5. Flushing out disconnected desktops using last checked in date > 90 days 6. Upgrade Agent / Probes one customer at a time after initial upgrade. Use to be a lot of issues around cpu spikes etc. 7. Use downtime windows with maintenance plans/script tasks to avoid notifications 8. Create an after hours user whos time falls after hours, use a txt message service which accepts emails. Set this as the primary email address. You now have a SMS txt alert service (only done in nable). 9. Don't become a beta tester unless you are an experienced N-Able user.
AV Defender (Currently Bit Defender) 1. Don't do network scanning/USB scanning. Can cause huge lock ups 2. Set weekly scans, or daily quick scans using custom rules (same place you set maintenance windows) 3. Set up a report to email to you daily. You really need Report Manager to get good reporting here 4. Set up notification on behavior scan event and security event (this will be a virus)
Shadow Protect 1. Updates can be downloaded here http://www.storagecraft.com/en-ca/downloads/software-updates
I've found direct connect to use useless. I use RDP for servers and we manually login to workstations using Log Me In Rescue. I highly recommend it.
That's all for now I think... ;)
In reference to your specific chocolatey comment. We have integrated chocolatey using the "Push Third Party Software" option. You can create batch and vb files to do whatever you want, and run them elevated. If you upload them to the n-central repository they will always be available.
Example.bat (Enables the Unrestricted ExecutionPolicy two different ways, Downloads and installs Chocolatey, Downloads and installs firefox.)
reg add "HKLM\SOFTWARE\Microsoft\PowerShell\1\ShellIds\Microsoft.PowerShell" /v ExecutionPolicy /t REG_SZ /d Unrestricted /f 2>nul reg add "HKLM\SOFTWARE\Wow6432Node\Microsoft\PowerShell\1\ShellIDs\Microsoft.Powershell" /v ExecutionPolicy /t REG_SZ /d Unrestricted /f 2>nul @powershell -NoProfile -ExecutionPolicy Bypass -Command "iex ((new-object net.webclient).DownloadString('https://chocolatey.org/install.ps1'))" && SET PATH=%PATH%;%ALLUSERSPROFILE%\chocolatey\bin choco install firefox -y
I think your best bet for creating further "Plug-ins" is to write your own .exe to do a job and if needed dump the results to a log file that can be parsed by a n-central service that monitors the log file so you can alert/monitor the task.
The only way I can think of Automated this is the APi , however it doesn't support this
Next solution is you will want to find something to script tasks inside a browser session! e.g. https://imacros.net/overview/
Probably should have left the Security Response video off of this post... That was enthralling. Really, you could have just used a cardboard cutout and this to have produced a comparable video.
https://www.naturalreaders.com/online/?s=V2d60812f4-f15e-11eb-9336-027b5ccb207b.pdf&t=NaturalReader%20Document
You're welcome. I expect compensation for my business efficiency optimization. A monthly recurring Bitcoin deposit will suffice.