Q: How do I get started?
Click here for TRIAL and register. You will get a login, where you download an MSI file to install on your test computers. Then go to "My Account" to make configurations and/or "My Computers" to find your clients. If you later license the product, we will simply upgrade your account from trial to licensed.
Q: What happens to the local administrators group, when I install the client?
If the computer is in a domain, Domain Users will be removed from the local administrators group right away. That is all that happens initially. When a user then logs on, the user will be removed from the local administrators group, if the user is an explicit member (not through a domain group). The reason all users are not just removed right away is to only remove accounts that are actually interactive accounts.
Q: How can we keep some domain users as local administrators?
Domain groups other than Domain Users are not removed from the local administrators group. This means that if a domain user logs on and is member of domain group that is in local administrators group, the user is always administrator.
Q: Do I need to approve each and every time a user wants administrator access?
No. You can use a setting under "My Account" to allow elevation without approval. In this case, you still get the benefits of auditing who elevated when and you still have a log of installed software.
Q: I have legacy applications that prevent us from removing users from the local admins group. How to handle that?
You can distribute a policy key for each application that needs to run as administrator and thereby void the need for users to be permanent administrators. If this policy is set for the exe file, elevation happens automatically for this application only, regardless of other settings. Refer to Policies for more information.
Q: What if I need more complex group/OU rules?
You can overrule settings using Group Policy Objects, which would allow you to have different policies for different users or computers. Refer to Policies for more information.
Q: What if my company does not allow any data in the cloud?
You can disable the cloud service (this web site) entirely and control everything by Group Policy Objects. Using an "Offline Mode" policy disables inventory and configuration and then all configuration must be done using policies. Anything you can do under "My Account", you can do with policies. Refer to Policies for more information.
Q: Is an internet connection required?
Yes and no. If the client has internet, the client can check, if you have approved the administrator request. If the client does not have an internet connection, you need to give the PIN code to the user for offline elevation. A PIN code is good for the current day and will change daily. Once the client gets internet, auditing data will be uploaded. If autoapproval is set by policies, an internet is never required.
Q: Does it consume internet connection bandwidth?
Yes, but only marginal. Elevation request are very small. Inventory data will consume about 25 kilobytes of internet bandwidth per month. Or said another way - 1000 computers will upload only 25 megabytes of data per month. This low consumption is possible because data is sent only once a day and only when there are changes. If there was no software installed or removed from the previous day for example, no software data is uploaded. In addition, the data is compressed.
Q: Can a third party get my inventory data?
No. data is encrypted and compressed. It can only happen, if you give your logon credentials to someone else.
Q: Should I be concerned about performance impact on my machines?
No. When you do not use the application, it does not consume any resources at all.
Q: How can you possibly know where my computers are?
When data is sent to the server, it happens over HTTPS. The IP address of the sender's NAT router is part of the protocol and this information is cross-referenced to internet service provider (ISP) registration data. The expected accuracy is at a city level.
Q: Can it help me with stolen computers?
Yes. You get the public IP address of the thief's router. The client does not require anyone to log on to a computer to upload data, so when the thief turns on the computer, the inventory data is sent transparently. You can now see the public IP address and upload time in your client view and give to the police. The police can then get the name and address of the IP address owner from the thief's internet service provider (ISP).
Q: What happens when I delete a computer?
The collected data associated with the computer is deleted. If the computer then turns out to be alive after all, the computer will show up again next time it uploads inventory data.