KACE Systems Management Appliance (SMA)
Please tell us how you’d like to see the KACE Systems Management Appliance product improved!
10 results found
-
Implement vPro KVM and Management in K1000
Is it possible for Kace to implement in the K1000 a internal tool to use vPro KVM and the vPro machine in general like the other competitor do?(Symantec, Landesk...)
28 votesThis will not be in scope for the next release as other priorities push it down the list. We are investigating this as a potential roadmap item for a subsequent release. We encourage others to vote as your input greatly affects our prioritization during release planning.
-
Use SSH keys for authentication to *nix devices
This idea was suggested several years ago (https://kace.uservoice.com/forums/82699-sma-k1000/suggestions/11384394-ssh-rsa-keys-are-needed-to-let-the-kace-connect-to) and didn't get many votes, so I'm hoping to resurrect support for it here.
Like the OP, I manage many Unix-based servers in my KACE SMA, and I would prefer to disallow username/password authentication whenever possible, especially for appliance service accounts. I was excited to see that "Secret Key" is one of the Credential types, then confused when I couldn't select the one I saved when adding a new Agentless-via-SSH device, then completely disheartened when I read that the "Secret Key" type is only used for working with the KACE…
15 votes -
Device Discovery - Add a "Filtered" option for socket tests
We use the K1000 Device Discovery to monitor that status of our endpoint firewalls. One of the things we block is the SMB port on our endpoints. We cannot use it now because "Filtered" ports in NMAP/PortQry show up in the K1000 as "Open", reporting a false positive.
I'd like to see Filtered be it's own option to distinguish this for reporting/labeling to better handle socket scans.
6 votes -
Ability to use agent discovery for Active directory and then ping devices for activity
Ability to scan using Active Directory and then allow devices to be pinged to determine if they are still on the network. Or allow ping test on the host names to gather the IPs
5 votes -
Ability to discover devices using SNMPv3 when a Context Name is required.
Currently we are unable to discover any of out HP or Ricoh printers using SNMPv3 because they require a Context Name which is not settable in the K1000.
4 votes -
Show Active Directory Location when doing AD Agent Discovery
When performing an agentless AD scan, I would like there to be a column that shows where in AD the record is located
Example: BENT5Q1.domain.com,
AD Location: OU=Sales Engineering Computer, OU=sales,DC=Goose-nest,DC=com3 votes -
Create a Chrome Extension/App to allow Kace Announcements to display on Chromebooks.
Kace SMA Announcements do not/can not display on Chromebooks. An Extension that we can deploy to Chromebooks might be able to allow this. At the very least, the extension would provide the SMA more detail into the device.
3 votes -
cisco dna
Integration to bring in network objects from Cisco DNA or Solarwinds so we dont have to rely on networking with SNMP credentials.
3 votes -
Dell Switch Stack Inventory - Only warranty for one switch pulled
We have switches that are stacked as one logical switch, but these stacks can have 2-8 switches. It will only pull warranty info from one of the switches (one service tag).
Goal would be to see all the service tags and warranty info in a stack so we can report on warranties ending. Some stacks are purchased at the same time, but adding or replacing switches would cause the warranties not to line up.
Thanks!
1 vote -
Add a Discovery Schedule column in Discovery Results
When viewing discovery results, I would like the ability to add a column that shows what discovery schedule it was a part of. I know i can view the results by schedule name, but when you have 100's of schedules, sometimes you need to view them all and this would save time.
1 vote
- Don't see your idea?