The most recent content from our members.
Objective: To enhance the recertification interface of SolarWinds Access Rights Manager (ARM) by including more detailed Active Directory (AD) group information. Current Limitation: In the recertification process, users are limited to viewing only the AD group names and their corresponding OUs, with the Alias addition…
Currently it is possible to give permissions on the whole mailbox, but not in the subfolders of the mailbox, e.g. "sent objects", "tasks" or "trash". Since we have to check and also adjust the permissions of the mailboxes and subfolders during user creation or also during operation, this feature is very helpful. It would…
Enable full ARM Client Functionalities on ARM Web.
Hi, in ARM you can only configure 5 different user management roles (Who can do what in ARM) with different rights actually. In some cases you need more roles with different rights combinations. Is it possible in ARM to create additional ARM management roles somehow in future? Maybe via a database import or similar? Or is…
Import and Export a list of AD users or file shares via CSV file. This would be especially useful for initial setup and configuration. Being able to export a list of files shares and users from an existing system, sort it to match a format that ARM would accept and then import into the new ARM system would save allot of…
Features in the counsel need to be available in the web UI. Currently many required task are available only by directly accessing the program on the host server. This would be much improved if all functionality was available via the web UI. Access could be limited in the manor that it is in SolarWinds Orion, via user…
Currently Access Rights Management does not offer the ability to create custom reports. Specifically in the areas of AD and File Server reconciliation. This is greatly needed to supply the information collected by ARM to auditors. These reports need to be able to be exported in PDF and Excel formats.
In government, mobile devices are both embraced and resisted. The mobility and ease of use afforded by smartphones and tablets helps boost worker productivity even as they open doors for hackers. According to research by Wandera, in 2018 there were 455,121 mobile phishing attacks, 1.9 million Wi-Fi incidents, and 32,846…
Today’s government IT professionals set rules to provide users with access rights, improving workflows while protecting agencies against threats. Unfortunately, the prevalence of mobile devices and cloud-based applications has made it increasingly difficult to establish those controls. This has led to security and…
It looks like you're new here. Sign in or register to get started.