amidaware / tacticalrmm

A remote monitoring & management tool, built with Django, Vue and Go.
https://docs.tacticalrmm.com
Other
3.13k stars 437 forks source link

Change devices Meshcentral Settings from within TRMM #1254

Open fsteltenkamp opened 2 years ago

fsteltenkamp commented 2 years ago

Is your feature request related to a problem? Please describe. I dont want to change to meshcentral to change settings of a device. For example change if the user has to confirm the incoming connection

Describe the solution you'd like Add the ability to change these settings from within TRMM, if possible also add permissions to do so. Maybe have it as a policy so i can decide to require all workstations to confirm incoming connections, but not servers.

Describe alternatives you've considered Currently i am changing these Permissions directly in Meshcentral. That works but is tedious because it is not really organized by customer or anything really and i have to search for a long time if the device is named something like pc001 which happens quite often...

Additional context I am mostly thinking about the settings for user confirmation and notifications, but maybe more could be added.

dinger1986 commented 2 years ago

You can set this for all the machines in a group, not the individual machine, or if there is an issue with servers or whatever you can move them to a different group.

I would suggest that as mesh is one of a number of remote access options for tactical that unless this can be achieved simply by the API it would be alot of work to implement this.

fsteltenkamp commented 2 years ago

I Know i can set this for a group.
Can i separate devices into groups without tactical caring? That would at least somewhat alleviate my problem.

But since i still think these settings should be configurable im going to look if it is possible to change them over api or cli. If not, im going to open an issue on meshcentrals github, maybe they can implement these changes easily so tactical can interface with them.

dinger1986 commented 2 years ago

Yes you can separate the groups, tactical doesn't care.

I'd imagine one of the devs should be about soon and can answer if it's a dev issue or whatever.

silversword411 commented 2 years ago

Tactical only cares about the unique agent ID...and tracks that, nothing else.

I think the eventual plan is eliminating meshcentral in the future which would make this moot. Not sure if this should be kept around till that eventuality, or just close now.

JSuenram commented 2 years ago

Tactical only cares about the unique agent ID...and tracks that, nothing else.

I think the eventual plan is eliminating meshcentral in the future which would make this moot. Not sure if this should be kept around till that eventuality, or just close now.

I am against eliminating mesh central for remote control... it is one of the finest remote-support and vpro/amt-solutions in the world and is really going forward with every release.....

It would in my opinion much better to far more integrate with MeshCentral and sync settings/groups/logon and much more between TRMM and MC. Especially when both run on dedicated instances....

herzkerl commented 1 year ago

I’d prefer there were at least two groups created in MeshCentral—one for servers and one for workstations. I’d rather have the users accept incoming connections, but need unattended access to the servers.

I know, I could manually create another group and split servers and workstations (https://github.com/amidaware/tacticalrmm/issues/629 for reference), but since there’s also a discussion re: syncing MC and TRMM (https://github.com/amidaware/tacticalrmm/issues/182) I thought I might add that here.

styx-tdo commented 1 year ago

I'd go further - one group per client, then split between server and wkst Reason: a) Permissions - should be granted per client in MeshCentral. b) I am having no issues connecting to any server, but connecting to a client where someone is working may be a severe intrusion of privacy. Changing workstations to "ask" and servers to "connect" would fix this problem

lambertpierre85 commented 1 year ago

I also need this solution but until the point where I can't specify which clients are on free remote support and those not with a reportable log sheet of hours spend on remote support to which machines from which support agent I can't fully migrate from teamviewer over to TRMM (and pay support subscription)

On Mon, 27 Feb 2023, 11:49 styx-tdo @.***> wrote:

I'd go further - one group per client, then split between server and wkst Reason: I am having no issues connecting to any server, but connecting to a client where someone is working may be a severe intrusion of privacy. Changing workstations to "ask" and servers to "connect" would fix this problem

— Reply to this email directly, view it on GitHub https://github.com/amidaware/tacticalrmm/issues/1254#issuecomment-1446019908, or unsubscribe https://github.com/notifications/unsubscribe-auth/AVUODWVZDVTZKVQGT3DVQATWZR2BZANCNFSM57KSDNZA . You are receiving this because you are subscribed to this thread.Message ID: @.***>

dinger1986 commented 1 year ago

You already can move machines. I don't fully understand though, do your techs not track their time?

lambertpierre85 commented 1 year ago

we make use of remote support logs (currently teamviewer logs) to attach to the invoices and also to track time of techs. Techs do support, admin person invoices from comments attached to remote session and per logs time.

here is a sample of a teamviewer report attached. you can see the support agents, session start date and time and end date end time, clients are linked to a per hour billing rate and time spend is then calculating a fee. makes invoicing easy for the staff

On Mon, Feb 27, 2023 at 1:34 PM dinger1986 @.***> wrote:

You already can move machines. I don't fully understand though, do your techs not track their time?

— Reply to this email directly, view it on GitHub https://github.com/amidaware/tacticalrmm/issues/1254#issuecomment-1446172924, or unsubscribe https://github.com/notifications/unsubscribe-auth/AVUODWXAWXXTJI22KUJHRUDWZSGMJANCNFSM57KSDNZA . You are receiving this because you commented.Message ID: @.***>

-- Regards,

Pierre Lambert Cell: +264811409076 Fax2Mail: 0886510412

fsteltenkamp commented 1 year ago

@lambertpierre85 i think you should open a separate issue for your problem.
it sounds like you want to implement time tracking into Meshcentral/Trmm which has nothing to do with the original issue i posted.

I'd go further - one group per client, then split between server and wkst Reason: a) Permissions - should be granted per client in MeshCentral. b) I am having no issues connecting to any server, but connecting to a client where someone is working may be a severe intrusion of privacy. Changing workstations to "ask" and servers to "connect" would fix this problem

Yes, absolutely would be the preferred setup.
What i hoped this issue would result in, is a deeper integration of MC into Trmm, so i don't have to set up these permissions myself, and Trmm just sets them based on some rules defined in Trmm.
b) would have to be implemented by Meshcentral, since the "connect" button is just displayed as is by Trmm but generated by MC.

NetBLOKS commented 1 year ago

Same issue here. We need user right separation for Meshcentral, because not everyone is allowed access to every customer/ machine. The No Autologin is a bad workaround, as we need the MC Login and all machines are in one group to be managed by TRMM. It would be much easier, if a user would be created on TRMM and MC simultaneously and synchronized. This would also implement, that MC uses multiple groups, not just the "TacticalRMM" one for right-separation.

silversword411 commented 1 year ago

We know what needs to be done. It's on the TODO list...it's just a matter of when dev resources can get to it.

NetBLOKS commented 1 year ago

Good to hear, thanks for the feedback.