Click below for proper support
Microsoft Products Knowledge
Novell Products Knowledge Base
Cisco Products Knowledge Base
Frequently Ask Questions?
Q: How does WINSWARE help me in
assigning access control to my administrator with many users to manage?
The ITS Web Portal supports Role Based Access Control so you can assign an
administrator to a single site or multiple sites. This Role Based control
carries over when using the WINSWARE Remote Management Console, so the same
administrator will only have remote control access to those sites which they
Q: Can I deploy software using the WINSWARE Platform?
Yes, we have integrated a scripting engine into our portal that enables our
clients to push out .bat, .msi, and .exe files to their end users.
Q: What type of devices can I remotely monitor?
The WINSWARE Server Agent installs locally on a Windows Server machine and is
configurable to remotely monitor SNMP, IP and Red Hat Linux devices.
Virtually any SNMP device and IP device can be monitored. Red Hat 8, 9, AS 3
and ES 3 are supported as Linux devices.
Q: Does WINSWARE have any intrusion detection reports or
No, we do not support intrusion detection however we do perform comprehensive
External Vulnerability Scans which generates a 30 to 40 page report on all
vulnerabilities found on a public IP address.
Q: Can the WINSWARE Platform be customized to monitor for specific
ports and applications?
Yes, in addition to our default monitoring policies the WINSWARE Platform can
be customized to monitor any port, process, service and common performance
counters. Alerts and notifications can be configured for customized policies
Q: How secure is the WINSWARE Platform? What data is leaving my
The WINSWARE Platform operates entirely over 128-bit encrypted connections.
All data from the client's machine is first compressed using a compression
key then sent over a 128-bit encrypted tunnel to our data center. Only
requests coming from our Agents are processed by our web servers then
directly forwarded to our SQL Database. The SQL Database which stores all of
the information is not directly accessible from the Internet. No sensitive
data ever leaves your client's site such as usernames or passwords. Only
machine configuration details and monitoring statistics are sent to the