ManageEngine Pitstop | Community and Support forums

            New to ADManager Plus?

              New to ADSelfService Plus?

                      • Announcements

                      • Desktop Central server hardening guidelines

                        Hi Folks,  It is critical to stay protected and have a check on your organization's approach towards securing and managing the endpoints.  This article suggests security guidelines to harden the ManageEngine Desktop Central software.  These security suggestions
                      • Secure your Desktop Central server from unauthenticated access!

                        Dear Customer's,   At ManageEngine, we consider security as our top priority. That’s why we bring it to your immediate attention, that some versions of Desktop Central Server instances that were hosted as edge devices with weak password policies might be compromised (reported by BleepingComputer).   A cyberthreat actor has claimed that the Desktop Central servers hosted as edge devices (publicly accessible) that do not have two-factor authentication enabled and use the default credentials to authenticate
                      • Fixes to multiple vulnerabilities

                        Hello everyone,   Greetings,   Multiple vulnerabilities have been fixed and released in Desktop Central build 10.0.532.   Here is the Knowledge Base article for your reference: https://www.manageengine.com/products/desktop-central/multiple-vulnerabilities-fix.html   #securityupdate-dc   If you need assistance, please reach us via desktopcentral-support@manageengine.com Kind regards, Desktop Central team
                      • Zero day Vulnerability - Need immediate attention! Desktop Central Server might be compromised.

                        Dear Customer's, At ManageEngine, we consider security as our top priority. That’s why we bring it to your immediate attention, that some versions of Desktop Central Server contain an unauthenticated remote code execution vulnerability (originally reported by Steven Seeley of Source Incite). Since this vulnerability has been declared as "Zero Day - Vulnerability", we could see that some of the enterprises were targeted and few customers network compromised. Ever since this vulnerability was brought
                      • Dell API update for Warranty fetch details

                        Dell has announced that the API to check for warranty details will be deprecated as on March 12, 2020. The new APIs for Dell has been released in build 10.0.479 and above. To continue to fetch warranty details in Desktop Central securely, follow the below given steps. 1. Log in to your Desktop Central console, click on your current build number on the top right corner. 2. You can find the latest build applicable to you. Download the PPM and update.   Cheers, ManageEngine Team