What is 'Follina' Zero-Day Vulnerability and how can you protect against it?
The new version of Axence nVision® software has just been made available. What changes have been introduced?
15 new features, improvements and fixes
Axence nVision® 9.1 software is another portion of novelties prepared in response to the needs of IT departments of companies and institutions. The features of the latest version include the ability to detect and visualize devices that for various reasons (e.g. because of firewall settings) do not provide a ping reply; it is now possible to start the scanner with the additional ARP-ping request. The general improvements also include the automatic detection of nVision server by the Agent and Console.
New features in individual modules
MSI packages manager, which allows the management of software installations and uninstallations, was added into the Inventory module. Packages can be grouped and remotely installed or uninstalled on all or selected workstations. nVision Agents can also verify if any attempt by users to re-install software previously uninstalled by the administrator was made. If so, the program will automatically remove it. Also, the status view with specific installation/uninstallation tasks is now available in the MSI packages manager.
The Users module has been enhanced with the ability to define two additional alerts that will notify when the limits for data transfer or print-outs has been exceeded by a user. In addition, it is now possible to define which days users are to be monitored.
Improvements have also appeared in the HelpDesk module which gained, among others, more conditions for periodically triggered automations, a more transparent graph of work left to be done by the support department, a new filter in the event log (initiator) and the distribution of tasks when users are logged out or away from work.
How to download the latest version?
The new version of Axence nVision is available for download from the Axence homepage (Products tab). It can also be installed by clicking this link.