Skip to content

DriveLock Customer Forum

Information

EN: Please share your ideas and suggestions for improvement with us.
At DriveLock, we want to be able to better understand and evaluate your concerns and are working to continually improve our products. Here in our forum you can leave ideas and suggestions, or view and vote for others' ideas. 
You are welcome to write your input in German, and we will translate it into English for you so that as many of our customers as possible can participate.

DE: Bitte teilen Sie uns Ihre Ideen und Verbesserungsvorschläge mit.
Wir von DriveLock möchten Ihre Anliegen besser verstehen und bewerten können und arbeiten an der ständigen Verbesserung unserer Produkte. Hier in unserem Forum können Sie Ideen und Anregungen hinterlassen, oder auch die Ideen anderer einsehen und für sie stimmen. 
Sie können gerne Ihre Eingaben in Deutsch verfassen, wir werden für Sie die Übersetzung ins Englische übernehmen, damit möglichst viele unserer Kunden an den Vorschlägen teilhaben können.


  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback

90 results found

  1. set the default Event log to Drivelock instead of the Windows Application Log

    set the default Event log always to Drivelock instead of the Windows Application Log

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Usability  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  2. Powershell support for drivelock.Exe

    Please fully support (and document) drivelock.exe command line from PowerShell "Start-Process" command along with "ArgumentList". Current the Arguments from ArgumentList Option are not always accepted, for any available Arg. This is very usefull for example for deployment framework like SCCM or PSAPPDeployToolkit.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  3. DCC Reporting zusätzliche Spalte: Aufrufender Prozess

    Nach der Einführung der Anwendungs-Berechtigungen wäre es praktisch im ControlCenter in den Ereignisreports eine Spalte "Aufrufender Prozess" auswählen zu können.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  4. Berechtigungen nur auf "BitLocker-Wiederherstellung/Notfallanmeldung"

    Die Dezentralisierung von Aufgaben würde erleichtert werden, wenn die Berechtigungen im DCC feingranularer vergeben werden können. z.B. müssen Menschen, die berechtigt sein sollen, die "BitLocker-Wiederherstellung/Notfallanmeldung" (oder jede andere Wiederherstellung) nicht auch alle anderen Helpdesk-Informationen einsehen

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  5. MFA Option for tenant login

    I miss a MFA Option for the tenant login.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    released  ·  0 comments  ·  Cloud Services  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  6. AD-Gruppen / Gruppen von der Richtlinienzuweisung ("Alle Computer") ausschließen

    Es wäre schön, wenn man Ausnahmen in der Zuweisung von Richtlinien definieren könnte. Beispiel: Eine Richtlinie wird an alle Computer verteilt, außer an eine bestimmte AD Gruppe.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    1 comment  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  7. Eingabemöglichkeit der Begründung für eine Freischaltung via SelfService-Tool

    Für die SB-Freigabe via Freigabetool (dlselfservice.exe) ist es nötig eine Begründung für die Freigabe einzugeben. Aktuell reicht hier die Eingabe nur eines einzigen Zeichens, um die Schnittstellen des Computers freizugeben.
    Anfrage:
    Es soll via Policy (CSP) möglich sein, die nötige Länge und Qualität der Begründung festzulegen.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  8. Security Awarness

    Dem User Zugriff auf bereits durchgeführte Kampagnen gewähren, um Informationen nachhaltig zu Verfügung zu stellen

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  9. Bemerkungsfeldes im Dialogfeld „Eigenschaften einer Hashdatenbank“

    Wir bitte um Erweiterung des Bemerkungsfeldes im Dialogfeld „Eigenschaften einer Hashdatenbank“ auf mind. 2048, besser noch 4096 Zeichen.
    Begründung:
    Wir schreiben in die Bemerkung i.d.R. die Namen der gescannten Softwarepakete und das Scandatum bzw. den Versionsstand. Um dort 50 Einträge speichern zu können würden ca. 2048 Zeichen benötigt. Für 100 Einträge wären ca. 4096 Zeichen notwendig.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  10. Controll and Block specific child processes

    Als Administrator möchte ich kontrollieren können, welche Applikationen CMD,Powershell,CScript etc. als Kind-Prozesse starten können.
    So hätte ich einen besseren Schutz vor sogenannten Fileless-Attacken.

    As an administrator I want to be able to control which applications CMD,Powershell,CScript etc. can start as child processes.
    This would give me better protection against fileless attacks.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  11. Nicht beenden Modus bei SW-Verteilung

    Wir würden gerne den nicht beenden Modus aktivieren, damit keine User oder Admins lokal die Drivelock Dienste beenden können. Da wir eine Software Verteilung nutzen, ist dies aktuell nicht möglich. Wäre es möglich diese Option so zu erweitern, dass die Agent Updates trotzdem funktionieren, ohne dass wir gezwungen sind die Verteilung von Drivelock zu nutzen?

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    Today, you can configure the unstoppable mode as a conditional setting in the policy. To do this, proceed as follows, for example: Define a dynamic group to a registry value. Create a config filter in the policy that filters for this dynamic group. Then configure the unstoppable mode as a conditional setting based on this config filter. On the DriveLock side, that's it.

    The software distribution can now control the unstoppable mode and stop the DriveLock service by temporarily setting the registry value followed by an UpdateConfig.

    In addition, DriveLock Application Behavior Control can ensure that only the software distribution is allowed to set this registry value. The latter requires the AC module.

  12. Freigabe von Skripten in der Application Control

    Es sollte möglich sein, bestimmte Skripte durch die Application Control freizugeben. Rein generell soll es Usern ja lieber nicht möglich sein die cmd.exe oder Powsershell.exe auszuführen. Teilweise ist dies aber für einige Programme erforderlich, sodass bestimmte Skripte ausgeführt werden müssen. Diese Skripte liegen unter fest definierten Pfaden auf Servern oder lokal) und können durch die User im Normalfall nicht bearbeitet werden. Zudem wäre es möglich, Powershellskripte zu signieren und das dazugehörige Zertifikat + Pfadangabe würde so zu einer erhöhten Sicherheit bei der Freigaberegel beitragen. Also eigentlich wie bei einer Datei-Eigenschaftsregel oder meinetwegen eine Erweiterung der Datei-Eigenschaftsregeln durch Angabe von Skripten

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    What is already possible today is authorization for individual scripts. In addition, you can build rules that check whether a parameter following PowerShell, for example, is permitted or not. This is possible with AC or Application Behavior Control (ABC).

  13. Ability to enforce different password when changing BitLocker password

    some users may prefer to have the ability to enforce different passwords when changing their BitLocker password. This additional layer of security can prevent unauthorized access to the encrypted data in case the original password is compromised

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  14. Would like an order for EDR Responses implemented

    While merging two policies, both policies have created a response for the same event, the order in which these responses are actioned are currently at random, we would like to request that the policies be implemented in order.

    To do this we would like to request that the policies are:
    sorted by Numerical policy position order at RSOP, and for the policies to be executed by their Numerical policy position order.

    Kind Regards

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  15. Make inventory data acessible via REST API or oDATA interface

    It would make it a lot easier to identify gaps between my AD computers and my DriveLock devices if there would be an API interface, either as oDATA or REST API implementation. While there is a way to export all these lists and view to CSV and import them into Power BI, connecting a live data source would be so much easier....

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  16. Need a DriveLock REST API for use with PRTG Network Monitor.

    We do need the DOC functionality as a REST API, as we want integrate some
    views within our Network Monitor Tool "PRTG".
    And once it is implemented, we do need a official REST API documentation.
    For example, when we define a DOC View for Computers/Agents with heartbeat was more than

    4weeks ago, then we want to create a REST API call from it, to view them within our PRTG Monitor tool,
    without the needs to login into DOC. Similar like it works with SentinelOne.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Usability  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  17. Want to have the DOC Standard View for "Unknown (>3w)" configurable.

    We do need the DOC Standard View for all Clients "Unknown (>3w)" configurable
    so we can define also a view for Agents whose last system heartbeat was more than

    1month, >3month, >6month, >9month and >12month ago; their status is unknown

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Usability  ·  Admin →
    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  18. Whitelist Regel von USB Geräten mit Bitlocker to go

    Die Konfiguration einer Whitelistregel für USB Sticks mit gleichzeitiger Erzwingung der BitLocker to go Verschlüsselung funktioniert nicht im Zusammenhang mit "Allow".

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  19. App Control: Allow multiple hash algorithms simultaneously

    Current settings allow specifying only one hash algorithm before creating any AC rules. There is an increase in the use of indicators of compromise (IOCs) which some customers use to protect against emerging or existing threats. Usually those IOCs will contain hash values of known-bad files (malware) to be imported and blocked. However, depending on the intelligence source, such hash values can be based off various hashing algorithms, which will be a problem for DriveLock customers who are using a different hash algorithm. The suggestion is to support the use of multiple hash algorithms at the same time both when…

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  20. 2 Factor Authentification

    It is to be examined whether Drivelock can be used to equip USB data carriers (which are to be procured internally via SAP - e.g. Kingston Data Traveler) with 2-factor authentication (2-FA). Or if other USB data carriers (sticks) are available on the market that fulfill a 2FA requirement.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    How important is this to you?

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)
  • Don't see your idea?

Feedback and Knowledge Base