Skip to content

DriveLock Customer Forum

Information

EN: Please share your ideas and suggestions for improvement with us.
At DriveLock, we want to be able to better understand and evaluate your concerns and are working to continually improve our products. Here in our forum you can leave ideas and suggestions, or view and vote for others' ideas. 
You are welcome to write your input in German, and we will translate it into English for you so that as many of our customers as possible can participate.

DE: Bitte teilen Sie uns Ihre Ideen und Verbesserungsvorschläge mit.
Wir von DriveLock möchten Ihre Anliegen besser verstehen und bewerten können und arbeiten an der ständigen Verbesserung unserer Produkte. Hier in unserem Forum können Sie Ideen und Anregungen hinterlassen, oder auch die Ideen anderer einsehen und für sie stimmen. 
Sie können gerne Ihre Eingaben in Deutsch verfassen, wir werden für Sie die Übersetzung ins Englische übernehmen, damit möglichst viele unserer Kunden an den Vorschlägen teilhaben können.


  • Hot ideas
  • Top ideas
  • New ideas
  • My feedback

68 results found

  1. Use fingerprint and/or face recognition at DriveLock PBA (Windows Hello support)

    When using the Drivelock PBA with Yubikeys to implement a 2FA, the use of fingerprint scanners and facial recognition is not possible. Login works with PIN or username/password.
    We have notebooks with fingerprint and face recognition in use. If you activate the functionality in Windows, the Drivelock PBA does not work anymore. The PBA cannot be installed or uninstalled. The PBA users are not synchronized. This means that the additional logon methods cannot be used. With the PBA fingerprint and face recognition should be possible.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    The current PBA does not support face recognition or fingerprint. UEFI does not support that. The request is closed. There is a possibility that we will revisit the issue at some point with further development. Thank you for your understanding.

  2. Using VMWare workstation , USB Device can be accessed in VM Client even though it is blocked in host machine..

    Using VMWare workstation , USB Device can be accessed in VM Client even though it is blocked in host machine..

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

  3. Deactivate MQTT on the server

    It should be possible to disable MQTT on the server side as well. The existing option to disable MQTT on the client side via policy is not sufficient in my opinion. It should best be configurable via a feature in the DMC UI.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Usability  ·  Admin →

    Disabling MQTT by policy provides a way to respond to restrictions on the use of MQTT communications in certain situations and environments.


    We do not foresee disabling MQTT server-side at this time, as it is a central part of the DriveLock components' technical communication, the use of which will continue to expand in the future.

  4. Netzwerkconnection anhand des primären DNS-Suffix bei jedem Verbindungsaufbau

    Wir würden gerne die Netzwerkrichtlinien von Drivelock nutzen, damit die verwalteten Clients sich ausschließlich mit unserem Domänennetzwerk verbinden und im laufenden Betrieb auch die Netzwerkschnittstellen wechseln können. Dies würden wir gerne anhand des primären DNS-Suffix abfragen.
    Momentan gibt es diese Möglichkeit bereits, doch wird diese Abfrage lediglich einmalig abgefragt und nicht bei jedem erneuten Verbindungsaufbau.
    Wir wollen unseren Clients ermöglichen, dass sie sich sowohl über Wlan, als auch über Kabel verbinden und auch während einer Sitzung wechseln können.
    Um dies zu erreichen, müsste unter dem Kartenreiter "Action" im Eigenschaftenfenster der Netzwerkrichtlinien eine Auswahl ähnlich wie "Disable network connection until new…

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    The functionality you require should already be possible today. However, if the card is deactivated, it is not possible to recognize whether the correct DNS suffix is present in order to reactivate the card. However, if the card is activated manually, this is already possible today.

    DriveLock checks the network connection again with every policy update and network change.

    Firewall rules can also be set up to control the network connection; it may be possible to do this via the firewall by setting up a rule that blocks all connections as long as the device is not in the correct network. If an attempt is made to access the wrong network, a corresponding firewall rule must be created that blocks everything (with the exception of the rules required for a network change). In the event of a change to the correct network, the corresponding rule must be removed again.

    If…

  5. Support Imprivata credential provider

    For synchronization of users/credentials and for a Windows SSO after successful authentication of the user at the DriveLock PBA, a connection of the DriveLock Credential Provider to the Credential Provider of the Imprivata Agent is required (Credential Provider Wrapper).

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    Aktuell planen wir keine Integration in diese Richtung. Sollte sich dies in Zukunft ändern oder zusätzliche technische Grundlagen vorliegen, prüfen wir das Thema gerne erneut.

    Vielen Dank für Ihr Verständnis.

    Mit freundlichen Grüßen,

    Produktmanagement | DriveLock SE

  6. Manual input of the stored uninstall password

    Enable manual entry of the stored uninstall password. Either during uninstallation via "Programs and Features" or another entry "Uninstall Agent" via the systray icon of the DL Agent.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    Thank you for posting this request on our feedback forum.


    This uninstall password is an additional layer of security to prevent local admins in environments without a zero trust approach from uninstalling the DriveLock agent part.

    If for any reasons a single agent needs to be removed we already provide the possibility to use the following administration command-line:


    msiexec /x DriveLockAgent.msi UNINSTPWD=<your_password>


    The password is checked before the inner MSI part is executed. We would have to change this in order to fulfill requests like this one and decided not to lower security measures here, a while ago.


    Please feel free to get in touch with us directly to discuss this in more detail.

  7. Nach dem Test die Fehler anschauen

    Leider ist es in der Aktuellen Version nach Abschluss der Fragen nicht möglich zusehen was man falsch beantwortet hat man sieht nur unten die runden Punkte mit X wenn man darauf kickt passiert nichts, hier wäre es gut die Frage nochmals zu sehen mit was wurde geantwortet und was wäre richtig gewesen

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

  8. Fehler Auswertung der Kampagne im DOC

    Ist es möglich das im DOC nicht nur die Anzahl der Fehler ausgewertet werden können, sondern auch Welche Fehler gemacht wurden?
    Von welchen Benutzern

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

  9. DriveLock Linux Agent should be able to send all existing events to other external systems via email

    As an administrator I want to let the Linux Agent send all drivelock agent events also to external systems.
    It should work similar like DriveLock Agents for Windows OS.
    If we can define a priority, we would like to see the following priority order (for implementing):
    1) SMTP (email, supporting TLS/SSL)
    2) SNMP

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

  10. Format BitLocker2Go USB removables like in Encryption2Go

    In Encryption2Go it is possible to format the USB removables before encryption and keep the data if necessary - these options are completely missing in BitLocker2Go.

    4 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

  11. DriveLock License Management (expire dates) over DOC, within an Enterprise Environment

    DES Servers, running into an an protected Enterprise Environment configured according Microsoft's Recommendation
    for an Enterprise-Access-Modell, should be able to renew their License Date (Maintenance Date) over the DOC,
    without having direct Internet access, and without getting each year a new license to activate by phone.
    An Implementation idea is maybe a Windows 10 Client System running DOC Companion, while the Client have
    Internet Access over a Company Proxy Server, to renew the License at the DES Server backend.

    4 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    if you issue a new license annually (or whenever the maintenance is extended), then you don't even need one without activation, because the mmc does the activation and you can run it on a computer with internet access or use the telephone activation. You can either activate by telephone or issue the customer with a license without activation. Subscription licenses have to be reissued anyway, at least until now

  12. DLSupportAgent.exe

    Der "DLSupportAgent.exe" sollte via Kommandozeile bedienbar sein, so dass die Aktivierung nicht zwingend grafisch erfolgen muss. Es sollten die Kommandozeile und die Windows-Powershell unterstützt werden:

    z.B. DLSupportAgent.exe -Step [1/2/3/4/5/6/7]

    The "DLSupportAgent.exe" should support a interaction via command line (cmd / Windows-Powershell) so that there is no need for a graphical access to the traget system.

    3 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

  13. Configure automatic temporary unlock in the future (from time x to time y)

    We have repeated requests for USB releases for specific time periods in the future. Would it be possible in the helpdesk temporary unlock window to select a period in the future with time and date specification?

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

  14. DOC deployment installation option should support DriveLock groups

    In the new DOC 21.2, it is possible to deploy new agent on computer. It would be very nice to be able to use drivelock groups here instead of a static list of PCs.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Usability  ·  Admin →
  15. 3rd party events should be directly sent by SMTP/SNMP

    it seams 3rd party event can only be sent to the DES as oppose to DriveLock events that can be sent directly by the agent through SNMP/SMTP. Ths should be the case for 3rd party events too.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

  16. Multiselection in white list rules under devices is not possibe

    In policy editor, it is possible to multi select WLR under drives in order to move them or delete them but it is not possible to do the very same thing in the devices category. It will be nice to have the same functionality.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Usability  ·  Admin →
  17. Increase rule count limit under "user selection" rules

    Currently the "User selection" rule under Encryption 2-Go or File Protection allows a maximum of three (3) selectable rules. Suggesting to increase this limit to at least five (5) rules if possible.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    declined  ·  0 comments  ·  Admin →
  18. DOC: Refresh individual widgets

    Currently you can only refresh the whole dashboard tab. Suggesting to also add the feature to allow refreshing a specific widget as needed.

    1 vote

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    0 comments  ·  Usability  ·  Admin →
  19. Make secure deletion feature available with File Protection

    Currently the "secure delete" utility is only available with Encryption 2-Go license. Suggesting to also include it with File Protection license.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    declined  ·  0 comments  ·  File Encryption  ·  Admin →
  20. Share custom DOC dashboards & widget via UserVoice

    Suggesting to allow and facilitate sharing of custom DOC dashboards and widgets created by DriveLock users (customers, resellers, consultants, etc.) via UserVoice or any other suitable platform.

    2 votes

    We're glad you're here

    Please sign in to leave feedback

    Signed in as (Sign out)

    We’ll send you updates on this idea

    declined  ·  0 comments  ·  Usability  ·  Admin →
  • Don't see your idea?

Feedback and Knowledge Base