We’re currently experiencing a high volume of support requests, which may result in longer response times — thank you for your patience and understanding.
Note on third‑party tools We aim to provide accurate and helpful details about third‑party tools, but we can’t guarantee that this information is always complete or up to date. For the most reliable information, please a...
Manage users, groups, applications, and authentication policies in Okta. Connections API Token Authenticate using an API token from your Okta Admin Console InputCommentsDefaultOkta DomainThe base URL for the Okta API. Depending on your cloud environm...
Note on third‑party tools We aim to provide accurate and helpful details about third‑party tools, but we can’t guarantee that this information is always complete or up to date. If you notice any discrepancies, feel free ...
As Microsoft moves deeper into AI, Copilot+ PCs bring new hardware and features powered by NPUs. This Pro Tip looks at what’s needed and how to prepare your environment. This Pro Tip covers: The difference between Copilot and Copilot+Key hardware req...
In this month's Pro Tip, I cover how you use ChatGPT as a digital assistant to create advanced reports. It's especially helpful if you're not that familiar with coding your own advanced reports. I also share some other tips on how to make reporting e...
Audit trail is a foundational security feature in Lansweeper Sites, designed to fill a key visibility gap in user activity monitoring. It enhances audit readiness by providing clear records of who did what and when, directly within your Lansweeper Si...
Affected Product Categorization helps you allocate resources and prioritize risk mitigation efforts by organizing vulnerabilities according to their root causes and affected products.This categorization uses three fields that make it easier to analyz...
Resolving vulnerabilities is paramount to safeguarding your assets against potential threats. Lansweeper equips you with the tools to identify vulnerabilities across your network, but the next step is resolving those vulnerabilities. Resolve software...