top of page

Alarm Management

This section defines values that, when matched during registration, trigger an email notification to all users marked as Admins with a configured email address (as defined in the Users Table) and to the Telegram bot.

EVENTS ALARMS

image.png

Here you can specify the types of control you want to apply to a specific machine (or machines) and to a specific user (or users) at the times defined.

It is also possible to indicate a frequency, meaning after how many recorded events the system should send

the email with the detected alarm.

This works in combination with the Minutes column, allowing you to manage alarms that occur with a given frequency within a defined time range.

A button is available to automatically insert the recommended alarms (these will initially be deactivated).

​

​

New Feature – Filter by Extension

​

It is now possible to specify a filter by extension (e.g., .docx, .xlsx) to limit the check to only files with that extension.

This option makes it possible, for example, to monitor the deletion of Office documents within a specific folder.

FILES ALARMS

image.png

This section is linked to the activation of file control.

You can define alarms that are triggered when an event associated with the alarm is detected.

  • The Path column indicates the reference path.

  • The File column specifies whether a specific file or all files in the reference folder should be taken into consideration.

  • The Control Type column specifies whether the alarm should be activated in the event of a Read, Write, or Delete action (or in all three cases).

​

New Feature – Filter by Extension

​

It is now possible to specify a filter by extension (e.g., .docx, .xlsx) to limit the check to files with that extension.

This option allows you to monitor, for example, the deletion of Office documents within a specific folder.

SOFTWARE ALARMS

image.png

This section is linked to enabling the software and hardware inventory in the settings.

You can configure alerts that are triggered when the specified software is detected (on specific machines or on all machines) in case of installation, update, or uninstallation.

Inside each Alarms screen, you will find IA Powershell

image.png
image.png

You can transform and test a request into a PowerShell command.

Note: Some commands require administrative privileges to run.

image.png
bottom of page