User-Requested Software Installations

User-Requested Software Installations

All software installed on RMM machines must be listed in either the customer's install checklist in AT, or in the Site Summary asset in ITG under the field "Applications that can be Installed and Updated without Authorization Contact Approval."

If they are not, then approval must be provided by BOTH of the following: 
1. Security Authorization contact or Primary Authority
2. Matthew or Roberta

Exceptions to this policy: 
  1. Slack
  2. Chrome
  3. Firefox
  4. Ditto
  5. Adobe Reader

    • Related Articles

    • Providing Permission to Install/Remove Software to RMM End Users

      Overview The purpose of this article is to specify our policies regarding giving RMM end users the ability to perform actions on their workstation that may cause corruption or security breaches. The two main areas of concern are: Allowing customers ...
    • Response to Privacy Concerns About Our Software on User and Company Devices

      Items in red may require editing.  ScreenConnect Privacy Concerns The software called ScreenConnect was downloaded onto laptops only, enabling GGIT technical support direct access to laptops when needed for updates or troubleshooting.  This software ...
    • Remove Contact (User) for RMM Customer

      Use ticket category: Administrative Change/Request. Confirm the ticket contact field is populated Choose ticket template "[Current Customer] Remove Contact/User for Current RMM Customer" Save. Saving the ticket with this template causes an email to ...
    • Customer is Demanding on End User support but is not a help desk customer

      I scheduled your appointment for today as a courtesy; however, I'd like to remind you that this accommodation is an exception. Generally, we can’t accommodate end user support on such short notice. Your current RMM agreement does not guarantee a ...
    • Usecure Security Awareness Training - Admin Basics

      Customer Tenant Access To go to a customer tenant, go to uService tab on top. Click Customers. There are two button next to each customer: Admin is for changing and viewing the customer's training and phishing configuration (for example, when ...