Tactical RMM is a remote monitoring & management tool for Windows computers, built with Django and Vue.

Overview

Tactical RMM

Build Status Coverage Status License: MIT Code style: black

Tactical RMM is a remote monitoring & management tool for Windows computers, built with Django and Vue.
It uses an agent written in golang and integrates with MeshCentral

LIVE DEMO

Demo database resets every hour. A lot of features are disabled for obvious reasons due to the nature of this app.

Discord Chat

Documentation

Features

  • Teamviewer-like remote desktop control
  • Real-time remote shell
  • Remote file browser (download and upload files)
  • Remote command and script execution (batch, powershell and python scripts)
  • Event log viewer
  • Services management
  • Windows patch management
  • Automated checks with email/SMS alerting (cpu, disk, memory, services, scripts, event logs)
  • Automated task runner (run scripts on a schedule)
  • Remote software installation via chocolatey
  • Software and hardware inventory

Windows versions supported

  • Windows 7, 8.1, 10, Server 2008R2, 2012R2, 2016, 2019

Installation / Backup / Restore / Usage

Refer to the documentation

Comments
  • Automation and Alerts overview

    Automation and Alerts overview

    I was looking into ways to apply checks globally to either sites, clients, or agent level. I thought of having an Automation Manager component. Something like this added to the Settings FileBar. image

    You can add policies that include multiple checks. Then you can apply these policies at clients, sites, and agents. Similar to a GPO. The policies can be run manually, on a scheduled basis, or triggered by an external event.

    I was also thinking of a way to see all active alerts. Possibly located in a notification icon by the logout menu.

    Let me know your thoughts and I can work on it. I have the frontend built out mostly just need to add the routes server-side.

    opened by sadnub 45
  • Agents are showing offline after installing

    Agents are showing offline after installing

    Agent installs correctly, services are up and running, but it never completes reporting to the RMM and goes offline (yellow status). Have tried restarting the services but it never changes (shows 51 years offline on the affected ones). Computers are Windows 7. Some Windows 7 computers are working correctly (along with Windows 10)

    bug 
    opened by rtwright68 44
  • services crash when installed along-side other software

    services crash when installed along-side other software

    We've been having a problem for the last few weeks where services start crashing randomly on servers. The reason this got so much attention internally is because dhcpserver kept crashing. Some of the services that crash are: nxlog, dhcpserver, Wecsvc, Schedule, lmhosts, eventlog

    The most popular service to crash is nxlog

    EDIT: I should add that by "crashing", I mean it didn't recover. It seems that after digging further many services crash but only a few don't recover.

    This has been seen on OS: 2008r2, 2016std, win10pro, sbs2011

    All of these servers also have another program that collects event logs which doesn't crash.

    Timeline from today's crashes 1/27/2021 - 09:30 - updated Tactical from 0.4.0 to 0.4.1 (agent 1.3 to 1.4) 1/27/2021 - 09:47 - Monitoring triggered 4x servers, all different customers, all at about exactly the same time.

    Since this seems related to nxlog + Tactical , my next step is going to see which version of nxlog these machines have and see if I can predict it in the future based on nxlog being installed and versions.

    opened by bbrendon 30
  • Ram use of tacticalrmm.exe changed - now has absurd commit charge

    Ram use of tacticalrmm.exe changed - now has absurd commit charge

    image image

    This server has 32 gb of ram - multiple servers with this issue. agent added approx close of business yesterday, server rebooted today (red circle) due to OOM failures of several services. Server typically runs around 50% ram: image

    Here's a different server when it had the agent updated, again massive ram allocations. image

    Note all these servers are Hyper-v VMs. They are running windows server from 2008r2 through to 2019. This only seems to occur on a recent agent update as of about two weeks ago (I think 0.2.18, but i would have to poke through logs to be certain, ad we do not update to each version immediately, so it may not be a bug introduced then anyway)

    bug 
    opened by trs998 29
  • No Login Fields

    No Login Fields

    **Server Info

    • OS: Alma Linux 8.4, Docker version 20.10.14
    • Browser: FireDragon, Vivaldi(Chromium), Firefox ESR
    • RMM Version (as shown in top left of web UI): v0.12.4

    Installation Method:

    • [ ] Standard
    • [x] Docker

    Agent Info (please complete the following information):

    • Agent version (as shown in the 'Summary' tab of the agent from web UI): v2.0.2
    • Agent OS: Win 10 v2004

    Describe the bug Tactical RMM login page has no input fields. Greeted by "TacticalRMM" heading and a login button.

    To Reproduce Steps to reproduce the behavior:

    1. Update from v0.12.2
    2. Visit Tactical Web UI

    Expected behavior Fields should be shown to login.

    Screenshots image

    Additional context Apologies if there is some configuration error on my end, I've attempted all I can aside from rolling back to v0.12.2.

    opened by vaughngx4 27
  • Bug: running scripts and sending commands on Microsoft Exchange Servers

    Bug: running scripts and sending commands on Microsoft Exchange Servers

    Server Info (please complete the following information):

    • OS: Ubuntu Server 20.04
    • Browser: chrome 108
    • RMM Version (as shown in top left of web UI): 0.15.3

    Installation Method:

    • [ ] Standard
    • [x] Docker

    Agent Info (please complete the following information):

    • Agent version (as shown in the 'Summary' tab of the agent from web UI): 2.4.2
    • Agent OS: Windows Server 2016

    Describe the bug If I run a powershell script on this server, which is an exchange-server, I get the following error: exec: "Powershell": cannot run executable found relative to current directory

    I reinstalled the wohle agent, the powershell.exe is available in c:\windows\system32, DISM and SFC Check made with no problems, Server has been restarted several times.

    To Reproduce Steps to reproduce the behavior: Because I do not know, how the procedure looks like to start the powershell script, I can not reprocedure this. On all other systems I got, the scripts start, but not on this.

    Expected behavior The scripts should run.

    Screenshots no

    Additional context none

    opened by rawbyne 26
  • Agent error connectex

    Agent error connectex

    Hi, i have an error with agent when i install it on windows 10.

    Server Info (please complete the following information):

    • OS: Ubuntu 20.04
    • Browser: ALL
    • RMM Version (as shown in top left of web UI): 0.11.3

    Installation Method:

    • [*] Standard
    • [ ] Docker

    Agent Info (please complete the following information):

    • Agent version (as shown in the 'Summary' tab of the agent from web UI): None
    • Agent OS: [e.g. Win 10 v2004, Server 2012 R2]: WIN 10

    Describe the bug I downloaded the agent from the platform frontend, but I can't install the app on any device. I followed the instructions in the official documentation without making any mistakes in DNS and domains or opening ports.

    Screenshots CMD: cmd

    ERROR: error_cmd

    question 
    opened by iarellano24 26
  • Agent fails to update because previous update is still running

    Agent fails to update because previous update is still running

    Server Info (please complete the following information):

    • OS: Ubuntu 20.04.4 LTS
    • Browser: Firefox 103.0.2 (64-bit)
    • RMM Version (as shown in top left of web UI): v0.14.5

    Installation Method:

    • [x] Standard
    • [ ] Docker

    Agent Info (please complete the following information):

    • Agent version (as shown in the 'Summary' tab of the agent from web UI): Agent v2.0.3
    • Agent OS: Windows 10 Pro, 64 bit v21H1 (build 19043.1889)

    Describe the bug One agent is failing to update to v2.2.1. After logging into the computer, I discovered an existing update is pending. The inno logs show the upgrade failed to delete a file, retried, and ultimately prompted with a "Message box (Abort/Retry/Ignore)". The agent upgrade code starts the command but never checks if the command completed. Yes, I know it can't check if the current command spawned finished because part of the upgrade process is to restart the service. However, it can check if a previous upgrade is hung or still running. The agent.log shows the agent keeps trying to update but fails because the tacticalagent-v2.2.1-windows-amd64.exe is in use by another process. That other process is the previous upgrade that is waiting for a prompt.

    To Reproduce Steps to reproduce the behavior:

    1. I don't know how to reproducible this problem.

    Expected behavior I expect the agent to check if a previous upgrade is hung and handle the situation.

    Screenshots Here is a screenshot of the existing setup from Process Explorer. image

    Here is the properties of the upgrade process started on 2022-08-19 10:35:05 PM. image

    Additional context The inno setup log is below.

    C:\Program Files\TacticalAgent\agent.log:

    time="2022-08-21T10:35:09-04:00" level=info msg="Agent updating from 2.0.3 to 2.2.1"
    time="2022-08-21T10:35:09-04:00" level=info msg="Downloading agent update from https://agents.tacticalrmm.com/api/v2/agents/?version=2.2.1&arch=amd64&token=aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee&plat=windows&api=api.smb.services"
    time="2022-08-21T10:35:09-04:00" level=error msg="open C:\\Program Files\\TacticalAgent\\tacticalagent-v2.2.1-windows-amd64.exe: The process cannot access the file because it is being used by another process."
    time="2022-08-21T10:35:15-04:00" level=info msg="Agent service started"
    time="2022-08-21T11:35:13-04:00" level=info msg="Agent updating from 2.0.3 to 2.2.1"
    time="2022-08-21T11:35:13-04:00" level=info msg="Downloading agent update from https://agents.tacticalrmm.com/api/v2/agents/?version=2.2.1&arch=amd64&token=aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee&plat=windows&api=api.smb.services"
    time="2022-08-21T11:35:14-04:00" level=error msg="open C:\\Program Files\\TacticalAgent\\tacticalagent-v2.2.1-windows-amd64.exe: The process cannot access the file because it is being used by another process."
    time="2022-08-21T11:35:19-04:00" level=info msg="Agent service started"
    time="2022-08-21T12:25:23-04:00" level=info msg="Agent updating from 2.0.3 to 2.2.1"
    time="2022-08-21T12:25:23-04:00" level=info msg="Downloading agent update from https://agents.tacticalrmm.com/api/v2/agents/?version=2.2.1&arch=amd64&token=aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee&plat=windows&api=api.smb.services"
    time="2022-08-21T12:25:23-04:00" level=error msg="open C:\\Program Files\\TacticalAgent\\tacticalagent-v2.2.1-windows-amd64.exe: The process cannot access the file because it is being used by another process."
    time="2022-08-21T12:25:29-04:00" level=info msg="Agent service started"
    time="2022-08-21T12:35:12-04:00" level=info msg="Agent updating from 2.0.3 to 2.2.1"
    time="2022-08-21T12:35:12-04:00" level=info msg="Downloading agent update from https://agents.tacticalrmm.com/api/v2/agents/?version=2.2.1&arch=amd64&token=aaaaaaaa-bbbb-cccc-dddd-eeeeeeeeeeee&plat=windows&api=api.smb.services"
    time="2022-08-21T12:35:12-04:00" level=error msg="open C:\\Program Files\\TacticalAgent\\tacticalagent-v2.2.1-windows-amd64.exe: The process cannot access the file because it is being used by another process."
    time="2022-08-21T12:35:18-04:00" level=info msg="Agent service started"
    

    C:\Windows\Temp\tacticalrmm3774362645\tacticalrmm.txt:

    2022-08-19 22:35:07.147   Log opened. (Time zone: UTC-04:00)
    2022-08-19 22:35:07.147   Setup version: Inno Setup version 6.2.1
    2022-08-19 22:35:07.147   Original Setup EXE: C:\Program Files\TacticalAgent\tacticalagent-v2.2.1-windows-amd64.exe
    2022-08-19 22:35:07.147   Setup command line: /SL5="$1C0046,3433926,825344,C:\Program Files\TacticalAgent\tacticalagent-v2.2.1-windows-amd64.exe" /VERYSILENT /LOG=C:\WINDOWS\TEMP\tacticalrmm3774362645\tacticalrmm.txt
    2022-08-19 22:35:07.147   Windows version: 10.0.19043  (NT platform: Yes)
    2022-08-19 22:35:07.147   64-bit Windows: Yes
    2022-08-19 22:35:07.147   Processor architecture: x64
    2022-08-19 22:35:07.147   User privileges: Administrative
    2022-08-19 22:35:07.163   Administrative install mode: Yes
    2022-08-19 22:35:07.163   Install mode root key: HKEY_LOCAL_MACHINE
    2022-08-19 22:35:07.163   64-bit install mode: No
    2022-08-19 22:35:07.178   Created temporary directory: C:\WINDOWS\TEMP\is-MUSDO.tmp
    2022-08-19 22:35:08.556   Stop tacticalrpc: 2
    2022-08-19 22:35:08.771   Stop tacticalagent: 2
    2022-08-19 22:35:10.059   Stop tacticalrmm: 2
    2022-08-19 22:35:10.422   taskkill: 128
    2022-08-19 22:35:10.571   delete tacticalagent: 1060
    2022-08-19 22:35:10.714   delete tacticalrpc: 1060
    2022-08-19 22:35:10.927   Starting the installation process.
    2022-08-19 22:35:10.927   Directory for uninstall files: C:\Program Files\TacticalAgent
    2022-08-19 22:35:10.927   Will append to existing uninstall log: C:\Program Files\TacticalAgent\unins000.dat
    2022-08-19 22:35:10.958   -- File entry --
    2022-08-19 22:35:10.958   Dest filename: C:\Program Files\TacticalAgent\unins000.exe
    2022-08-19 22:35:10.974   Time stamp of our file: 2022-08-19 22:35:06.475
    2022-08-19 22:35:10.974   Dest file exists.
    2022-08-19 22:35:10.974   Time stamp of existing file: 2022-04-28 06:35:08.812
    2022-08-19 22:35:10.974   Version of our file: 51.1052.0.0
    2022-08-19 22:35:11.177   Version of existing file: 51.1052.0.0
    2022-08-19 22:35:11.177   Installing the file.
    2022-08-19 22:35:11.371   Leaving temporary file in place for now.
    2022-08-19 22:35:11.371   -- File entry --
    2022-08-19 22:35:11.371   Dest filename: C:\Program Files\TacticalAgent\tacticalrmm.exe
    2022-08-19 22:35:11.371   Time stamp of our file: 2022-08-01 15:48:00.000
    2022-08-19 22:35:11.371   Dest file exists.
    2022-08-19 22:35:11.371   Time stamp of existing file: 2022-04-22 11:41:58.000
    2022-08-19 22:35:11.371   Installing the file.
    2022-08-19 22:35:12.148   DeleteFile: The existing file appears to be in use (5). Retrying.
    2022-08-19 22:35:13.162   DeleteFile: The existing file appears to be in use (5). Retrying.
    2022-08-19 22:35:14.166   DeleteFile: The existing file appears to be in use (5). Retrying.
    2022-08-19 22:35:15.182   DeleteFile: The existing file appears to be in use (5). Retrying.
    2022-08-19 22:35:16.197   Message box (Abort/Retry/Ignore):
                              C:\Program Files\TacticalAgent\tacticalrmm.exe
                              
                              An error occurred while trying to replace the existing file:
                              DeleteFile failed; code 5.
                              Access is denied.
    
    opened by NiceGuyIT 22
  • Agents working behind a proxy

    Agents working behind a proxy

    Is your feature request related to a problem? Please describe. I have 3 sites which are connected to the internet via a Squid proxy, via wpad. Unfortunately I cant remove the proxy. When trying to install the agent on a host on these networks, it flashes up the installer screen, says "Downloading Agent..." for a few seconds, then goes away. Nothing else happens, and the agent doesn't install.

    Describe the solution you'd like Proxy support for the agent - either automatic based on system proxy settings, or a wpad address or host:port address embedded into the agent, customizable per site or agent deployment/file.

    Describe alternatives you've considered N/A

    Additional context N/A

    Thank you for your consideration.

    enhancement 
    opened by fred5632 21
  • Cron-based backup of TRMM with backup rotation.

    Cron-based backup of TRMM with backup rotation.

    I created a very straightforward Bash script to generate TRMM backups via cron, as well as only keep a maximum number of backups. There's nothing very clever in this, but if I can save a few minutes for each new installation, then great.

    https://github.com/fts-tmassey/tacticalrmm-cronbackup

    opened by fts-tmassey 20
  • On Clients - tacticalrmm - Not Installed

    On Clients - tacticalrmm - Not Installed

    On the clients tacticalrmm.exe reports:

    Agent : not installed Check Runner : Not Installed Salt minion : running Mesh Agent : running

    Tactical RMM website shows Agent Overdue.

    Build appeared to go normally just the agent won't run.

    Windows 10 - Two PC attempted.

    opened by KenGrant 20
  • Prevent notification while service is shutting down

    Prevent notification while service is shutting down

    Is your feature request related to a problem? Please describe. A clear and concise description of what the problem is. Ex. I'm always frustrated when [...]

    I'm always frustated when I receive a mail notification about a monitored service failing while the whole computer is shutting down.

    image

    Describe the solution you'd like A clear and concise description of what you want to happen.

    I'd like it to be ignored (or "passed") like the option we have for "start pending".

    image

    Describe alternatives you've considered A clear and concise description of any alternative solutions or features you've considered.

    Nothing.

    // BTW

    Thanks for your beautiful piece of software and happy new year !

    opened by Nyphew 0
  • Add 3FA support for MeshCentral

    Add 3FA support for MeshCentral

    Is your feature request related to a problem? Please describe. MeshCentral has a built-in 3FA feature that allows you to mask the web login behind a secure url token in the query string e.g. https://mesh.mymeshcentral.com/login?my-super-secret-url-token

    If the token is not entered correctly, then the MeshCentral login page returns a 404.

    I would like to see this feature enabled on TacticalRMM to enhance the security of the MeshCentral instance.

    Describe the solution you'd like In TacticalRMM, there should be an option to specify the token in Settings in the same section where you can specify your MeshCentral URL. Likewise, this option should be added as an environment variable in the Docker images.

    Describe alternatives you've considered I tried changing my MeshCentral URL in settings to include the token however due to the way TRMM processes its own requests it ends up appending multiple question marks in the query causing the query to fail. Therefore, TRMM would need to be refactored slightly to append the added query in a separate field using &

    Additional context IMO this is a "low hanging fruit" with a large payoff in terms of security. The MeshCentral console would be much more secure if it used a token to access the login page - in addition, this should not affect the TacticalRMM integration since the token gets added to the URL.

    Ylian gives a great demo of the feature here: https://www.youtube.com/watch?v=-WKY8Wy0Huk

    Here is the Settings Page where I think the option should be added:

    image

    Likewise, in Docker the environment variable can be something like this: MESH_3FA_TOKEN

    opened by joeldeteves 0
  • Changed to Backup

    Changed to Backup

    Added schedule and auto, basically --schedule will add a cron task at midnight to run and backup and then exit, --auto is whats ran by crontab and it backups up into folders and then is tidied automatically to keep the backups small. Also added downloading to /tmp/backup.sh before verifying some text is in the script and then replaces the script. The script will run as normal if not usign flags.

    Hopefully all of that is ok, have tested the script on my own server bit by bit and working fine, havent ran the whole server as not got mongod.

    opened by dinger1986 1
  • DLP (Data Leak Prevention) Features

    DLP (Data Leak Prevention) Features

    I was looking at open source DLP (Data Leak Prevention) software out there and found OpenDLP, looks interesting but it's a dead project, last update was around 2014. It scans filesystems using an agent for files containing clear text passwords, credit card numbers, etc. I guess it's only a few regex, then report on the files found.

    Could we give Tactical RMM the ability to scan files in selected folders (or even entire C:) for files that could have sensitive info? This would fall right into the DLP software market and I think could put Tactical on the map in terms of security features.

    Take a look at OpenDLP, maybe you could take some of the code?

    opened by luminous706 3
  • Add indicator showing the type of script: custom, community, WIP

    Add indicator showing the type of script: custom, community, WIP

    Is your feature request related to a problem? Please describe. When improving the community scripts, often times the process is to clone the script. TRMM will prepend "(Copy)" to the name but nothing else. It doesn't prevent you from naming the script the same as the community script.

    Describe the solution you'd like It would be nice if there was an indicator to show which scripts are "custom" and which ones are community driven. This could be accomplished by changing the font color or adding a small light (icon?) to indicate where the script came from.

    Describe alternatives you've considered Currently, I append "(Mine)" to the script name. I also make heavy use of the favorites.

    Additional context This screenshot shows the problem.

    image

    enhancement 
    opened by NiceGuyIT 8
Releases(v0.15.6)
  • v0.15.6(Dec 21, 2022)

    Release Notes

    • Added #1378 Users may now reset their own password/2fa without requiring any user permissions. A new interface has been added for this (top right of dashboard, click on username > Account)
    • Added shadows to web UI in dark mode
    • Fixed #1369 Editing API key results in 404 error
    • Fixed #1359 Path error when running scripts/commands on MS Exchange servers.
    • Fixed another path issue related to chocolatey not being found
    • Fixed #812 Ping check: A message sent on a datagram socket was larger than the internal message buffer
    • Various dependency updates

    https://user-images.githubusercontent.com/7434746/208993175-ccea0da5-3d34-4a42-98d5-f16517998f81.mp4

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.15.5...v0.15.6

    Source code(tar.gz)
    Source code(zip)
  • v0.15.5(Dec 8, 2022)

    Release notes

    • Fixed #1366 automated tasks not executing

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.15.4...v0.15.5

    Source code(tar.gz)
    Source code(zip)
  • v0.15.4(Dec 4, 2022)

    Release notes

    • Feature: added functionality to pass environment variables to scripts. This is a more secure way than command line args to pass sensitive info to scripts as it's not logged anywhere (for example, powershell logs the command line args in the windows event viewer even if they're not written to disk in your script). See video below for a tutorial on how to use them with various languages/OS. A new input field called "Environment vars" has been added to the web UI in all the places where you could add script args. This accepts a list of env vars in key=value format. Requires agent v2.4.3

    • https://user-images.githubusercontent.com/7434746/205523156-49ef521b-e1f8-4d74-a17f-36d72b9a1192.mp4

    • Fixed backup/restore when restore OS is not the same as backup OS

    • Alert failure and resolved script runs are now logged in the Agent History tab

    • Various dependency updates

    PR's

    • Fix wrong service name by @styx-tdo in https://github.com/amidaware/tacticalrmm/pull/1358

    New Contributors

    • @styx-tdo made their first contribution in https://github.com/amidaware/tacticalrmm/pull/1358

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.15.3...v0.15.4

    Source code(tar.gz)
    Source code(zip)
  • v0.15.3(Nov 13, 2022)

    Release notes

    • Added #1294 Ability to bulk delete using client and site
    • Fixed #1250 Race condition causing windows agent update to sometimes fail
    • Fixed #25 Cleanup agent update temp files
    • Fixed slow dashboard loading when lots of pending actions in db
    • Various dependency updates

    New Contributors

    • @Can-eh-dian11 made their first contribution in https://github.com/amidaware/tacticalrmm/pull/1294

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.15.2...v0.15.3

    Source code(tar.gz)
    Source code(zip)
  • v0.15.2(Oct 25, 2022)

    • Fixed macOS agent silent mesh install bug
    • UI bug fixes

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.15.1...v0.15.2

    Source code(tar.gz)
    Source code(zip)
  • v0.15.1(Oct 19, 2022)

    Release notes

    • Fixed #1293 Agent assigned Automation Policy - patch policy not used
    • Fixed #1298 Issues with improper escaping of certain characters in script snippets
    • Fixed #1210 Daphne websocket service sometimes failing to start
    • Fixed #1307 Harden cert file permissions
    • Fixed #1317 Quit early during install if error
    • Fixed #1314 URL color for the Microsoft Update KB link when in dark mode is very hard to read
    • Improved linux install script for better OS detection
    • Added optional setting to enable NATS monitoring
    • Various reworks and code optimizations
    • Updated to Python 3.10.8
    • Updated various dependencies

    PR's

    • typo by @silversword411 in https://github.com/amidaware/tacticalrmm/pull/1295
    • break from loop once a valid policy is found. remove old unused list by @af7567 in https://github.com/amidaware/tacticalrmm/pull/1301
    • Updating meshcentral's config casing to match upstreams json schema. by @stavros-k in https://github.com/amidaware/tacticalrmm/pull/1213
    • Update agent_linux.sh by @dinger1986 in https://github.com/amidaware/tacticalrmm/pull/1310
    • Update agent_linux.sh by @dinger1986 in https://github.com/amidaware/tacticalrmm/pull/1311

    New Contributors

    • @stavros-k made their first contribution in https://github.com/amidaware/tacticalrmm/pull/1213

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.15.0...v0.15.1

    Source code(tar.gz)
    Source code(zip)
  • v0.15.0(Sep 24, 2022)

    • Initial release of the macOS agent (beta, same functionality as the linux agent)
    • Fixed #1283 Bug with Block Policy Inhiretance from Agent
    • Windows agent no longer sets AV exclusions during install

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.14.8...v0.15.0

    Source code(tar.gz)
    Source code(zip)
  • v0.14.8(Sep 12, 2022)

    • Fixed a bug where enabling maintenance mode and assigning a policy via the agent's context menu wasn't working.
    • Fixed #1270 logic error in windows updates installation function causing some agents to skip installing pending updates. Thank you @af7567 for finding the bug and submitting the PR with the fix.
    • Updated agent to allow for setting custom environment variables in the process of commands and scripts (this will be exposed in the Web UI/API in a future release).
    • Updated nats-server to v2.9.0
    • Updated MeshCentral to 1.0.85
    • Updated various dependencies

    New Contributors

    • @af7567 made their first contribution in https://github.com/amidaware/tacticalrmm/pull/1277

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.14.7...v0.14.8

    Source code(tar.gz)
    Source code(zip)
  • v0.14.7(Aug 23, 2022)

    • Added #652 The following data from the 'Summary' tab is now filtered in the Search field of the agent table: version, OS string, public IP, cpu model, graphics card, local ips, make/model and disk info.
    • Added #1246 Added a Copy to Clipboard button for every entry under the 'Assets' tab
    • Fixed #1177 All checks for a client disappear
    • Fixed #1145 Limited User can See "Policy Overview" from all Clients/Sites
    • Fixed #1171 Policies marked as linux applying to windows when they're checks
    • Fixed #1191 Global automation polices aren't applied to Linux agents
    • Updated to Python 3.10.6
    • Updated MeshCentral to 1.0.72

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.14.6...v0.14.7

    Source code(tar.gz)
    Source code(zip)
  • v0.14.6(Aug 9, 2022)

    • Fixed #1238 Run as User permission issues with temp dir. Also standardized the temp directory used by the agent for various tasks (running scripts, agent updates etc), all files will now be created in %PROGRAMDATA%\TacticalRMM so please make sure to update your AV exclusions (C:\ProgramData\TacticalRMM\*).
    • Fixed #1239 Fixed agent update when SELinux is enforcing.
    • Fixed #1174 (again) Issues with Reboot Later.
    • Update to Django 4.1
    Source code(tar.gz)
    Source code(zip)
  • v0.14.5(Aug 1, 2022)

    0.14.5

    • Fixed Run As User not working for non-admin users (requires agent v2.2.1)

    0.14.4

    • Added Run As User support for all methods of running commands and scripts (requires agent v2.2.0 and only supported on Windows workstations SKUs, not Server). A "Run As User" checkbox is now available throughout the UI when running commands and scripts. To make a script always run as user, check the "Run As User" checkbox in the Script Editor. Doing so will override any of the ad hoc "Run As User" checkboxes throughout the UI and force that script to always run in the context of the logged in user (do this for script check or tasks that need to run as user). See video below for a quick example:

    https://user-images.githubusercontent.com/7434746/182259431-7a34158d-8d81-47e0-b17d-166349cf5934.mp4

    Source code(tar.gz)
    Source code(zip)
  • v0.14.4(Aug 1, 2022)

    • Added Run As User support for all methods of running commands and scripts (requires agent v2.2.0 and only supported on Windows workstations SKUs, not Server). A "Run As User" checkbox is now available throughout the UI when running commands and scripts. To make a script always run as user, check the "Run As User" checkbox in the Script Editor. Doing so will override any of the ad hoc "Run As User" checkboxes throughout the UI and force that script to always run in the context of the logged in user (do this for script check or tasks that need to run as user). See video below for a quick example:

    https://user-images.githubusercontent.com/7434746/182218118-e32e75e0-647c-49b3-b623-e91aa20df420.mp4

    Source code(tar.gz)
    Source code(zip)
  • v0.14.3(Jul 27, 2022)

    • Fixed #1174 Setting a date in the past for "Reboot Later" would cause the agent to crash.
    • Fixed #1189 When editing a task, UI was not populating with the original datetime of the task.
    • Fixed #1193 Windows update patch policy off by one day, causing patches to be installed a day late.
    • Fixed a bug affecting script checks part of an automation policy where the cache was not being invalidated after editing the contents of the script, causing the agent to run the old script.
    • Added #1224 Include latest agent version in monitoring API endpoint.
    • Update MeshCentral to 1.0.60
    • Added the Nginx reuseport socket option to help with instances with high agent counts.
    • Switched to official Nginx repos to update Nginx from 1.18 to 1.22. Note: when running the update script you will receive a prompt that looks like the text below. Make sure you choose the default action (just press Enter or type 'N') to keep your current version.
    Configuration file '/etc/nginx/nginx.conf'
     ==> Modified (by you or by a script) since installation.
     ==> Package distributor has shipped an updated version.
       What would you like to do about it ?  Your options are:
        Y or I  : install the package maintainer's version
        N or O  : keep your currently-installed version
          D     : show the differences between the versions
          Z     : start a shell to examine the situation
     The default action is to keep your current version.
    *** nginx.conf (Y/I/N/O/D/Z) [default=N] ?
    

    Note for those on Debian 10: the update script will fail and exit after trying to update nginx. Once it fails, please run the following and then run the update script again

    sudo apt --fix-broken install
    sudo apt upgrade
    

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.14.2...v0.14.3

    Source code(tar.gz)
    Source code(zip)
  • v0.14.2(Jul 10, 2022)

    Release v0.14.2

    • Increased Nginx limit on the maximum number of open files for worker processes. This solves various issues on instances with high agent counts.
    • Docker: removed unneeded compose port.

    Release v0.14.1

    • Fixed agent crash on Windows 7 /Server 2008 R2
    • Fixed Windows 11 showing as Windows 10 #892 #1075

    Release v0.14.0

    • Switched to NATS websocket for agent<->server communication. This removes the need to publicly expose port 4222 TCP and now the only open port needed is 443 TCP. You must leave port 4222 open though until all your agents are updated to v2.1.0 at which point you may close port 4222 in your firewall.

    • Note for those running UNSUPPORTED setups or proxies (HAProxy, NPM, Traefik, Kubernetes etc. Ignore this section if you are on a traditional or docker install): NATS still listens on 4222 (for internal communication between various trmm services) but now also listens internally on localhost:9235 (websocket protocol). Agent NATS traffic now connects to nginx public port 443 which is proxy passed to localhost:9235 so you will need to implement this manually in your proxy settings. You may refer to this commit to see how a supported nginx setup implements it (make sure to only proxy pass traffic that matches the pattern https://api.example.com/natsws). You must implement this in your custom proxy before upgrading to this release.

    • If for whatever reason you can't use NATS websocket or just want to keep things the way they were before this release, check out these docs on how to fall back to NATS standard.

    • Note for docker users: the docker-compose.yml file has changed this release so make sure to delete the old one and re-download the latest one (just copy paste from the docker update docs).

    • Added an API endpoint which can be called to monitor your TRMM instance's health, check docs for instructions.

    • Changed the uWSGI config to automatically scale workers based on load. Previously, the number of workers and threads was calculated based on number of cpu cores but required manual load testing to tune to optimal values. Now the workers will dynamically increase/decrease based on server load, which will solve issues with no workers being available during long running http requests and/or high number of requests per second caused by agents slamming the server.

    • Agent binaries now follow a consistent naming format tacticalagent-vX.X.X-os-arch to prepare for mac agent and any future agent OS that we will support.

    • Fixed a bug where orphaned tasks were not being removed.

    • Frontend code has been moved to its own repo and build tool has been switched to Vite instead of Webpack.

    • The frontend build is now compiled using github actions on every release and uploaded as a tarball to github releases. This removes the need to compile it during a trmm update which lately was using a ton of RAM and causing OOM errors and updates to fail. The update script now downloads this pre-compiled tarball.

    • Added a new find service management command.

    • Added a new method to bulk recover agents (Tools > Recover All Agents) which will restart both the tacticalagent and meshagent services across all machines, which helps when restoring.

    • Fixed an integer out of range error that would cause scripts or command results to not be saved in the database when return code value was greater than 2147483647.

    • Fixed #10 linux agent update doesn't work when /tmp is mounted on different filesystem.

    • Agent is now built with golang 1.18.3

    • Code refactoring and optimizations

    • Update MeshCentral to 1.0.43

    Source code(tar.gz)
    Source code(zip)
  • v0.14.1(Jul 8, 2022)

    Release v0.14.1

    • Fixed agent crash on Windows 7 /Server 2008 R2
    • Fixed Windows 11 showing as Windows 10 #892 #1075

    Release v0.14.0

    • Switched to NATS websocket for agent<->server communication. This removes the need to publicly expose port 4222 TCP and now the only open port needed is 443 TCP. You must leave port 4222 open though until all your agents are updated to v2.1.0 at which point you may close port 4222 in your firewall.
    • If you have more than a few hundred agents, you should increase nginx's open file limit as now each agent uses an additional nginx connection. You can do so by adding the following line to the top of /etc/nginx/nginx.conf
    worker_rlimit_nofile 1000000;
    
    • Note for those running UNSUPPORTED setups or proxies (HAProxy, NPM, Traefik, Kubernetes etc. Ignore this section if you are on a traditional or docker install): NATS still listens on 4222 (for internal communication between various trmm services) but now also listens internally on localhost:9235 (websocket protocol). Agent NATS traffic now connects to nginx public port 443 which is proxy passed to localhost:9235 so you will need to implement this manually in your proxy settings. You may refer to this commit to see how a supported nginx setup implements it (make sure to only proxy pass traffic that matches the pattern https://api.example.com/natsws). You must implement this in your custom proxy before upgrading to this release.

    • If for whatever reason you can't use NATS websocket or just want to keep things the way they were before this release, check out these docs on how to fall back to NATS standard.

    • Note for docker users: the docker-compose.yml file has changed this release so make sure to delete the old one and re-download the latest one (just copy paste from the docker update docs).

    • Added an API endpoint which can be called to monitor your TRMM instance's health, check docs for instructions.

    • Changed the uWSGI config to automatically scale workers based on load. Previously, the number of workers and threads was calculated based on number of cpu cores but required manual load testing to tune to optimal values. Now the workers will dynamically increase/decrease based on server load, which will solve issues with no workers being available during long running http requests and/or high number of requests per second caused by agents slamming the server.

    • Agent binaries now follow a consistent naming format tacticalagent-vX.X.X-os-arch to prepare for mac agent and any future agent OS that we will support.

    • Fixed a bug where orphaned tasks were not being removed.

    • Frontend code has been moved to its own repo and build tool has been switched to Vite instead of Webpack.

    • The frontend build is now compiled using github actions on every release and uploaded as a tarball to github releases. This removes the need to compile it during a trmm update which lately was using a ton of RAM and causing OOM errors and updates to fail. The update script now downloads this pre-compiled tarball.

    • Added a new find service management command.

    • Added a new method to bulk recover agents (Tools > Recover All Agents) which will restart both the tacticalagent and meshagent services across all machines, which helps when restoring.

    • Fixed an integer out of range error that would cause scripts or command results to not be saved in the database when return code value was greater than 2147483647.

    • Fixed #10 linux agent update doesn't work when /tmp is mounted on different filesystem.

    • Agent is now built with golang 1.18.3

    • Code refactoring and optimizations

    • Update MeshCentral to 1.0.43

    Source code(tar.gz)
    Source code(zip)
  • v0.14.0(Jul 7, 2022)

    • Switched to NATS websocket for agent<->server communication. This removes the need to publicly expose port 4222 TCP and now the only open port needed is 443 TCP. You must leave port 4222 open though until all your agents are updated to v2.1.0 at which point you may close port 4222 in your firewall.
    • If you have more than a few hundred agents, you should increase nginx's open file limit as now each agent uses an additional nginx connection. You can do so by adding the following line to the top of /etc/nginx/nginx.conf
    worker_rlimit_nofile 1000000;
    
    • Note for those running UNSUPPORTED setups or proxies (HAProxy, NPM, Traefik, Kubernetes etc. Ignore this section if you are on a traditional or docker install): NATS still listens on 4222 (for internal communication between various trmm services) but now also listens internally on localhost:9235 (websocket protocol). Agent NATS traffic now connects to nginx public port 443 which is proxy passed to localhost:9235 so you will need to implement this manually in your proxy settings. You may refer to this commit to see how a supported nginx setup implements it (make sure to only proxy pass traffic that matches the pattern https://api.example.com/natsws). You must implement this in your custom proxy before upgrading to this release.

    • If for whatever reason you can't use NATS websocket or just want to keep things the way they were before this release, check out these docs on how to fall back to NATS standard.

    • Note for docker users: the docker-compose.yml file has changed this release so make sure to delete the old one and re-download the latest one (just copy paste from the docker update docs).

    • Added an API endpoint which can be called to monitor your TRMM instance's health, check docs for instructions.

    • Changed the uWSGI config to automatically scale workers based on load. Previously, the number of workers and threads was calculated based on number of cpu cores but required manual load testing to tune to optimal values. Now the workers will dynamically increase/decrease based on server load, which will solve issues with no workers being available during long running http requests and/or high number of requests per second caused by agents slamming the server.

    • Agent binaries now follow a consistent naming format tacticalagent-vX.X.X-os-arch to prepare for mac agent and any future agent OS that we will support.

    • Fixed a bug where orphaned tasks were not being removed.

    • Frontend code has been moved to its own repo and build tool has been switched to Vite instead of Webpack.

    • The frontend build is now compiled using github actions on every release and uploaded as a tarball to github releases. This removes the need to compile it during a trmm update which lately was using a ton of RAM and causing OOM errors and updates to fail. The update script now downloads this pre-compiled tarball.

    • Added a new find service management command.

    • Added a new method to bulk recover agents (Tools > Recover All Agents) which will restart both the tacticalagent and meshagent services across all machines, which helps when restoring.

    • Fixed an integer out of range error that would cause scripts or command results to not be saved in the database when return code value was greater than 2147483647.

    • Fixed #10 linux agent update doesn't work when /tmp is mounted on different filesystem.

    • Agent is now built with golang 1.18.3

    • Code refactoring and optimizations

    • Update MeshCentral to 1.0.43

    Source code(tar.gz)
    Source code(zip)
  • v0.13.4(May 15, 2022)

    Changelog

    • More DB/API optimizations
    • Fixed #1020 Disable auto quoting when using variable substitution on batch scripts
    • Fixed #1097 Task Run does not show name in Script/Command column under History tab
    • Fixed #1110 Quirks with clicking links in notifications
    • Fixed #1118 Sites not sorting alphabetically
    • Fixed #8 reboot required logic on RHEL based systems
    • Fixed file extension when downloading shell scripts from Script Editor UI
    • Fixed install script on Linux Mint
    • Fixed check policy copy issue where copied checks are all of type diskspace
    • Update to Python 3.10.4
    • Update to MeshCentral 1.0.22

    PR's

    • Typescript prep and add some linting by @sadnub in https://github.com/amidaware/tacticalrmm/pull/1102
    • typo fix by @silversword411 in https://github.com/amidaware/tacticalrmm/pull/1127

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.13.3...v0.13.4

    Source code(tar.gz)
    Source code(zip)
  • v0.13.3(Apr 25, 2022)

    More fixes for bugs introduced in v0.13.0

    • Fixed variable substitution in policy script checks not working
    • Fixed #1093 PERSISTENT_MESH_CONFIG=1 not working in Docker

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.13.2...v0.13.3

    Source code(tar.gz)
    Source code(zip)
  • v0.13.2(Apr 25, 2022)

    More fixes for bugs introduced in v0.13.0

    • Fixed variable substitution in automated policy tasks not working
    • Fixed #1092 Default tabs not loading correctly
    • More slow query optimization

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.13.1...v0.13.2

    Source code(tar.gz)
    Source code(zip)
  • v0.13.1(Apr 23, 2022)

    This release fixes a few bugs introduced in v0.13.0

    • Fixed clients tree not sorting alphabetically
    • Fixed agent always showing a pending agent update action, even after it had already successfully updated
    • Fixed sorting by last response column in agent table
    • Fixed 'Save and test email' always reporting as success even when it failed
    • Fixed issue with custom field names being truncated when upgrading from Django 3 to 4
    • Fixed Docker redis container

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.13.0...v0.13.1

    Source code(tar.gz)
    Source code(zip)
  • v0.13.0(Apr 22, 2022)

    - NOTE: For those upgrading from a previous version, this update might take a while to complete especially during the "running migrations" and "post update tasks" part of the upgrade script, so just be patient and let it finish.

    • Policy and Alerts major rework to rely less on celery and resolve extremely high cpu usage

    • Added redis based caching of expensive queries and also optimized sql queries to significantly speed up UI loading times

    • Fixed countless bugs related to alerts not sending and policies/alert severity levels not displaying/applying correctly. Note: if you still experience issues after updating, please delete and recreate your automation policies and alert templates and you must be able to reproduce the issue with a fresh policy before opening up a bug report.

    • Django major version upgrade from 3 to 4

    • Added #1007 Ability to specify date/time format in UI. This can be set with the new "Default date format" field in Settings > Global Settings > General. This will also fix time zone display issues since the time zone is now determined by the browser's time zone (fixes #756)

    • Added #958 Allow canceling other pending actions

    • Added #1068 Make the site dropdown filterable in the Agent Deployment modal

    • Added #1070 Add --no-progress to choco to suppress unnecessary output

    • Added #1066 Sort by category

    • Added #827 Add Client and Site columns to the Audit Log

    • Added a "Run Checks Now" button to the Checks tab (same functionality as right clicking an agent > Run Checks)

    • Fixed #1028 Make agent count take permissions into account

    • Fixed #1000 Automated script task name not showing in the History tab

    • Fixed #969 Tasks set in the past should run at first opportunity

    • Added an option in global settings to disable MeshCentral iframe auto login

    • Added #1009 Set mesh alias port to fix chat when running behind something like HAProxy

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.12.4...v0.13.0

    Source code(tar.gz)
    Source code(zip)
  • v0.12.4(Apr 12, 2022)

  • v0.12.3(Apr 11, 2022)

    • Fixed an issue with MeshCentral integration when using a mesh username that is not all lowercase
    • Added #1049 make postgres ssl mode configurable by the user

    Known issues (only affects docker installs): #1062. If you are running a docker install, do NOT upgrade to this version. Stay on 0.12.2 until this is resolved in a future release. Standard installs are not affected and can be safely upgraded.

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.12.2...v0.12.3

    Source code(tar.gz)
    Source code(zip)
  • v0.12.2(Apr 5, 2022)

    • Fixed #1 Linux agent goes offline
    • Added NATS permissions
    • Updated an agent endpoint's payload in preparation for a future release
    • Updated uwsgi config
    • Updated MeshCentral to v1.0.2
    Source code(tar.gz)
    Source code(zip)
  • v0.12.1(Mar 25, 2022)

    • Fixed #1015 and #1017 linux agent fails to install when /tmp is locked down (like cpanel)
    • Fixed #1013 Double-click remote background action not setting correct tabs for windows agents
    • Remove DOS carriage returns when running scripts on linux agent (was preventing the shebang from being properly read)
    • Set locale during linux mesh agent install to fix mesh install errors
    • Added --debug flag to linux agent install script

    Added a troubleshooting script for meshcentral integration errors:

    Standard Install:

    /rmm/api/env/bin/python /rmm/api/tacticalrmm/manage.py check_mesh
    

    Docker Install:

    sudo docker-compose exec tactical-backend python manage.py check_mesh
    

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.12.0...v0.12.1

    Source code(tar.gz)
    Source code(zip)
  • v0.12.0(Mar 19, 2022)

    • Added linux agent. Still in beta for now, not all features are implemented. Compiled binaries are available for sponsors with a valid code signing token. Everyone else will need to compile the agent from source. Binaries will be made available for everyone once agent is out of beta.

    • Agent repo has moved to rmmagent and source code is now available.

    • Windows agent no longer uses NSSM and there is only 1 windows service now, down from 2 (service name is now tacticalrmm. tacticalagent and tacticalrpc have been removed).

    • Windows agent installer no longer creates desktop or start menu shortcuts.

    • Removed the need to manually upload and manage mesh agents. They are now dynamically generated using meshcentral's api. Added a new setting in Global Settings > MeshCentral to specify the meshcentral device group name for those that are not using the default device group name that tactical sets up during install.

    • Docker now uses non-root containers. Special thanks to @joeldeteves for making this happen.

    • Community scripts have been moved to the community-scripts repo.

    • Code signing servers are now load balanced behind https://agents.tacticalrmm.com

    • Upgraded to python 3.10.2, node 16 and postgresql 14 (upgrade to postgres 14 is not automatic, only for fresh installs. Postgres 14 is not mandatory but you should eventually look into how to upgrade to it. An easy way is to use our backup/restore script onto a new vm. Or simply dump existing database, remove postgres 13, install postgres 14 and restore db.)

    • Added #147 Meshagents are now removed from meshcentral's UI/db during tacticalagent uninstall

    • Added #819 Added a new tab to the 'Edit Agent' modal where you can see a summary of applied policies, applied alert templates and the effective patch policy

    • Added #795 Scripts can now be hidden

    • Added #827 Added client and site columns to the audit log

    • Fixed #957 Scripts with active tasks and checks could be deleted

    • Fixed #912 History doesn't sort correctly - ignores year

    • Fixed #859 Agent history tab > search not matching items

    What's Changed

    • docs - adding to how it all works by @silversword411 in https://github.com/amidaware/tacticalrmm/pull/935
    • Add files via upload by @iamkhris in https://github.com/amidaware/tacticalrmm/pull/938
    • fixed tooltip error by @Yamacore in https://github.com/amidaware/tacticalrmm/pull/940
    • docs - docker backup options by @silversword411 in https://github.com/amidaware/tacticalrmm/pull/941
    • docs - api examples and more by @silversword411 in https://github.com/amidaware/tacticalrmm/pull/944
    • docs - enable keys and FAQ tweaks by @silversword411 in https://github.com/amidaware/tacticalrmm/pull/945
    • docs - api example fix thx bc24fl by @silversword411 in https://github.com/amidaware/tacticalrmm/pull/948
    • Adding all services to troubleshooting_server.sh and docs additions by @silversword411 in https://github.com/amidaware/tacticalrmm/pull/951
    • Non root containers by @joeldeteves in https://github.com/amidaware/tacticalrmm/pull/939
    • Commenting scripts by @silversword411 in https://github.com/amidaware/tacticalrmm/pull/1004

    Full Changelog: https://github.com/amidaware/tacticalrmm/compare/v0.11.3...v0.12.0

    Source code(tar.gz)
    Source code(zip)
  • v0.11.3(Jan 14, 2022)

  • v0.11.2(Jan 13, 2022)

  • v0.11.1(Jan 13, 2022)

  • v0.11.0(Jan 13, 2022)

    • The task scheduler has been reworked to include many more scheduling options. Commands can now be scheduled as tasks in addition to scripts. Scripts and commands can now be chained in specific orders as part of the task. This rework implements the following feature requests: #513, #451, #363 and #167
    • NOTE: The task rework requires agent v1.8.0 and existing tasks will not execute properly until the agent is updated. Attempting to edit existing tasks that were using the old 'scheduled' option might not edit properly and might need to be re-created. Other scheduled types (runonce, check failure, manual) should not be affected.
    • Added a new view for an agent detail page and also added popout button to agent summary tab, implements #332
    • Added a Take Control button and the agent's context menu to the summary tab
    • Reworked how clients/sites are loaded on initial dashboard load to speed up loading times
    • Fixed #895 export to csv button doesn't work
    • Fixed #874 can't search for scripts in Add script check modal
    • Fixed #888 nginx config updates for older installs
    • Fixed agent not always uninstalling (for reals this time) requires agent v1.8.0

    What's Changed

    • docs - nginx proxy info by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/852
    • Vulnerability fix by @d4-maertzdorf in https://github.com/wh1te909/tacticalrmm/pull/853
    • Added Sophos Endpoint Install Community Script by @bc24fl in https://github.com/wh1te909/tacticalrmm/pull/856
    • docs - howitallworks nats server service by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/860
    • Added Printer Restart Jobs Community Script by @bc24fl in https://github.com/wh1te909/tacticalrmm/pull/861
    • docs - updating index by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/862
    • docs faq log4j by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/863
    • docs: gpo script update and wip script for api example by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/866
    • docs - 3rd party Screenconnect AIO, update video, cron backups, sys reqs. Script update windows update settings removal by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/871
    • Fixes #872: backup.sh does not have EOL by @NiceGuyIT in https://github.com/wh1te909/tacticalrmm/pull/873
    • docs - mesh download multiple by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/875
    • docs - backup and silent uninstall tweaks by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/878
    • Change timeout method by @diskraider in https://github.com/wh1te909/tacticalrmm/pull/881
    • added script to get securepoint deviceid by @MalteKiefer in https://github.com/wh1te909/tacticalrmm/pull/884
    • script_wip - admin LAPS script by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/886
    • docs - sc and install server, and script_wip by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/887
    • docs - av exclusions by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/889
    • docs - link add by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/890
    • added script for lenovo driver updates by @MalteKiefer in https://github.com/wh1te909/tacticalrmm/pull/894
    • docs - enable swagger by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/901
    • Replace hardcoded services & DNS resolvers in NGINX config with variables by @joeldeteves in https://github.com/wh1te909/tacticalrmm/pull/905
    • docs - nats-api update by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/904
    • Make cert pub & private paths configurable by @joeldeteves in https://github.com/wh1te909/tacticalrmm/pull/907
    • Docs - update faq and mesh agent recovery by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/908
    • Update get_mesh_exe_url command to use MESH_WS_URL for docker by @joeldeteves in https://github.com/wh1te909/tacticalrmm/pull/909
    • Add option to enable webSocketMaskOverride in MeshCentral config by @joeldeteves in https://github.com/wh1te909/tacticalrmm/pull/911
    • docs - script temp, support, updating script run info, mesh agent blank data by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/910
    • Replace inotify with custom config watcher script by @joeldeteves in https://github.com/wh1te909/tacticalrmm/pull/920
    • docs - sophos and index update by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/921
    • docs - docker 2fa reset by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/923
    • Make Mesh SMTP settings configurable by @joeldeteves in https://github.com/wh1te909/tacticalrmm/pull/924
    • Get Anydesk ID for licensed or unlicensed installs. by @yaroz in https://github.com/wh1te909/tacticalrmm/pull/925
    • docs - av and faq additions by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/927
    • Add files via upload by @iamkhris in https://github.com/wh1te909/tacticalrmm/pull/929
    • docs - av eset by @silversword411 in https://github.com/wh1te909/tacticalrmm/pull/930

    New Contributors

    • @d4-maertzdorf made their first contribution in https://github.com/wh1te909/tacticalrmm/pull/853
    • @diskraider made their first contribution in https://github.com/wh1te909/tacticalrmm/pull/881
    • @MalteKiefer made their first contribution in https://github.com/wh1te909/tacticalrmm/pull/884
    • @joeldeteves made their first contribution in https://github.com/wh1te909/tacticalrmm/pull/905
    • @yaroz made their first contribution in https://github.com/wh1te909/tacticalrmm/pull/925
    • @iamkhris made their first contribution in https://github.com/wh1te909/tacticalrmm/pull/929

    Full Changelog: https://github.com/wh1te909/tacticalrmm/compare/v0.10.5...v0.11.0

    Source code(tar.gz)
    Source code(zip)
    SHA256SUMS(752 bytes)
Owner
Dan
System Administrator at NASA JPL
Dan
Django app that enables staff to log in as other users using their own credentials.

Impostor Impostor is a Django application which allows staff members to login as a different user by using their own username and password. Login Logg

Andreu Vallbona Plazas 144 Dec 13, 2022
django-admin fixture generator command

Mockango for short mockango is django fixture generator command which help you have data without pain for test development requirements pip install dj

Ilia Rastkhadiv 14 Oct 29, 2022
A Django admin theme using Twitter Bootstrap. It doesn't need any kind of modification on your side, just add it to the installed apps.

django-admin-bootstrapped A Django admin theme using Bootstrap. It doesn't need any kind of modification on your side, just add it to the installed ap

1.6k Dec 28, 2022
An improved django-admin-tools dashboard for Django projects

django-fluent-dashboard The fluent_dashboard module offers a custom admin dashboard, built on top of django-admin-tools (docs). The django-admin-tools

django-fluent 326 Nov 09, 2022
aiohttp admin is generator for admin interface based on aiohttp

aiohttp admin is generator for admin interface based on aiohttp

Mykhailo Havelia 17 Nov 16, 2022
Code to reproduce experiments in the paper "Task-Oriented Dialogue as Dataflow Synthesis" (TACL 2020).

Code to reproduce experiments in the paper "Task-Oriented Dialogue as Dataflow Synthesis" (TACL 2020).

Microsoft 274 Dec 28, 2022
📱 An extension for Django admin that makes interface mobile-friendly. Merged into Django 2.0

Django Flat Responsive django-flat-responsive is included as part of Django from version 2.0! 🎉 Use this app if your project is powered by an older D

elky 248 Sep 02, 2022
Material design for django administration

Django Material Administration Quick start pip install django-material-admin Add material.admin and material.admin.default to your INSTALLED_APPS sett

Anton 279 Jan 05, 2023
DyStyle: Dynamic Neural Network for Multi-Attribute-Conditioned Style Editing

DyStyle: Dynamic Neural Network for Multi-Attribute-Conditioned Style Editing

74 Dec 03, 2022
:honey_pot: A fake Django admin login screen page.

django-admin-honeypot django-admin-honeypot is a fake Django admin login screen to log and notify admins of attempted unauthorized access. This app wa

Derek Payton 907 Dec 31, 2022
EOD (Easy and Efficient Object Detection) is a general object detection model production framework.

EOD (Easy and Efficient Object Detection) is a general object detection model production framework.

383 Jan 07, 2023
Jinja is a fast, expressive, extensible templating engine.

Jinja is a fast, expressive, extensible templating engine. Special placeholders in the template allow writing code similar to Python syntax.

The Pallets Projects 9k Jan 04, 2023
With Django Hijack, admins can log in and work on behalf of other users without having to know their credentials.

Django Hijack With Django Hijack, admins can log in and work on behalf of other users without having to know their credentials. Docs 3.x docs are avai

1.2k Jan 02, 2023
Modern theme for Django admin interface

Django Suit Modern theme for Django admin interface. Django Suit is alternative theme/skin/extension for Django administration interface. Project home

Kaspars Sprogis 2.2k Dec 29, 2022
A high-level app and dashboarding solution for Python

Panel provides tools for easily composing widgets, plots, tables, and other viewable objects and controls into custom analysis tools, apps, and dashboards.

HoloViz 2.5k Jan 03, 2023
An administration website for Django

yawd-admin, a django administration website yawd-admin now has a live demo at http://yawd-admin.yawd.eu/. Use demo / demo as username & passowrd. yawd

Pantelis Petridis 140 Oct 30, 2021
GFPGAN is a blind face restoration algorithm towards real-world face images.

GFPGAN is a blind face restoration algorithm towards real-world face images.

Applied Research Center (ARC), Tencent PCG 25.6k Jan 04, 2023
Real-time monitor and web admin for Celery distributed task queue

Flower Flower is a web based tool for monitoring and administrating Celery clusters. Features Real-time monitoring using Celery Events Task progress a

Mher Movsisyan 5.5k Dec 28, 2022
django's default admin interface made customizable. popup windows replaced by modals. :mage: :zap:

django-admin-interface django-admin-interface is a modern responsive flat admin interface customizable by the admin itself. Features Beautiful default

Fabio Caccamo 1.3k Dec 31, 2022
fastapi-admin is a fast admin dashboard based on FastAPI and TortoiseORM with tabler ui, inspired by Django admin.

fastapi-admin is a fast admin dashboard based on FastAPI and TortoiseORM with tabler ui, inspired by Django admin.

fastapi-admin 1.6k Dec 30, 2022