Page tree

Versions Compared


  • This line was added.
  • This line was removed.
  • Formatting was changed.


Table of Contents

Basic features


Features not supported on Linux OS are clearly indicated with this logo: 



Supported Devices - Native

  • PC, Thin clients, Tablets, laptops, POS, kiosks, digital signage, intelligent systems (IoT)
  • Embeded devices (black boxes, embedded PCs etc…)
  • Attached peripherals (depending on the peripheral - integration work may be needed)

Supported Devices - with custom integration

  • Peripherals or specific features (IoT): humidity sensor, accelerometer etc…

Interface with the IT systems

  • interface with the Ticketing systems (through email inbounds format) or through a custom API (This can be done with specific custom development)

Supported client OS

  • Windows: XP, 7, 8, 10 (embedded or not so including POS ready)
  • Linux (Ubuntu version 18.04 and above, Mac OS) , Other Linux OS support can be added with on demand (centos, redhat, Fedora,  etc…)
  • Raspbian
  • Android (expected 2022)
  • iOS (expected 2022)

Architecture - communication and Security




  • Windows: .Net framework 2.0 for old OS (XP); .Net framwork 4.6 (win7 and above);
  • Linux: .Net Core 3.1 (Linux and Mac OS)
  • RAM Load: 7 to 25MB
  • Pulse: a few kb
  • Pulse frequency: configurable but the broker MQTT allows immediate pulse so pulse can be set at 1 hour or more without any impact of the reactivity (30 seconds)
  • Remote Update
  • Native management of the Windows write filters (for embedded OS including IoT)

Server (Manager)

  • Supported OS: Windows 2012 R2 and above
  • VM supported
  • .Net framework 4.6
  • MS IIS 7  and above (Internet Information service)
  • Data Base : Microsoft SQL server
  • Hosting: SaaS or On premise
  • Supported languages: French and English (possible other languages on demand)
  • Web based system


  • single direction from agent to server (no port in listening mode on the end point)
  • Communication protocol: https
  • MQTT for the pulse on demand
  • See attached graph (on prem, all ports can be configured)


  • SSL certificate authentification (agent server)
  • Self signed certificated supported but not recommanded. Note that the Remote control is impossible when using a self signed certificate
  • TLS1.2 between agent and server when using the .Net 4.6 and .Net Core agents. Not superted with .Net 2.0 agents for XP.

Device lock-down  

  • Centralised critical features lock-down through proVlocker (restrict access to specific apps, to control pannels, etc...)
  • Restrict access to specified disks and partitions
  • Very simple lock-down solution, without the need for active directory and complex GPO scripting)
  • Lock USB ports or restrict access to mass-storage devices (or only allows read-only)


  • Local accounts
  • Active Directory


  • Inventory information can vary between Windows and Linux OS
  • Inventory frequency can be set (once per day, per week, per month or per year)
  • Automatic inventory collection and storing into the SQL server
  • Inventory can be checked at any time even when the device is offline or switched OFF



Hardware Inventory 

  • HDD (total size, free size, manufacturer, model, SMART status, serial number)
  • RAM (total size, free size, type, no. of slots)
  • Partition (letter name, volume name, total size, free size, file system)
  • Bios (serial number, manufacturer, model, version, date)
  • Motherboard (manufacturer, model, serial number)
  • Network cards (name, Mac address)
  • Processor (type, speed, no. of cores)
  • Video card (name, chipset, memory, resolution)
  • Monitor (serial number, description, legend, type)
  • Sound devices (manufacturer, name, description)
  • Port connector (type, interface)
  • Controlers (manufacturer, caption, description, Name)
  • Peripherals (opos: name, port used , driver, status)

Software Inventory

  • OS Name
  • Service Packs
  • OS Fixes (installed KB) - Patch assessment
  • OS ID
  • Installed applications (Name, Publisher, install date, version)

System Inventory

  • Host name
  • IP address
  • Process
  • Services
  • Last contact to the server

Custom Inventory 

  • Get specific information through the dynamic tags (e.g. battery level, a peripheral status, an accelerometer value, a powershell script value or any command result, the content of a file, a registry key presence or value etc…)




Grouping / device organisation

  • Static groups (drag and drop manually)
  • 7 levels of subgroups
  • Organisational Units collected from the AD
  • Dynamic groups (based on the selected inventory value: manufacturer, processor type, processor core number, OS type, OS architecture, presence of an application, custom script or WMI command result etc…)




Remote tasks

  • Software distribution (install or remove applications)
  • Install complex packages built with package builder (pre and post install scripts etc…etc.…)
  • Task planning (specific date and time, recurence etc…recurrence etc.…)
  • CRON task planingplanning
  • Execution of commands (custom or in the command list)
  • Complete OS management: change registry keys, start and stop services, create partitions, launch commands or scripts, launch or kill applications (through execution of a command for Linux OS)
  • complete device configuration: keyboard, mouse, display, network, proxy, NTP, time zone, hostname, domain, environment variables (through execution of a command for Linux OS)
  • Device security configuration: Windows account, pasword password changes, USB lock down, certificate deployment deployment (through execution of a command for Linux OS)
  • Device interaction: send popup messages, request remote authorization from POS user; auto launch application (full screen, replace shell etc..), launch commands, switch screen ON or OFF, reboot or restart device, turn OFF or turn ON (via WoL) (through execution of a command for Linux OS)
  • Install apps (slient silent mode or not, via our package builder), remove apps, deploy files (any file or script anywhere in the remote device) retreive retrieve files (log files or standard files)
  • All commands executed silently and with admin rights

File transfer

  • Direct with https
  • Transfer possible in both ways (push / pull)


Automatic incident detection and resolution



Monitoring: Automatic incident detection

  • Hardware alerts (temperature, HD SMART status etc…)
  • Software alerts (process, services etc…)
  • System alerts (registry key change or existance etc..)
  • Security alerts (antivirus, firewall,  etc…)
  • Health alerts (RAM overconsumption, CPU overload, low free space on disk)
  • Custom alerts (on a script result or WMI command for example)
  • Custom alters based on plugins (fan speed, voltage drops, humidity sensor, accelerometer etc...)

Alerts type

  • Email
  • Dashboard visualization

Monitoring: Automatic incident resolution (preventive maintenance)

  • Automatic corrective task execution (no need for human intervention)
  • Remediation tasks customizable (restart or kill process or service, clean temp files, backup launched based on an event, reactivate firewall, etc...)
  • No trafic with the console. The agent automatically runs the maintenance task that has been pre-loaded with the monitoring rule
  • Drastic decrease of level 1 supports (thousands of calls avoided)
  • Very quick ROI
  • Stop unwanted processes
  • Delete unwanted files (AVI or mpeg files in a specific folder for example)

Peripheral status monitoring

  • Printers, cash drawer, line display etc.. (natively or by custom development)

Online / offline Monitoring



Online - offline end point alerting

  • Automatic alerts when an end point is offline
  • Alert generated for defined time within a specific time frame
  • Time frame specification customizable for each day of the week

Alerts type

  • Email


  • Compliance criterias may vary between Windows and Linux OS



Compliance checking principle

  • Create and customize compliance profiles (hardware, sofware, system)
  • Check and follow compliance of the end points in realtime
  • Get global compliance on the dashboard

Hardware compliance

  • Computer (manufacturer, model, serial number)
  • Bios (date, manufacturer, model, serial number, version)
  • Mother board (manufacturer, model, serial number)
  • Processor (architecture, cores quandtity, frequency, manufacturer, model)

Hard Disk and cards compliance

  • Network (adapter name, dhcp, dns, dns auto, domain, gateway, IP status, Mac address, NetMask, network address, secondary DNS, setting ID, speed)
  • Memory (RAM total size, ram size, ram type)
  • Disk (description, manufacturer, model, name, size, status, type, total size)
  • Partition (file system, free space, letter, size, type, volume name)
  • Video card (chipset, memory, model, resolution Serial number)

Peripherals compliance

  • Monitor (build date, description, type)
  • Pointing device (description, interface, manufacturer, model, type)
  • Keyboard (caption, description, type)
  • Printer (driver, model, port, ready)
  • Sound device (manufacturer, model)

Software and operating system compliance

  • installed applications (date, description, name, publisher, version)
  • Installed QFEs (description, hotfix number, installed by, installed date) - patch assessment
  • Operating system (architecture, build number, information, name, product identifier)
  • Device security (antispyware, antivirus, auto-update, firewall, internet settings, UAC control)

Manager Configuration compliance

  • Device group (static group)
  • Monitoring rule (monitoring rules and incidents)
  • Static and automatic tags values (all tags values and contents)

Automatic configuration (Staging)



Automatic policies / automatic configuration principle

  • Automatic configuration of the device based on defined criteria
  • Help for deployment of the devices, reduce configuration errors, increase deployment efficiency
  • Drastically reduce logistics costs
  • Automatic staging
  • Guarantees compliance of the device (erases any customisation mistakes)

Automatic policies options

  • If a device joins a group then: play a predefined task (refer to "remote tasks" section in this document) or apply a monitoring rule (refer to "monitoring" in this document)
  • If an inventory data of the device is equal or contains, does not contain, different from, starts with, does not start with, ends with or does not end with, then: move into a group or  play a predefined task (refer to "remote tasks" section in this document) or apply a monitoring rule (refer to "monitoring" in this document)
  • Automatic policies can also be applied as soon as a device is enrolled (zero touch configuration)

Health and Security



Health & security principle

  • All status are updated in real time
  • All information gets stored on the server so it is available even for offline devices

Device Health

  • Used disk space
  • Average CPU consumption
  • Average RAM consumption

Device Security

  • Antispyware status
  • Antivirus status
  • Auto-update status
  • Firewall status
  • Internet settings status
  • UAC control status

Remote Control



Remote session control

  • Based on Ultra VNC
  • Reverse process (no need to have a listening port open)
  • Secure SSL stream from device to server
  • Secure websocket from admin console to the server
  • Complete control over the session routing - routing of the session is done through the proVconnect server (no external server used for routing the session like in products such as Teamviewer)
  • direct RDP connection
  • direct Teamviewer connection
  • Remote secure shell - SSH

Remote Wake-on-Lan (WoL)



Wake up remote devices
  • Direct wake-up of the endpoints if the proVconnect server is on the same LAN
  • Wake up of endpoints located on a remote LAN by using an endpoint online on the remote LAN to wake up all other devices on the same LAN
  • Need to activate the WoL in the BIOS of the endpoints to be woken up

Patch Management (coming soon)



Operating Systems Patch Management

  • Full patch availability listing
  • Patch severity classification
  • Patch history
  • Identification of the missing patches
  • Identification of the critical updates
  • Easy to understand dashboard

Windows Firewall Management (coming soon)



Full Windows Firewall Configuration

  • Create new firewall rules
  • Duplicate rules from one device to another
  • Delete firewall rules
  • Activate or disable rules
  • Full ports control (open and close)
  • Prevent or authorize specific apps from opening ports 
  • Manage protocols




Reporting and data exports

  • Reporting on all inventory data and task results (deployment, task results etc..)
  • Any inventory data can be displayed on the main console full customization
  • Reporting formats (CSV, Jason, XML, Webservices)

Plugins extensions



Plugin design and developments

  • Plugin development for custom feature
  • Based on API or SDK, possibility to develop additionnal monitoring features (accelerometer, special electronic card data, humidity sensor, paper presence in printer, voltage drops, raid controlers, etc…)
  • Our development team will develop plugins based on specifications





  • Very network bandwidth efficient (pulse on demand) MQTT broker allows the trigger of the pulse on demand and therefore to set the default pulse with long delays and therefore drastically low default network load.
  • Possibility to control the bandwidth used during a deployment (QoS)
  • Supports management of 20 000+ devices
  • Modular solution (through plugins)
  • Plug & play: very simple to use, very low training required
  • Very reactive software vendor (we can develop a specific plugin in a few weeks and we can assist the customer in creating scripts or collecting specific data for reporting)
  • Multi-user access to the console (with different level of administrator rights on features and on groups of devices)
  • Application evaluated by ANSSI (French National agency for security of the information systems) in the context of the development of a cybersecurity product based on proVconnect with Thales
  • Very clear roadmap: patch management, remote imaging, security audit (open ports, TLS1.2, admin rights);
  • Complete ownership of the source codes by WanPulse