Contact Us
If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.
drivera@cyberfox.com
Article
Last Month
In some cases, User Account Control (UAC) prompts may appear with the username field already populated, rather than displaying the standard UAC prompt. This behavior typically indicates that the user, or a group the user belongs to, is a member of one of the following Windows groups: Backup Operators Cryptographic Operators Network Configurati
AutoElevate's Blocker feature gives you the ability to block 200+ native Windows applications, binaries, and .dll files that are typically used as Living off the Land (LOTL) attack vectors. Fileless malware, malware-free, or Living Off The Land refer to cyberattack techniques where the cybercriminal uses native, legitimate tools within the victim’s
Rules defined within the system are securely encrypted and stored in a protected section of the registry during each check-in. These rules continue to function reliably, even in the absence of internet connectivity or access to our services. For situations where no specific rule exists, we default to a position of enhanced security, allowing the Use
This issue is likely caused by a Windows bug that causes conflicting registry keys within the UAC. To resolve the issue, follow these steps: Go to the Computers screen of the AE admin portal. Select one of the machines that are experiencing the issue by checking the checkbox. From the Actions menu, set the UAC setting to Maximum. Wait 10 min
Starting from version 2.10, the AutoElevate agent now includes a LastCheckedInAt date and time value in ISO 8601 format. This value is reported in the Windows Registry, making it easier to monitor agent activity and verify the last successful check-in. This feature is particularly useful for creating queries and scripts in Remote Monitoring and Mana
When the end user has made a request and the timer expires, an additional dialog box will appear that states that the technician is evaluating the request, a ticket has been opened, and that they will be notified as soon as a technician responds. When a technician does respond, a new notification appears for the user telling them their request ha
When users attempt to delete specific desktop shortcuts, UAC prompts may appear. This occurs because these shortcuts are located in the C:\Users\Public\Public Desktop folder. By default, this folder grants the "Interactive" user Read & Execute/List/Read NTFS permissions but lacks 'Modify' or 'Write' permissions. This limitation prevents standard
The Agent’s Windows Event Logs are provided to give you visibility into what the AutoElevate Agent observes and how it operates on the system. They can be ingested by a SIEM or syslog service to better automate events happening within AutoElevate. This feature can be enabled or disabled in the Admin Portal settings. Some of the events do contain
Blocker has been designed to counteract potential threats from malicious actors or activities that exploit native programs within your network. With the capability to block over 200 native Windows applications, binaries, and .dll files commonly leveraged as Living off the Land (LOTL) attack vectors, Blocker serves as a defense mechanism against thes
Enable macOS Support in the portal first Navigate to the Settings screen in the Admin portal. Locate the "macOS Support" option in the Settings grid. Select Enable, then confirm the action. PKG Agent File You can download the PKG file, access your license key, and adjust other settings by clicking on the “Settings” tab under General Info -> M
AutoElevate is comprised of 4 basic components: Agents - Installed on each managed workstation, the Agent monitors UAC prompts and facilitates elevation workflows. AutoElevate Notification Server - Acts as the central hub, routing elevation requests between Agents and technician devices. Web Admin Portal - Console where MSPs can log in to control
Simplifying QuickBooks Updates with AutoElevate: We are aware of a limitation in QuickBooks' design: it does not prompt for User Account Control (UAC) when launched by standard users. As a result, when standard users need to update QuickBooks, they must manually right-click the application and select "Run as Administrator". This action triggers UAC
No. You can have as many technicians using AutoElevate as you need—there’s no additional cost for adding more. Your monthly billing is based solely on the number of active agents installed and registered on client machines. This means you can scale your technician team freely without impacting your subscription cost.
While the timer is active, the Agent operates in "fast-talk" mode, ensuring immediate responses to your approval or denial of requests from the user. However, there are some nuances to be aware of: Real-Time Response: During the timer's operation, user requests trigger immediate responses. Out-of-Timer Approvals/Denials: Approvals, denials, or rule
Uninstalling AutoElevate is straightforward and can be done either from our Admin Portal or via a command line. Here's how: Method 1: Using the Admin Portal Access our Admin Portal. In the Computers section, locate the specific computer you wish to uninstall. Click the "Trash Can" icon next to the computer's entry. For bulk uninstallation: Fil
No, AutoElevate is a cloud-based service and software platform. All you need to get started is a license key and instructions. We handle server maintenance, mobile apps, security, updates, and web portals.
The Process Once the API token has been set up and AutoElevate is successfully communicating with your Halo PSA account, you will be able to complete the configuration and integration via the admin portal. How to Setup the Halo API Application In your Halo web portal, create an API application for your AutoElevate integration by doing the following
Please ensure that the Agent for that specific computer is set to "Live" elevation mode, and the User Account Control (UAC) is configured to prompt. Additionally, it's worth noting that not all installers trigger the UAC prompt, especially those that install into the local user area rather than Program Files. AE is designed to respond to the UAC app
No, AutoElevate no longer supports Windows 7. However, we've identified a known compatibility issue that may affect machines running older versions of PowerShell. The latest AutoElevate agent relies on a function available only in PowerShell 5.0 and above. To determine the PowerShell version on your problematic machines, please follow these steps: O
No, when the user request is granted, their session for that action is elevated from a standard user to an admin user. This has the advantage of not requiring the storage or maintenance of a database of user credentials, making security tighter, faster, and easier to manage.
Right now, all technicians who have the Mobile Notification app installed will receive notifications from your clients . They can quiet the notifications by adjusting notifications on their phones. We currently have plans to build a scheduling system for the notifications, which will allow your AutoElevate administrator to adjust which technicians r
Companies can get out of sync if they are deployed differently and fail to specify identical information. We recommend adopting a single deployment method (we offer various pre-made scripts for different RMMs here) and adhering to it consistently. In the meantime, you have the option to consolidate duplicate companies by following these steps: Selec
No, deploying AutoElevate is incredibly straightforward and can be done across your MSP practice quickly. We're dedicated to supporting you at every step of the process. AutoElevate is deployed by simply installing the AEAgent on workstations. The AEAgent is a small, lightweight MSI file that can be deployed silently using various methods such as RM
Managing AE User Accounts and Technician Roles Many of our partners have set up AE user accounts for their clients, allowing their administrators to approve their own requests. Typically, these users are assigned the "Technician (Level 1)" or "Technician (Level 2)" role to prevent them from modifying their permissions or accessing other us
This issue can occur when the Remove Admin Privileges feature is activated, resulting in users being removed from the Administrators Group, which previously had permission to Allow Remote Access. To resolve this, follow these steps: Check Group Membership: Ensure that affected users are now only members of the Users Group. Verify Remote Login Permi
Sometimes, a password synchronization problem may arise between Azure Active Directory (Azure AD) and the local machine, particularly when users primarily log in using a PIN rather than their password. In such cases, if the password is changed on the Azure AD side, it may not always sync correctly with the local device until specific actions are tak
This message serves as additional guidance to assist you. It advises you to right-click on the installer and select "Run As Admin." In some cases, installers may extract another executable file into the "AppData/Local/Temp" folder and execute it from there. These files often lack metadata, making them challenging to identify. Furthermore, the "App
By default, third-party Windows services are not permitted to start in Safe Mode. To ensure that our agent does not interfere with your ability to access Safe Mode, we do not automatically configure it to start in Safe Mode. This allows you to enter Safe Mode without any hindrance from the agent if it is not functioning properly. Enabling AE Agent i
We are aware of a limitation in LogMeIn's design, where it does not prompt for User Account Control (UAC) for standard users. It is necessary to right-click on the software and "Run as Admin". This will invoke the UAC and then AutoElevate. To simplify this process for end-users, some clients have adopted the following approach: Create an LogMeIn "R
Availability of a macOS Agent for AutoElevate Overview: AutoElevate is expanding its support to include macOS, allowing users to manage elevation requests on Mac devices. This new feature is currently in the early access phase, and ongoing developments are being made to ensure compatibility and functionality. Current Status: Early Access Phase 1: Th
To deploy AutoElevate agents in Live mode, you simply need to set the AGENT_MODE parameter during installation. (AGENT_MODE=Live) This can be passed via: RMM deployment scripts Command-line installations Group Policy or other automation tools You can see how to do this in the following article: System Agent Installation .
Failed User Elevation due to Incorrect Passwords If a User Elevation attempt fails due to an incorrect password, the dialog box typically includes a field to enter a new password. Missing Password Prompt In cases where the password prompt does not appear, you can manually update the stored password in AutoElevate by following these steps: Open the
Universal User Prompts: No Admin Distinctions AutoElevate prompts all users—regardless of whether they are local or domain administrators or standard users. There are 2 main ways to modify the default behavior and prevent AE from auto intercepting UAC prompts. The first is on a Computer by Computer basis. If you set the Computer in "Audit" or "P