Kaseya launched Kaseya Directory Services and Kaseya Policy Management, two new products that will allow IT professionals to further improve the way they view and manage their networks.
Kaseya Directory Services solution allows customers to automate the process of syncing their Microsoft Active Directory infrastructure for complete visibility from the Kaseya IT Automation Framework while also ensuring access and data privileges are uniform to execute efficient IT services.
Kaseya Policy Management streamlines the process of creating, setting and remotely applying IT policies to groups of systems across a distributed organization.
Key features of Kaseya Directory Services include:
* Active Directory integration – allows administrators to choose appropriate groups of users and machines to map into Kaseya while allocating them specific rights and access options.
* Password reset and disable account – technician enablement to remotely reset user passwords or disable accounts directly from the Kaseya Portal.
* Unified Login access – administrators can login to the Kaseya Portal using their domain login credentials while end users will have the option to connect to their work computer remotely using their familiar login credentials.
* Alerts and notifications – a bundled set of alerts can be configured to notify key personnel when changes have occurred within the Active Directory domain including new users and machines.
As IT organizations are required to manage more and more machines across distributed networks with different requirements and SLA standards - security or otherwise - the need for policy management becomes clear. With the introduction of Kaseya Policy Management, IT professionals can manage machine policies by organization, group or machine, meaning defined service level agreements can be set up, published and managed in one location quickly and efficiently.
Key Features of the Policy Management module include:
* Policy definition and management – multiple named policies can be defined, assigned and nested at a number of different levels including organization, group and machine. Policy settings cover the key areas of the Kaseya Management Framework, including:
- Remote Control Settings
- Kaseya Portal Access
- Maintenance Routines
- Monitor Alarms, Alerts and Patch Policies
* Dashboard – at a glance, administrators can quickly ascertain the overall status of all policies in the system, highlighting important metrics such as the number of machines in or out of compliance, machines not covered by the policy or other metric.
* Automated Policy assignment – an automated assignment scheme streamlines the process of bringing new machines under service. Equally, once a policy has been applied to a machine, any subsequent changes to the policy get automatically propagated to the assigned machines.
* Combined Policies – via the flexible assignment scheme, multiple policies can be assigned to any group of machines
The Kaseya Directory Services and Kaseya Policy Management modules are available now for new and existing customers and can be purchased as a subscription or perpetual license.
The Latest
In the final part of APMdigest's 2025 Predictions Series, industry experts offer predictions on how AI will evolve and impact technology and business in 2025 ...
E-commerce is set to skyrocket with a 9% rise over the next few years ... To thrive in this competitive environment, retailers must identify digital resilience as their top priority. In a world where savvy shoppers expect 24/7 access to online deals and experiences, any unexpected downtime to digital services can lead to significant financial losses, damage to brand reputation, abandoned carts with designer shoes, and additional issues ...
Efficiency is a highly-desirable objective in business ... We're seeing this scenario play out in enterprises around the world as they continue to struggle with infrastructures and remote work models with an eye toward operational efficiencies. In contrast to that goal, a recent Broadcom survey of global IT and network professionals found widespread adoption of these strategies is making the network more complex and hampering observability, leading to uptime, performance and security issues. Let's look more closely at these challenges ...

The pressure on IT teams has never been greater. As data environments grow increasingly complex, resource shortages are emerging as a major obstacle for IT leaders striving to meet the demands of modern infrastructure management ... According to DataStrike's newly released 2025 Data Infrastructure Survey Report, more than half (54%) of IT leaders cite resource limitations as a top challenge, highlighting a growing trend toward outsourcing as a solution ...

Gartner revealed its top strategic predictions for 2025 and beyond. Gartner's top predictions explore how generative AI (GenAI) is affecting areas where most would assume only humans can have lasting impact ...
The adoption of artificial intelligence (AI) is accelerating across the telecoms industry, with 88% of fixed broadband service providers now investigating or trialing AI automation to enhance their fixed broadband services, according to new research from Incognito Software Systems and Omdia ...
AWS is a cloud-based computing platform known for its reliability, scalability, and flexibility. However, as helpful as its comprehensive infrastructure is, disparate elements and numerous siloed components make it difficult for admins to visualize the cloud performance in detail. It requires meticulous monitoring techniques and deep visibility to understand cloud performance and analyze operational efficiency in detail to ensure seamless cloud operations ...
Imagine a future where software, once a complex obstacle, becomes a natural extension of daily workflow — an intuitive, seamless experience that maximizes productivity and efficiency. This future is no longer a distant vision but a reality being crafted by the transformative power of Artificial Intelligence ...
Enterprise data sprawl already challenges companies' ability to protect and back up their data. Much of this information is never fully secured, leaving organizations vulnerable. Now, as GenAI platforms emerge as yet another environment where enterprise data is consumed, transformed, and created, this fragmentation is set to intensify ...
