Device card registry viewer

August 1
Enhancement
VSA 10

Technicians need frictionless access to the registry of Windows devices they support to perform IT support and system admin functions without interrupting the end user. With this release, they can navigate the tree and view values directly from the Device Card without requiring a remote desktop session.

A new Registry Viewer command has been added to the Manage section of the device details pane for Windows devices. Selecting it pops out a card providing browse and view capability to the registry, with a user experience closely aligned with the Windows native Registry Editor:

  • Technicians can manually navigate the tree or enter a path and press Return to access a key and view values. After manual navigation, the path can be copied to clipboard for use on another device or in documentation.
  • Navigation history is saved per technician across all devices, so they can quickly access the same key on different machines.
NOTE: Searching, creating, editing and deletion of registry keys and the ability to back up or restore the registry is planned for a future iteration of this feature.

Learn more about Device card registry viewer..

One complete platform for IT & security management

Kaseya 365 is the all-in-one solution for managing, securing, and automating IT. With seamless integrations across critical IT functions, it simplifies operations, strengthens security, and boosts efficiency.

From phishing to ransomware: How Kaseya 365 User protects your SaaS apps

SaaS applications, such as Microsoft 365 and Google Workspace, power nearly every aspect of today’s digital operations. However, as businessesRead More

Read blog post
A rising arrow illustrates a successful business as it follows a powerful growth strategy achieving goals through strategic planning development and consistent execution for sustainable expansion

The financial upside of standardizing on Kaseya 365 Endpoint

See how Kaseya 365 Endpoint cuts tool sprawl and frees up budget by unifying endpoint management in one cost-effective platform.Fe

Read blog post

Cloud detection and response: MSPs’ guide to cloud security

The use of SaaS applications and the volume of cloud workloads are surging. Businesses today use approximately 112 SaaS appsRead More

Read blog post