ControlUp Connect

Prev Next

Licensed Users

This feature is available only to users with a license for it.

ControlUp Connect empowers your end users and reduces IT workload with our AI chat right on their own devices, including:

  • Self‑Service: End users can open the self-service chat to ask AI a question and get issues resolved quickly before turning to their IT team.

  • Proactive Detection: End users can get alerted right on their desktop with our proactive IT detection service if any thresholds are breached even before they notice.

These features bring help and proactive IT detection directly to the desktop so end users can address common issues independently or escalate them with full technical context before a support ticket is even created.

Prerequisites

To enable the option on your end-users devices, those devices must have the ControlUp for Desktops agent version 2.17.8 installed.

What It Does

Connect runs on endpoints and can proactively engage users when it detects sustained performance conditions. It alerts users in a controlled way using governance settings that prevent notification fatigue. End users can also use the self-service option to open their own chats to resolve issues themselves before opening an IT ticket.

Connect offers users two guided resolution paths:

Play the following video to see an example of ControlUp Connect resolving a user’s problem - “Why is my sound not working?

Proactive Issue Detection

Connect offers high‑resolution proactive detection that evaluates endpoint health at 10‑second intervals across:

  • CPU

  • Memory

  • Disk

  • Event Logs

  • File/Registry operations

This detection reveals “invisible” performance issues that users might not realize are occurring—such as background memory leaks or silent disk exhaustion.

Resolution Path Options

When Connect is opened either by an end user opening a chat or if it proactively detects an issue, users can choose to:

Create ServiceNow Ticket

This option automatically generates a ServiceNow ticket pre-populated with all relevant technical details gathered during detection. This ensures IT receives high‑quality, context-rich information that speeds investigation and resolution. Note that this requires ServiceNow integration with ControlUp.

Fix with Pulse AI

This option launches an AI‑guided investigation session. Pulse analyzes the collected system data, identifies probable root causes, and provides a clear explanation of its findings. Before taking corrective action, the AI presents its recommended remediation steps and requires the user’s approval to proceed. This maintains transparency and ensures users remain in control with:

  • Autonomous investigation: AI analyzes Registry, Event Logs, File System, system performance, and process data to find the root cause.

  • Human‑in‑the‑loop (HITL): AI explains the diagnosis and requests approval before executing any remediation.

Both of these options enable users to solve routine issues independently while providing IT teams accurate, actionable data when escalation is needed.

Configure Detection Thresholds

Optionally, you can configure the proactive issue detection thresholds on the Devices > Configuration > Settings >  Agent > Custom Settings page.

Warning: As best practice, we recommend not to change the default threshold settings unless required for your organization.

The following table describes the available threshold settings:

Detection Type

Setting

Default

Description

Sustained CPU Pressure

CpuUtilizationThresholdPercent

85%

CPU utilization percentage required to trigger sustained pressure alert.

CpuSustainedDurationThresholdSecs

300(sec)

Seconds CPU must maintain threshold before notifying user.

Critical CPU Spike

CpuCriticalSpikeThresholdPercent

95%

Near‑total CPU exhaustion threshold.

CpuCriticalSpikeDurationSecs

60(sec)

Seconds of reduced window for immediate high‑priority alerts.

Sustained Memory Pressure

MemoryUtilizationThresholdPercent

85%

Memory utilization threshold for sustained pressure.

MemorySustainedDurationSecs

300(sec)

Time required at threshold to identify a sustained threshold.

Critical Memory Spike

MemoryCriticalSpikeThresholdPercent

95%

Emergency level where new thread requests will likely fail.

MemoryCriticalSpikeDurationSecs

60(sec)

Time required at threshold to identify a sustained threshold.

Disk Full

DiskUtilizationThresholdPercent

97%

Disk utilization percentage that triggers an alert.

DiskFreeSpaceThresholdGb

3.0 GB

Triggers alert if free space falls below this value.

DiskSustainedDurationSecs

120(sec)

Seconds disk must maintain threshold before notifying user.

MonitorOsVolumeOnly

True

Monitor OS volume only.

Disk Logic

Proactive issue detection calculates both the percentage‑based and fixed‑value threshold values, and selects the most restrictive trigger so that user devices with different drive sizes (e.g., 128 GB vs. 1 TB) are properly notified.

Example Configuration for Self-Service thresholds

"SelfService": {
        "CpuConfig": {
        "CpuUtilizationThresholdPercent": 85,
        "CpuSustainedDurationThresholdSecs": 300,
        "CpuCriticalSpikeThresholdPercent": 95,
        "CpuCriticalSpikeDurationSecs": 60
        },
        "MemoryConfig": {
        "MemoryUtilizationThresholdPercent": 85,
        "MemorySustainedDurationSecs": 300,
        "MemoryCriticalSpikeThresholdPercent" : 95,
        "MemoryCriticalSpikeDurationSecs" : 60
        },
        "DiskConfig": {
        "DiskUtilizationThresholdPercent": 97,
        "DiskFreeSpaceThresholdGb": 3.0,
        "DiskSustainedDurationSecs": 120,
        "MonitorOsVolumeOnly": true
        }
        }

Configure Notification Settings

Connect includes a set of notification governance controls that help you manage how and when users are alerted about detected issues. These settings ensure proactive support remains helpful rather than disruptive, and that users receive notifications only when they are meaningful and actionable.

Optionally, you can configure the notification settings on the Devices > Configuration > Settings >  Agent > Custom Settings page.

Warning: As best practice, we recommend not to change the default notification settings unless required for your organization.

The following table describes the available settings:

Setting

Default

Description

ShowNotifications

True

Master switch for user-facing notifications. If disabled, no notifications are shown to the user, but they are still logged.

StartupNotificationDelaySeconds

300(sec)

Startup shield that suppresses notifications for several minutes after boot to prevent unnecessary notifications caused by normal high resource startup tasks.

MaxHourlyNotifications

3

Maximum number of notifications a user can receive in a single hour to prevent alert fatigue.

MaxDailyNotifications

25

Maximum number of daily notifications to maintain a healthy and predictable user experience.

SameTypeNotificationCooldownMinutes

180(min)

After a specific notification type is shown, that notificationt type won’t reappear for at least 3 hours.

SameTypeNotificationCooldownAfterInteractionMinutes

1440(min)

After a user interacts with a specific notification, that notificationt type won’t reappear for 24 hours.

These settings provide the governance of Connect:

  • The startup shield prevents the system from alarming users about expected high activity during boot, such as security agent initialization or application loading.

  • The hourly and daily caps prevent users from being overwhelmed by too many notifications during periods of sustained system strain.

  • The interaction‑based cooldown acknowledges that once a user has taken action, they don’t need repeated reminders about the same condition.

Together, these rules help maintain a clean and meaningful notification experience, not a constant stream of pop‑ups.

Example Configuration for Notification Settings

"NotificationConfig": {
        "ShowNotifications": true,
        "StartupNotificationDelaySeconds": 300,
        "MaxHourlyNotifications": 3,
        "MaxDailyNotifications": 25,
        "SameTypeNotificationCooldownMinutes": 180,
        "SameTypeNotificationCooldownAfterInteractionMinutes": 1440
        }

Data Collection Scope

Pulse performs root cause analysis using a targeted, time‑bounded set of diagnostic data collected directly from the device. It gathers enough context for accurate analysis, while respecting user privacy and excluding personal or unnecessary data.

Pulse collects the following data:

Collector

Included Data

System Performance

CPU, memory, disk metrics

Process Level

Top resource-consuming processes

Registry

Run entries, firewall policies, and Defender configuration

File System

Driver configuration paths, desktop activity, browser profile data

Event Logs

System, application, security, networking (TCPIP) logs

These rules ensure that Pulse collects only what is required for accurate AI-driven diagnosis and remediation approval, with clear boundaries that protect user privacy.