Overview
The Nexthink Link Generator lets IT support teams generate pre-scoped Nexthink investigation URLs instantly — no NQL knowledge required.
Select a template, enter device name(s) or IP addresses, pick a time range, and get a direct investigation link in seconds. Paste into a ServiceNow ticket, Teams message, or email — anyone with Nexthink access can click it.
Installation
Standalone HTML File
Download nexthink-link-generator.html from your administrator and open it in Chrome or Edge. No setup required — the tool runs entirely in your browser.
Browser Extension
The extension is available on the Chrome Web Store and Microsoft Edge Add-ons store. Search for Nexthink Link Generator or use the link provided by your administrator.
- Visit the Chrome Web Store or Edge Add-ons store
- Search for Nexthink Link Generator by Edge Solutions & Consulting
- Click Add to Chrome or Get
- Click the Nexthink icon in your browser toolbar to open the side panel
Setting Tenant URL
Before generating links, configure your Nexthink tenant URL on the Tenant tab.
Enter your base URL (e.g. https://yourcompany.us.nexthink.cloud) and click Save. Required once per browser/device.
Generating a Link
Step 1 — Device Identifier
Choose filter type and toggle Single / Multiple.
| Type | Description |
|---|---|
| device.name | Hostname — most common |
| collector.uid | Nexthink Collector UUID |
| device.ip | IP address or CIDR — switches to network templates |
Step 2 — Template
Templates are grouped by namespace. Only templates for the selected filter type are shown.
Step 3 — View Mode
Detail — raw event rows. Summarize — aggregated totals per device.
Step 4 — Time Range
Preset (15 min → 30 days) or Custom (exact From/To, 15-min steps, max 30 days back).
Step 5 — Generate
Click Generate investigation link. Copy URL or click Open in Nexthink.
IP / Network Mode
Select device.ip to investigate by IP address. Template list switches to network templates only.
| Input | Example |
|---|---|
| Single IP | 10.0.1.50 |
| Multiple IPs | Add each as a tag |
| CIDR subnet | 10.0.0.0/24 |
| Mixed | IPs and CIDR in same query |
Favorites
- Click ★ on any template to favorite it
- Favorited templates move to a ★ Favorites group — removed from original category
- Click again to unfavorite — returns to original category
- Persists between sessions, stored locally
History
The History tab stores the last 30 generated links. Click any entry to copy the URL. Stored locally — not shared with other users.
Admin Mode ADMIN
Reveals Templates and Settings tabs. Session-only by default — resets on refresh.
Shortcut: Shift + Alt + A (Mac: Shift + Option + A)
Blue ADMIN badge appears in the header when active. Press again to lock.
Settings ADMIN
| Setting | Description |
|---|---|
| Default filter type | Sets the default filter on load — device.name, collector.uid, or device.ip |
NQL Placeholders ADMIN
All templates use two runtime placeholders:
| Placeholder | Replaced with |
|---|---|
| {FILTER} | device filter clause (name/uid/ip, single/multiple) |
| {TIMEFRAME} | during past 24h or from/to custom range |
device_performance.events {TIMEFRAME}\n| where {FILTER}\n| list event.start_time, device.nameManaging Templates ADMIN
Edit
Expand a card → edit icon, name, desc, category, NQL → Save.
Add
Click + New template. Use {FILTER} and {TIMEFRAME} placeholders.
Reorder
Drag the ☰ handle to reorder.
Delete
Expand card → Delete → confirm.
NQL Importer ADMIN
Converts any raw NQL query into a reusable template. Available on the Templates tab in admin mode.
- Paste raw NQL — device filter auto-replaced with {FILTER}
- Timeframes replaced with {TIMEFRAME}
- Category inferred from table name
- If no filter found — dialog prompts how to handle
Distributing Updates ADMIN
Pushing template updates to all users:
- Configure templates → Export JSON
- Replace DEFAULT_TEMPLATES in source
- Bump APP_VERSION (forces localStorage reset)
- Save and upload to SharePoint
GPO / Registry Deployment ADMIN
Overview
The extension supports enterprise-wide configuration via Windows Registry or Group Policy. Managed settings are applied every time the extension loads and override any user-configured values. This allows IT to centrally control the tenant URL, default filter type, admin access, and investigation templates across all devices.
Step 1 — Find Your Extension ID
The Extension ID is required for all registry paths. It is unique per installation.
- Open Chrome and navigate to chrome://extensions
- Enable Developer mode (toggle top-right)
- Find Nexthink Link Generator in the list
- Copy the ID shown below the name — it is a 32-character lowercase string (e.g. abcdefghijklmnopqrstuvwxyz123456)
- For Edge: navigate to edge://extensions and repeat
Step 2 — Managed Configuration Keys
| Key name | Type | Value | Effect |
|---|---|---|---|
| adminMode | REG_SZ | "true" or "false" | true = Templates and Settings tabs permanently visible without keyboard shortcut. false = shortcut required (default). |
| tenantUrl | REG_SZ | "https://company.us.nexthink.cloud" | Pre-fills and locks the Tenant URL field. User cannot edit it. |
| filterType | REG_SZ | "name", "uid", or "ip" | Sets the default device filter type shown on load. |
| templates | REG_SZ | Minified JSON array string | Deploys a managed template set. Overrides all user-saved templates on every load. |
Step 3 — Registry Key Paths
Create the following registry keys. Replace YOUR_EXTENSION_ID with the ID from Step 1 and YOUR_TENANT_URL with the customer's Nexthink instance URL.
For Google Chrome:
HKEY_LOCAL_MACHINE
SOFTWARE
Policies
Google
Chrome
3rdparty
extensions
YOUR_EXTENSION_ID
policy
For Microsoft Edge:
HKEY_LOCAL_MACHINE
SOFTWARE
Policies
Microsoft
Edge
3rdparty
extensions
YOUR_EXTENSION_ID
policy
Step 4 — Sample .reg File
Edit the values below and save as a .reg file. Double-click to apply locally, or deploy via GPO Preferences.
Windows Registry Editor Version 5.00 ; ── Google Chrome ────────────────────────────────── [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\YOUR_EXTENSION_ID\policy] "adminMode"="false" "tenantUrl"="https://YOUR_TENANT_URL.us.nexthink.cloud" "filterType"="name" ; ── Microsoft Edge ───────────────────────────────── [HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\Edge\3rdparty\extensions\YOUR_EXTENSION_ID\policy] "adminMode"="false" "tenantUrl"="https://YOUR_TENANT_URL.us.nexthink.cloud" "filterType"="name"
Step 5 — Deploy via Group Policy Preferences
- Open Group Policy Management Console (gpmc.msc)
- Create or edit a GPO linked to the target OU containing the devices
- Navigate to: Computer Configuration → Preferences → Windows Settings → Registry
- Right-click → New → Registry Item
- Set Action: Update, Hive: HKEY_LOCAL_MACHINE
- Key path: SOFTWARE\Policies\Google\Chrome\3rdparty\extensions\YOUR_EXTENSION_ID\policy
- Value name: tenantUrl, Type: REG_SZ, Value data: https://company.us.nexthink.cloud
- Repeat for each key (adminMode, filterType, etc.)
- Repeat for Edge path if needed
Step 6 — Deploy via ADMX / Administrative Templates
- Copy NXTLinkGenerator.admx to C:\Windows\PolicyDefinitions\
- Copy en-US\NXTLinkGenerator.adml to C:\Windows\PolicyDefinitions\en-US\
- In GPMC, navigate to: Computer Configuration → Administrative Templates → Edge Solutions and Consulting → Nexthink Link Generator
- Configure Enable Admin Mode, Nexthink Tenant URL, and Default Filter Type as needed
Step 7 — Verify the Policy Applied
- On a target device, run gpupdate /force in Command Prompt to force a policy refresh
- Open Chrome and navigate to chrome://policy
- Click Reload policies
- Search for your Extension ID in the page — your configured values should appear under the extension policy section
- Restart Chrome, then open the extension side panel — the tenant URL should be pre-filled and locked
Release Notes
Known Limitations
| Limitation | Detail |
|---|---|
| No backend | localStorage only — lost if browser storage is cleared |
| Session-only admin | Resets on refresh unless GPO adminMode is set |
| NQL not validated | Invalid NQL errors in Nexthink, not in tool |
| IP summarize | Nexthink cannot summarize by IP — templates use device.name instead |
| 30-day limit | Custom picker max 30 days |