Verify That Your Computers Are Correctly Configured
Saturday, December 27, 2014
AuditShark remotely gathers security & configuration settings or inventory information from computers on your network. This data can be gathered from Windows, Linux and Unix machines and will assess the current state of a computer to determine whether it is configured properly using a customizeable set of standards. Any settings which are deemed to be outside of acceptable values are flagged as "Not Ok" for additional follow up and remediation. This is particularly useful in situations where you know very little about a computer and need an instant assessment of how it is configured. By pinpointing incorrect settings, you can then fix them to prevent future problems. As an auditing tool, it can analyze hundreds of data points very quickly for security assessments or compliance purposes. These settings may be described in internal security policies or regulatory compliance standards such as PCI, Sarbanes-Oxley, HIPAA and more because AuditShark policies are completely customizeable. If it's programmatically possible to retrieve a piece of data from a target computer, then AuditShark can not only report on it, but can also let you know if it's within the range of acceptable values.