Verify That Your Computers Are Correctly Configured


Saturday, December 27, 2014

AuditShark remotely gathers security & configuration settings or inventory information from computers on your network. This data can be gathered from Windows, Linux and Unix machines and will assess the current state of a computer to determine whether it is configured properly using a customizeable set of standards. Any settings which are deemed to be outside of acceptable values are flagged as "Not Ok" for additional follow up and remediation. This is particularly useful in situations where you know very little about a computer and need an instant assessment of how it is configured. By pinpointing incorrect settings, you can then fix them to prevent future problems. As an auditing tool, it can analyze hundreds of data points very quickly for security assessments or compliance purposes. These settings may be described in internal security policies or regulatory compliance standards such as PCI, Sarbanes-Oxley, HIPAA and more because AuditShark policies are completely customizeable. If it's programmatically possible to retrieve a piece of data from a target computer, then AuditShark can not only report on it, but can also let you know if it's within the range of acceptable values.


Give AuditShark some love:

comments powered by Disqus

Recent startups

1:1s in Impraise

Meetings with meaning

Snipcart 3.0

Custom e-commerce for developers. New cart & customization.

Consider Conversations

Bring email to life with reactions, comments, and presence.

Fathom Analytics v2

Simple & private analytics for bloggers & businesses

Figma Community

Publish live design files for others to learn from & remix.

Sketch to Xcode

The fastest way to get colors from Sketch to Xcode.