“Which workstations have Dropbox installed or IIS running?”
Real-time information on installed software, hotfixes, running services, startup programs and system drivers.
“List of endpoints exposing file shares to ransomware”
TCP/IP active connections, IP routing tables, adapter configuration, exposed and connected network shares, TCP/IP settings and other network information.
“Show endpoints with remote registry service enabled”
Detailed information on installed OS, event logs, environment variables, applied Group Policies and other windows configuration settings available to you instantly.
“List of workstations having Guest account enabled”
Get list of local users, groups, group membership and logged in users at all your endpoints across the enterprise.
“Who copies sensitive corporate data to external USB media?”
USB storage media, SD readers and other USB devices usage on your workstations.
“Check if 'runsomware.exe' or 'putty.exe' processes are running on any of your endpoints”
Running processes, CPU/memory utilization and other runtime information.
“Users storing sensitive files locally on unsecured laptops”
Search for a specific file or folder across all endpoints.
“Systems at risk because of outdated firmware”
Processors, memory, baseboard and other computer hardware.
Peripheral equipment, disks, partitions, volumes, running custom queries and more...
Action1 gives us close-to-instant ability to undertstand what is happening accross our entire network of endpoints and helps us respond in real-time.
Credit Union in Ohio
Being able to understand which new software is being installed and where is critical for our network of several thousand employee workstations
Major Regional Hospital on the East Coast
Our students love technology. But sometimes they break it too. Action1 allows us to understand all abnormal activities happening on college computers.
Community College in Texas