“Which workstations have Dropbox installed or IIS running?”
Real-time information on installed software, hotfixes, running services, startup programs and system drivers.
“List of endpoints exposing file shares to ransomware”
TCP/IP active connections, IP routing tables, adapter configuration, exposed and connected network shares, TCP/IP settings and other network information.
“Show endpoints with remote registry service enabled”
Detailed information on installed OS, event logs, environment variables, applied Group Policies and other windows configuration settings available to you instantly.
“List of workstations having Guest account enabled”
Get list of local users, groups, group membership and logged in users at all your endpoints across the enterprise.
“Who copies sensitive corporate data to external USB media?”
USB storage media, SD readers and other USB devices usage on your workstations.
“Check if 'runsomware.exe' or 'putty.exe' processes are running on any of your endpoints”
Running processes, CPU/memory utilization and other runtime information.
“Users storing sensitive files locally on unsecured laptops”
Search for a specific file or folder across all endpoints.
“Systems at risk because of outdated firmware”
Processors, memory, baseboard and other computer hardware.
Peripheral equipment, disks, partitions, volumes, running custom queries and more...