MEET ACTION1 AT RSA CONFERENCE 2024

May 6 - 9 | San Francisco | Booth #5472

Action1 5 How-to Articles 5 How to Monitor All Software Installation to Prevent Data Breaches

How to Monitor All Software Installation to Prevent Data Breaches

October 12, 2018

By Peter Barnett

Any newly installed software on your company’s workstations can be the first alert indicating a data breaches at a very early stage. Monitoring all software installation events and proactively blocking all unauthorized installations it is a critical procedure that shall be performed by all departments on an ongoing basis.

Join.me.exe is a type of EXE file associated with Join.Me developed by Logmein, Inc. for Windows. The latest known version of Join.me.exe is 1.9.1.204, which was produced for Windows. This EXE file has a popularity rating of 1 stars and a security rating of ‘UNKNOWN’.

EXE (‘executable’) files, such as join.me.exe, are files that contain step-by-step instructions that a computer follows to carry out a function. When you double-click an EXE file, your computer automatically executes these instructions created by the program developer (for example, Logmein, Inc.) to launch a program (for example, Join.Me) on your computer.

Each software application on your computer uses an executable file: your web browser, word processor, spreadsheet program, etc. This makes executable files one of the most useful kinds of files in the Windows operating system. Without executable files like join.me.exe, you could not use any programs on your computer.

Below there are a ways to get a list of installed software and monitoring all software installation to prevent data breaches and avoid unauthorized access.

Manually:

Option 1: Via Control Panel on a Local Computer:

1. Open Windows Explorer (Win+E)

2. Navigate to ‘Control Panel\Programs\Programs and Features’ to display the following screen:

Windows Programs and Features

3. Click on ‘Installed On’ column to sort by installed date and have the most recently installed programs pop up on top.

Option 2: Via Wmic Utility on a Remote Computer:

1. Launch PowerShell command prompt (press Win+R, type ‘powershell’, Enter)

2. In the PS command prompt, Get-WmiObject -Class Win32_Product -Computer computername | Select-Object Name,InstallDate | Sort-Object InstallDate

With Action1 Endpoint Security Platform:

Step 1 Sign-up for Free:
Sign up for a free version of the Action1 solution and install Action1 agents to your remote endpoints to manage them remotely. Here is the detailed instruction on how to get started.

action1 dashboard

Step 2 Type Your Question in Plain English

action1 endpoint reports

Step 3 Set Filters, If Necessary:

Endpoint Name

mac.widgets.local
fred.widgets.local
ray.widgets.local

Install Date

20171204
20171204
20171204

Name

Microsoft Office 2016
Microsoft SQL Server 2015
Microsoft Office 2012

Vendor

Microsoft
Microsoft
Microsoft

Version

19.0.8482
11.1.5839
17.0.3629

See What You Can Do with Action1

 

Join our weekly LIVE demo “Patch Management That Just Works with Action1” to learn more

about Action1 features and use cases for your IT needs.

 

spiceworks logo
getapp logo review
software advice review
trustradius
g2 review
spiceworks logo

Related Posts

No Results Found

The page you requested could not be found. Try refining your search, or use the navigation above to locate the post.