Sitemap


Patch Management

Patch Management
Detect Missing Windows Updates
Install Application Patches Remotely
Install Windows Updates Remotely
Search Installed Windows Updates

Endpoint Management

Endpoint Management
Disks, Partitions and Volumes
Disk Partitions
Disk Volumes
Logical Disks
Logical Disks w/o BitLocker Encryption Enabled
NTFS Disk Quotas
Local Users and Groups
Local Group Membership
Local Groups
Local User Accounts
Logon Statistics
User Profiles
View Currently Logged On Users
Network Activity and Configuration
Network Adapters
Open Network Connections
Open Network Connections with DNS Names
Windows Routing Table
Operating System Settings and Policies
Applied Group Policies (RSOP)
Boot Configurations
Computer Active Directory Domain Names
Computer Time Zones
Environment Variables
Local Time and Time Sync Issues
Operating System Information
Windows Event Logs
Windows Install Date and System Uptime
Regulatory Compliance
HIPAA Compliance
45 CFR 164.308: Administrative Safeguards
164.308 (a)(1)(ii)(A) Security Management: Risk Analysis
164.308 (a)(1)(ii)(D) Security Management: Information System Activity Review
164.308 (a)(3)(ii)(C) Workforce Security: Termination Procedures
164.308 (a)(4)(ii)(B) Information Access Management: Access Authorization
164.308 (a)(4)(ii)(C): Information Access Management: Access Establishment and Modification
164.308 (a)(5)(ii)(B) Security Awareness and Training: Protection from Malicious Software
164.308 (a)(5)(ii)(C) Security Awareness and Training: Log-in Monitoring
164.308 (a)(5)(ii)(D) Security Awareness and Training: Password Management
45 CFR 164.312: Technical Safeguards
164.312 (a)(2)(i) Access Control: Unique User Identification
164.312 (a)(2)(iii) Access Control: Automatic Logoff
164.312 (a)(2)(iv) Access Control: Encryption and Decryption
164.312 (b) Standard: Audit controls
164.312 (d) Standard: Person or Entity Authentication
164.312 (e)(2)(ii) Transmission Security: Encryption
PCI DSS Compliance
PCI DSS: Requirement 1
1.1: Firewall and Router Configuration Standards
1.1.1.b: All Network Connections
1.1.1.c: Desktop Firewall Configurations
1.1.2.a: Diagram of Network Connections
1.1.4.c: Verify Firewall is Active
1.1.6.a: All Services, Protocols, Ports
1.1.6.c: Insecure Services, Protocols, Ports
1.1.7.b: Review of Firewall Rules Every 6 Months
1.2: Restrict Connections Between Untrusted Networks and CDE
1.2.1.b: Traffic Limited to Necessary
1.2.1.c: Deny All Other Traffic
1.2.2.a: Protect Configuration from Unauthorized Access
1.2.2.b: Configurations are Synchronized
1.3: Prohibit Direct Internet Access to CDE
1.3.4: Allow Only Authorized Outbound Traffic
1.4: Personal Firewall Software
1.4.a: Personal Firewall Status
PCI DSS: Requirement 10
10.2 and 10.3: Automated Audit Trails
10.2.1: Audit Individual User Access
10.2.2: Audit Administrative Activity
10.2.3: Audit Access to Audit Trails
10.2.4: Audit Invalid Access Attempts
10.2.5.a: Audit of Identification and Authentication
10.2.5.b: Audit Elevation of Privileges
10.2.5.c: Audit Changes to Administrative Accounts
10.2.6: Audit Initialization, Stopping and Pausing of Audit Logs
10.2.7: Audit Creation and Deletion of System Objects
10.4: Time Synchronization Configuration
10.4.1.b: Time Settings
10.4.2: Time Protection
10.5: Audit Trail Security
10.5.1: Limit Access to Audit Trails
10.5.2: Protect Audit Trails from Modifications
PCI DSS: Requirement 2
2.1: Change Vendor Defaults and Disable Default Accounts
2.1.1.c: Default Passwords for Access Points
2.1.1.d: Strong Encryption for Wireless Connections
2.1.a: Default Passwords
2.1.b: Unnecessary Default Accounts
2.2: Configuration Standards and System Hardening
2.2.2.a: Enabled System Services and Protocols
2.2.2.b: Insecure System Services and Protocols
2.2.3: Additional Security Features
2.2.4.c: Common Security Parameters
2.2.5.a: Unnecessary Functionality is Removed
2.3: Encrypt All Non-Console Administrative Access
2.3.a Strong Encryption for Administrator Access
2.3.b Insecure Remote Login Not Available
2.4: Inventory of System Components
2.4.a: Hardware and Software Inventory of Endpoints
PCI DSS: Requirement 3
3.4. Render PAN Unreadable in Storage
3.4.1.a: Full Disk Encryption Authentication
3.4.1.c: Encryption of Removable Media
PCI DSS: Requirement 4
4.1: Safeguard Transmission of Cardholder Data
4.1.1: Wireless Networks with Strong Encryption for Authentication
PCI DSS: Requirement 5
5.1: Deploy Anti-virus Software
5.1.1: Antivirus Software Installed and Configured
5.2: Maintain Anti-virus Software
5.2.b: Anti-virus Updates and Periodic Scans are Configured
5.2.c: Anti-virus Definitions are Current and Periodic Scans are Performed
5.2.d: Anti-virus Audit Logs are Enabled and Retained
5.3: Anti-virus is Running and Cannot Be Altered
5.3.a: Anti-virus is Actively Running
5.3.b: Anti-virus Cannot Be Altered by Users
PCI DSS: Requirement 6
6.2: Patch Management
6.2.b: Timely Deployment of Vendor-Supplied Patches
PCI DSS: Requirement 7
7.2: Access Control System
7.2.1: Access Control Systems are In Place
7.2.2: Access Control Systems are Configured
7.2.3: Default Deny-All Setting
PCI DSS: Requirement 8
8.1: Proper User Identification Management
8.1.1: Assign Unique User IDs
8.1.2: Management of User IDs
8.1.3: Revoke Access for Terminated Employees
8.1.4: Inactive User Accounts
8.1.5: Third Party Accounts
8.1.6: Account Lockouts
8.1.7: Account Lockout Duration
8.1.8: Idle Sessions
8.2: User Authentication and Passwords
8.2.1: Strong Cryptography for Passwords
8.2.3.a: Password Complexity Requirements
8.2.4.a: Change Passwords Every 90 Days
8.2.5.a: Disallow Reusing of Old Passwords
8.5: No Generic User IDs
8.5.a: No Usage of Shared and Generic User IDs
Remote Task Manager
Get List of Running Processes Remotely
Get Windows Services List Remotely
Processes and Memory Usage Statistics
Report on Startup Programs Remotely
Restart Remote Computer
Run Application with Command Line
Run Remote PowerShell Script
USB Devices and Removable Media
SD Card Usage
USB Storage Device Usage
Windows Network Shares

Software Deployment and Distribution

Software Deployment and Distribution
Install Software Remotely
Uninstall Software Remotely

IT Asset Management

IT Asset Management
Computer Software Inventory
Get List of Installed Cloud Storage Applications Remotely
Get List of Installed Instant Messenger and Chat Applications Remotely
Get List of Installed Windows Drivers Remotely
Obtain List of Installed Software Remotely
Report on Installed Web Browsers Remotely
Hardware Inventory Software
Report on BIOS Firmware Information Remotely
Report on CD/DVD Drives Remotely
Report on Computer Manufacturer and Memory Information Remotely
Report on Computer Motherboard Information Remotely
Report on Disk Drives Remotely
Report on Installed Printers Remotely
Report on Monitors Information Remotely
Report on Physical Memory Information Remotely
Report on Processor Information Remotely
Report on SCSI Controllers Remotely
Report on Sound Devices Remotely

By continuing to use our website, you agree with our use of cookies in accordance with our Privacy Policy. You can reject cookies by changing your browser settings.     
Ok, got it