Examine system inventory to verify that a list of hardware and software components is maintained |
Without an inventory, some system components could be forgotten, and be inadvertently excluded from the organization’s configuration standards. This Action1 query automates creation of inventory and lists all hardware and software components that can be used in PCI DSS assessments to prove your organization’s compliance.
Sign-up for Action1 Free Edition to streamline compliance efforts for your network of endpoints. Such as you can simplify assessments of 2.4.a: Hardware and Software Inventory of Endpoints for your internal or external auditors, create instant or regular compliance reports that prove your compliance while reducing the costs. Action1 Endpoint Security Platform is entirely SaaS, with online web interface (no management tools to install) and it has zero cost for basic functionality. Running in the Cloud, Action1 discovers all of your endpoints within seconds and allows you to pass compliance audits and maintain continuous compliance with ease.
Respond to Threatsin Real-Time
Ask questions in plain English such as "list of installed software" or "all running processes".
Get answers instantly from live systems or subscribe to real-time alerts.
Keywords: Examine system inventory to verify that a list of hardware and software components is maintained,Action1 2.4.a: Hardware and Software Inventory of Endpoints.
Find more information on 2.4.a: Hardware and Software Inventory of Endpoints at Microsoft TechNet.