Software
The software audit displays the applications, divided by categories, that are installed on scanned computers . For each application, the audit displays details such as application name, publisher and version.
For more information refer to Software audit.
The table below displays a summary of the information gathered by the software audit:
| Data | Description | Ports | Protocol |
|---|---|---|---|
| General applications | Enumerates every application installed on the scan target(s). |
|
|
| Antiphishing applications | Lists antiphishing applications. |
|
|
| Antispyware applications | Lists antispyware applications. |
|
|
| AntivirusA software countermeasure that detects malware installed on a computer without the user's knowledge. applications | Lists antivirus applications. |
|
|
| Backup applications | Lists backup applications. |
|
|
| Data Loss Prevention | Lists Data Loss Prevention applications. |
|
|
| Device Access Control | Lists Device Access Control applications. |
|
|
| Disk Encryption | Lists Disk Encryption applications. |
|
|
| Firewall applications | Lists firewall applications. |
|
|
| Health Agent | Lists system health monitoring applications. |
|
|
| Instant Messenger | Lists Instant Messenger applications. |
|
|
| Patch management applications | Lists patch management applications. |
|
|
| Peer To Peer | Lists Peer to Peer (P2P) applications. |
|
|
| URLThe Uniform Resource Locator is the address of a web page on the world wide web. Filtering | Lists web filtering applications. |
|
|
| Virtual Machine Software | Lists virtualization software detected on your network. |
|
|
| Virtual Private Network (VPN) Client applications | Lists VPN client applications. |
|
|
| Web Browser applications | Lists web browsers. |
|
|
NOTE
For a full list of supported security applications including vendors and products, refer to http://go.gfi.com/?pageid=security_app_fullreport