Software
The software audit displays the applications, divided by categories, that are installed on scanned computers . For each application, the audit displays details such as application name, publisher and version.
For more information refer to Software audit.
The table below displays a summary of the information gathered by the software audit:
Data | Description | Ports | Protocol |
---|---|---|---|
General applications | Enumerates every application installed on the scan target(s). |
|
|
Antiphishing applications | Lists antiphishing applications. |
|
|
Antispyware applications | Lists antispyware applications. |
|
|
AntivirusA software countermeasure that detects malware installed on a computer without the user's knowledge. applications | Lists antivirus applications. |
|
|
Backup applications | Lists backup applications. |
|
|
Data Loss Prevention | Lists Data Loss Prevention applications. |
|
|
Device Access Control | Lists Device Access Control applications. |
|
|
Disk Encryption | Lists Disk Encryption applications. |
|
|
Firewall applications | Lists firewall applications. |
|
|
Health Agent | Lists system health monitoring applications. |
|
|
Instant Messenger | Lists Instant Messenger applications. |
|
|
Patch management applications | Lists patch management applications. |
|
|
Peer To Peer | Lists Peer to Peer (P2P) applications. |
|
|
URLThe Uniform Resource Locator is the address of a web page on the world wide web. Filtering | Lists web filtering applications. |
|
|
Virtual Machine Software | Lists virtualization software detected on your network. |
|
|
Virtual Private Network (VPN) Client applications | Lists VPN client applications. |
|
|
Web Browser applications | Lists web browsers. |
|
|
NOTE
For a full list of supported security applications including vendors and products, refer to http://go.gfi.com/?pageid=security_app_fullreport