It can run with or without agents to audit a multitude of devices and operating systems. The management GUI is very well-organized and workflow-driven so its easy for an IT administrator to find what needs to be done and do it.However, outstanding reporting is marred by poor on-screen formatting.
![]() Gfi Languard Vs Nessus Install The SoftwareYou install the software on a single Windows machine, which then scans the network to discover all devices (servers, workstations, laptops, mobile devices, virtual machines, routers, switches, and printers) and interrogate them regarding security issues. Once discovered, the devices can be managed with or without an agent; using an agent will give IT administrators deeper results. While no security security tool is a silver bullet, GFI LanGuard is attractive because its notably more mature than many security tools popping on the market and so has a feature depth you wont find in many other platforms. Combined with new security tools aimed at protecting cloud infrastucture, like CloudPassage, or identity management, like ViewFinity, GFI LanGuard becomes an indispensible member of your network security tool kit. The product launched and opened the home screen where I could choose to view the dashboard (investigate network vulnerability status and audit results), remediate security issues (deploy missing patches, uninstall unauthorized software, turn on antivirus and more), manage agents (enable agents to automate network security audit and to distribute scanning load across client machines), or launch a scan (manually set-up and trigger an agentless network security audit). There are also links to the latest product-related news on the bottom of the home screen. From the home screen, I quickly saw that this machine was classified as having medium vulnerability, so I clicked on the message and was taken to a dashboard with more detailed information. The information shown in this dashboard included the vulnerability level, top five issues to address (which were patches that needed to be applied and a configuration that needed to be changed), security sensors (software updates, service pack updates, vulnerabilities, and more), scan activity, agent status, and vulnerability trend over time. Clicking the red security sensor showed vulnerabilities grouped by severity, a vulnerability list, and details about each. I could then choose to remediate, acknowledge, ignore, or change the vulnerability severity, or the rules related to the vulnerability. ![]() From here, I created a custom scanning group that encompassed my entire single segment network using the IP address range 192.168.10.1 to 192.168.10.254 and clicked the Scan button. Gfi Languard Vs Nessus Full Scan WouldI was immediately notified that seven computers responded during network discovery and that the full scan would take five hours to complete; within five minutes this estimated scan time dropped to 20 minutes. The scan results overview window was populated with IP addresses and more information, such as machine name and OS, was added as it was discovered. Opening the tree below the first scanned Windows machine, I saw that I could dig deeper into open TCP and UDP ports, hardware, software, and system information. In the vulnerability assessment area, vulnerabilities are broken out by severity (high, low, potential, missing service packs, and missing security updates). I was surprised to see a few missing security updates so I clicked on that header and saw that I was indeed missing three non-Microsoft application specific updates, each with critical severity and posted within the previous three months. Gfi Languard Vs Nessus Download The ApplicationDouble-clicking the application name brought up a new window containing deeper information and a link to download the application-specific patch. The contents of almost any window could be selected and copied to the clipboard by right-clicking. Most screens were organized to show information about the device in a big window, help related to the current device in a smaller window on the right hand side of the screen, activities along the bottom of the screen, and a deeper dive into activities (including errors) below that. ![]() Clicking a specific report showed me its description, ways in which to use it, a sample, and the ability to customize the report or run it as is. Once run, I could view the report on screen (where I encountered some formatting oddities when zooming in), search it, print it, or email it. It can run with or without agents to audit a multitude of devices and operating systems. The management GUI is very well-organized and workflow-driven so its easy for an IT administrator to find what needs to be done and do it.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |