more about Assuria Auditor
Assuria Auditor
Assuria
Auditor
provides layers of capability for servers (and critical
desktops), the reports provided by Assuria Auditor are designed to
assist the user to manage the security and configuration of their
servers.
The Vulnerability Detection
capability allows Assuria Auditor to detect vulnerabilities on the
systems under examination. Vulnerabilities are often associated
with poor configuration settings and specific versions of the operating
systems, applications and files. Vulnerability data in Assuria
Auditor is updated on a regular basis. International standards for
vulnerabilities, CVE and CVSS are built into Assuria Auditor.
Assuria Auditor provides clear information as to how each vulnerability
may be remediated.
The Configuration assurance
capability allows Assuria Auditor to examine and compare configuration
settings to accepted server security best practice and in accordance
with installation requirements. Many security weaknesses are
not vulnerabilities but do pose a risk to most installations, for
example a server configured with a weak password policy.
The Policy compliance capability
Assuria Auditor to report vulnerabilities and configuration setting
against the users own standards or external standards such as ISO 27701
or the Payment Card Industry Data Security Standard. With Assuria
Auditor reports it is possible to see how your servers match to the
different standards.
The Change Detection capability
Assuria Auditor to identify and report changes on a system, these
changes maybe made to files, registry keys, groups, users, shares,
services, software installed. Each detected change should have been
previously authorised via a Change Control process and un-authorised
changes may indicate malicious activity on your server system. New
Change Detection User interface
click here.
The System information capability
provides information about the server systems, for example the
rights and privileges assigned to Groups and Users. Such information is
vital to ensure that server security does not degrade over time and that
simple controls such as the removal of leavers from user lists is kept
up to date.