Audit-l is sponsored by Audit Leverage (IAD Solutions, Inc.) www.auditleverage.com ***************************************
Does anyone know of prevent or detect controls surrounding Zen Works software. Our IT department uses Zen Works to "take control" of a user's computer and fix IT related problems. Once the IT person has control of the computer, they can essentially do anything the user could do (i.e. access to files, execute transactions, etc.) Short of disabling Zen Works for certain applications, does anyone know of prevent or detect controls for this type of access? Audit Leverage is a department management software package that integrates and automates the entire audit process. This comprehensive package includes risk assessment, audit planning, budgeting, staffing, scheduling, timekeeping, automated work papers, audit findings & recommendations, reporting and audit follow-up. Audit Leverage allows auditors in the field to work off-line and dial in to synchronize their work with the Audit Leverage database on the network, enabling managers to review the work papers instantly without being at the job site. Demo available at www.auditleverage.com If your organization would like to sponsor this discussion list send an e-mail to [EMAIL PROTECTED] for information. To unsubscribe to the Audit-l list send an e-mail to [EMAIL PROTECTED] Leave the subject line blank and include the following message in the body: Unsubscribe audit-l (yourname) Thanks, Jim Kaplan List Manager
