I would see this as a great oportunity to offer the client and asset management system and a configuration management system if your company sell those. I worry a bit when I find clients who's policies lack proper configuration and asset managements measures that include all networked devices
Carlos Sent from my Mobile Phone On Apr 23, 2010, at 10:39 AM, Shane Kelly <[email protected]> wrote: > Thanks for all your great suggestions! > > With regards to machines that sit outside the domain they will be > looked at manually by the client, as these machines should most likely > not exist on the network. > > I've personally not used the Nessus to do authenticated scans, so it's > good to hear it suggested. I'll have a look at each, but the client in > this case probably be more confertable using with us using Nessus. > > Thanks! > Shane > > On 23 April 2010 14:40, <[email protected]> wrote: >> I second that; works very well for machines in the domain. Had this >> set up >> to check for AV (installed/running/revision of pattern and engine), >> patching solution and some other bits. You can send a mail if non >> compliant >> with your policies to support staff as well. Non domain members are >> still a >> problem tho. >> >> Daniel >> >> On Fri, 23 Apr 2010 09:30:29 -0400, Carlos Perez >> <[email protected]> wrote: >>> Of they are In the domain you can use wmi thru powershell, wmic, >>> wsh..etc to automate the process and read the registry keys for >>> install apps plus get a list of running procceses >>> >>> Carlos >>> >>> Sent from my Mobile Phone >>> >>> On Apr 23, 2010, at 8:22 AM, Shane Kelly <[email protected]> >>> wrote: >>> >>>> Hey Guys, >>>> >>>> Does anyone have any experiance with doing agentless scanning for >>>> installed software in a network? >>>> I'm looking for instances where workstations may exist that do not >>>> have Safeguard Easy or Anti-virus Installed. >>>> >>>> >>>> Many thanks in advance, >>>> Shane >>>> _______________________________________________ >>>> Pauldotcom mailing list >>>> [email protected] >>>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >>>> Main Web Site: http://pauldotcom.com >>> _______________________________________________ >>> Pauldotcom mailing list >>> [email protected] >>> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >>> Main Web Site: http://pauldotcom.com >> _______________________________________________ >> Pauldotcom mailing list >> [email protected] >> http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom >> Main Web Site: http://pauldotcom.com >> > _______________________________________________ > Pauldotcom mailing list > [email protected] > http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom > Main Web Site: http://pauldotcom.com _______________________________________________ Pauldotcom mailing list [email protected] http://mail.pauldotcom.com/cgi-bin/mailman/listinfo/pauldotcom Main Web Site: http://pauldotcom.com
