Product manual

GFI LanGuard 7 Interpreting Results | 112
Icon Description
General Applications Enumerates installed software on scan targets.
Antivirus Applications Lists installed antivirus engines on scan targets.
Instant Messenger Appli-
cations
Lists all detected instances of Instant messenger applications on scan targets.
Patch Management Appli-
cations
Lists all the installed patch management applications, detected on your scan targets
during a scan.
Web Browser Applications Contains scanned targets that have Internet browsers installed.
Firewall Applications Enumerates information on installed Firewall applications on scan targets.
Anti–phishing Applications Lists information of installed anti–phishing engines on scan targets.
VPN Client Applications Includes information on installed Virtual Private Network clients on scan targets.
Peer–To–Peer Applications Shows installed Peer–To–Peer applications on scan targets.
Table 45: Software information from an audit
System Information
Click System Information to view all details related to the operating system installed on a target
machine. Table below describes the system information groups:
Category Information Identify
Shares Share name
Share remark (extra
details on the share).
Folder which is being
shared on the target
computer
Share permissions and
access rights
NTFS permissions and
access rights.
Users sharing entire hard–drives, shares that have weak or incorrectly con-
figured access permissions.
Start-up folders, and similar system files, that are accessible by unauthor-
ized users, or through user accounts, that do not have administrator priv-
ileges, but are allowed to execute code on target computers.
Unnecessary or unused shares.
Password
Policy
Minimum password
length
Maximum password
length
Minimum password
expiry date
Force logoff
Password history.
Incorrectly configured lockout control
Password strength enforcement policies.
Security
Audit Pol-
icy
Audit account logon
events
Audit account man-
agement
Audit directory serv-
ice access
Audit logon events
And more
Security holes or breaches.
Note
To view Security Audit Policy, enable auditing on target computers. For
more information, refer to Manual scans (page 66).
Table 46: System information from an audit