The practice of administering changes with the help of tested methods and techniques in order to avoid new errors and minimize the impact of changes.
WhatChanged displays the items that are Added, modified and deleted in File System and Registry.
Tiny footprint installed in monitored systems to track changes.
Computer Logical Groups
User-defined groups. These groups are logical in the sense you can group computers in different domains of your interest for easy management.
Helps to keep the selected Snapshot forever or delete when the Snapshot limit exceeds.
A system for organizing directories and files, generally in terms of how it is implemented in the disk operating system.
Filters are set to exclude folders and files from tracking.
WhatChanged displays the items that are Added, modified and deleted in File System and Registry. Also, displays the unaltered items in File System and Registry.
Configure and apply folders / files to track and apply filters to all the monitored computers from the Manager console.
Helps to group and track registry hives and directories of an application.
WhatChanged removes all the Snapshots including the Snapshots selected to keep forever and takes a new baseline Snapshot.
Removing Client Components
Helps to clean-up database entries and other components when clients are removed manually from the remote computers.
Snapshot is an image of File System and Registry.
Any software that covertly gathers user information through the user's Internet connection without his or her knowledge, usually for advertising purposes. Spyware applications are typically bundled as a hidden component of freeware or shareware programs that can be downloaded from the Internet. Once installed, the spyware monitors user activity on the Internet and transmits that information in the background to someone else.
Configure Snapshot automation, Snapshot limit and filters to the current system. System Configuration can also be propagated to all other system in the network.
Trojan Horses are impostor files that claim to be something desirable but, in fact, are malicious. Rather than insert code into existing files, a Trojan horse appears to do one thing (install a screen saver, for example) when in fact it does something entirely different, and potentially malicious, such as erase files.
Although often referred to as such, Trojan horses are not viruses in the strict sense because they cannot replicate automatically. For a Trojan horse to spread, it must be invited onto a computer by the user opening an email attachment or downloading and running a file from the Internet, for example. Trojan.Vundo is an example of a Trojan horse.
A computer virus is a self-replicating computer program written to alter the way a computer operates, without the permission or knowledge of the user. Though the term is commonly used to refer to a range of malware, a true virus must replicate itself, and must execute itself. The latter criteria is often met by a virus which replaces existing executable files with a virus-infected copy. While viruses can be intentionally destructive—destroying data, for example—some viruses are benign or merely annoying.
Vulnerability analysis, also known as vulnerability assessment, is a process that defines, identifies, and classifies the security holes (vulnerabilities) in a computer, network, or communications infrastructure. In addition, vulnerability analysis can forecast the effectiveness of proposed countermeasures and evaluate their actual effectiveness after they are put into use.
In computing, the Windows registry is a database, which stores settings and options for the operating system. It contains information and settings for all the hardware, software, users, and preferences of the PC. Whenever a user makes changes to "Control Panel" settings, or file associations, system policies, or installed software, the changes are reflected and stored in the registry.
A worm is a piece of software that uses computer networks and security flaws to create copies of itself. A copy of the worm will scan the network for any other machine that has a specific security flaw. It replicates itself to the new machine using the security flaw, and then begins scanning and replicating anew.
Worms are programs that replicate themselves from system to system without the use of a host file. This is in contrast to viruses, which requires the spreading of an infected host file. Although worms generally exist inside of other files, often Word or Excel documents, there is a difference between how worms and viruses use the host file. Usually the worm will release a document that already has the "worm" macro inside the document. The entire document will travel from computer to computer, so the entire document should be considered the worm. W32.Mydoom.AX@mm is an example of a worm.