Extract critical information about the security status of your network using GFI LanGuard reports. A network is as vulnerable as its weakest point: use GFI LanGuard reports to discover all devices from your network, vulnerability status, patching status, open ports, open shares, unused services and users, unauthorized applications and other security sensitive information.
The reports can be:
When antivirus protection is not working on a system the entire network might be in great danger. Find out when the antivirus is not installed or disabled on a system using "Antivirus Audit" report.
All IT security related compliance regulations require regular vulnerability assessments of the network and all systems and applications to be fully patched. GFI LanGuard helps with that and comes with dedicated reports that allow you to prove you are compliant with an important number of regulations and standards, such as PCI DSS, HIPAA, SOX, GLBA, PSN Coco, FERPA, CIPA, ISO/IEC 27001 & 27002, FISMA, CAG and NERC CIP.
Unused user accounts can accumulate in time leading not only to cluttered user management, but also adding security holes as old accounts can be used as an entry point in your network. It is recommended to remove or disable accounts that are no longer used. Investigate them using "Groups and Users" report.
Computers with outdated hardware can generate productivity issues because they are slow and security issues because they might not fit system requirements of the latest updates for operating systems and third party applications. Find about them using "Hardware Audit" report.
Using "Mobile Devices" report you can find out what users, how often and using what smartphones and tablets connect to the company infrastructure to check email. Microsoft Exchange, Office 365, Google Apps and Apple Profiles Manager are supported.
To know what really happens in your network use "Network Security History" report. You will learn about applications installed or removed, services started or stopped, ports newly open, user accounts created, modified or removed, new open shares, hardware changes and so on.
Get an executive overview of your network security: overall vulnerability status, most vulnerable computers, vulnerability trends, statistics on how many computers have vulnerabilities, missing patches, unauthorized applications, antivirus or firewall turned off and so on.
Devices you are not aware of cannot be managed and may represent a huge security hole. Get notified about forgotten or new devices in your network using "New Devices" report. You will learn about new servers, workstations or laptops, new virtual machines, new network devices such as access points, routers, switchers or printers and new mobile devices such as smartphones and tablets.
Open ports are gates that allow remote access to your systems. Investigation of any suspicion open port should be a high priority task for all system administrators. Monitor them using "Open Ports" report and make sure that only necessarily TCP and UDP ports are open.
Ensure that your systems are always up to date. The majority of security breaches are caused by a vulnerability for which there is a patch that was not applied. "Patching Status" report provides complete visibility into the network patching status, covering operating system and most popular third party applications across Windows, Apple OS X, Red Hat Linux Enterprise, CentOS, Fedora, Ubuntu, Debian, SUSE and openSUSE systems.
Looking for specific keywords within the scan results of the entire network? Use the full text search functionality for this. For example, a search for "ACCOUNT_DISABLED" will reveal all disabled users across the network. A search for "cross-site scripting" will list all vulnerabilities detected in the network that contain "cross-site scripting" in name or description.
Among the best security practices is to audit and close unnecessary services to reduce the attack surface for your systems. "Services" report is the right tool to achieve this.
Third party applications are a major source of security vulnerabilities. Find out what applications are installed in your network using "Software Audit" report. Check how many instances of a specific application are present in your network to verify license usage.
USB devices are a common way to steal sensitive company data or to introduce mallware in the network. Verify what USB devices connect to your network using the "USB Devices" report.
Find about the security issues in your network before it is too late. "Vulnerability Status" lists all security vulnerabilities detected in the network. Use it to see where critical issues are and to check vulnerability status for each machine: workstations, servers and laptops, physical and virtual machines, network devices such as routers, printers, switches and access points or mobile devices such as smartphones and tablets.