Category: Operations

Scenario Scheduled tasks represent a vector for malware as well as the potential for impacting system performance if unnecessary scheduled tasks are running on endpoints.

Free Download

Scenario Recently some Chrome extension publishers had their extensions hijacked by malicious third parties, who installed adware and possibly other spyware into these extensions. As a consequence, auditing and controlling the use of Chrome extensions…

Free Download

Scenario   Many software products, e.g Google Chrome, can be installed on a per-user basis. This typically means that a non-privileged user can install the product, with all executable and data files being placed in…

Free Download

Scenario There are a number of critical registry entries which control Nomad, along with firewall rules, ActiveEfficiency connectivity etc. This product pack will assist in verifying whether any Nomad settings or firewall rules etc. are…

Free Download

Easily find services with open ports on any device in your environment.
Free Download

Assess your network readiness for Skype for Business, by automating the Microsoft Skype for Business Network Assessment Tool.
Free Download

Use Tachyon to easily send notifications or survey questions to Tachyon users and capture their responses.
Free Download

Assess your environment and get recommendations for securing your Windows 10 estate. Also check & repair the health of Configuration Manager.
Free Download

Simplify managing and applying restore points for shadow storage across the entire organization.
Free Download