Category: Security

Scenario Scheduled tasks represent a vector for malware as well as the potential for impacting system performance if unnecessary scheduled tasks are running on endpoints.

Free Download

Scenario Recently some Chrome extension publishers had their extensions hijacked by malicious third parties, who installed adware and possibly other spyware into these extensions. As a consequence, auditing and controlling the use of Chrome extensions…

Free Download

Identify if a patch for the Meltdown or Spectre vulnerabilities has been applied and whether your processors may be vulnerable. Compare endpoint performance before and after patch.
Free Download

Identifies endpoints which are potentially vulnerable to Intel SA00086.
Free Download

Identify machines likely to be impacted by BadRabbit cryptoware malware by looking for indicators of compromise.
Free Download

A collection of commonly used Tachyon questions and instructions. Also useful as an introduction to building your own Product Packs.
Free Download

A collection of all available out of the box instructions that ship with Tachyon. Useful as a reference or learning tool.
Free Download

Verify that your newly deployed Tachyon environment is configured to operate correctly.
Free Download

Quickly generate a live summary of all Android devices and associated configuration settings in your environment.
Free Download