{"id":205,"date":"2011-05-17T11:44:00","date_gmt":"2011-05-17T11:44:00","guid":{"rendered":"https:\/\/belayclientstaging.zone\/securityeverafter\/2011\/05\/17\/control-2-inventory-of-authorized-and-unauthorized-software\/"},"modified":"2011-05-17T11:44:00","modified_gmt":"2011-05-17T11:44:00","slug":"control-2-inventory-of-authorized-and-unauthorized-software","status":"publish","type":"post","link":"https:\/\/securityeverafter.com\/control-2-inventory-of-authorized-and-unauthorized-software\/","title":{"rendered":"Control 2 – Inventory of Authorized and Unauthorized Software"},"content":{"rendered":"
Control 2 focuses on knowing the software that is installed on workstations and servers throughout your organization. Like Control 1, this may seem overwhelming at first. However, once you have started to gain momentum, this one should not be difficult to maintain.<\/p>\n
Start with an initial assessment from these tools to begin the process of realizing what software is installed. An immediate benefit is knowing what plugins such as Adobe Reader<\/a> and Flash Player<\/a> are out of date and need to be updated.<\/p>\n Ways to Implement this Control:<\/p>\n 1 – Use the software inventory report in Kaspersky Anti Virus<\/a> that lists each software package and version. This is a great way to leverage an existing tool to do something new. <\/p>\n 2 – Software Inventory Report in Microsoft SMS<\/a> or Dell Kace<\/a> (KBox) that listed each software package. <\/p>\n 3 – For Linux hosts, the Splunk<\/a> *NIX app<\/a> has a standard report package Latest Packages by Host<\/i> that can also be automated.<\/p>\n These reports are a good to send to junior team members. It will let them become involved in securing the network as they begin to gain understanding of what software should be installed and learning from you the proper response when something unexpected is found.<\/p>\n","protected":false},"excerpt":{"rendered":" Control 2 focuses on knowing the software that is installed on workstations and servers throughout your organization. Like Control 1, this may seem overwhelming at first. However, once you have started to gain momentum, this one should not be difficult to maintain. Start with an initial assessment from these tools to begin the process of […]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[20,22],"tags":[],"jetpack_publicize_connections":[],"yoast_head":"\n