Software-Windows; Anti-Spyware; Description; Test Properties - Extreme Networks AG200 User Manual

Version 5.0
Table of Contents

Advertisement

Tests Help
4 Select Edit>>Find. Search for the run and runOnce keys:
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ RunServices
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ RunServicesOnce
HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\ RunOnce\Setup
5 If the keys have any other value than the one specified, delete the unauthorized value by double-
clicking the item, deleting the data, and clicking OK.
NOTE
If you're looking for a registry key, you enter a trailing slash. If you're looking for a registry value, you do not enter a
trailing slash.
Software—Windows
The Software tests verify that any endpoint attempting to connect to your system meets your specified
software requirements. Installing the most recent version of your software helps protect your system
against exploits targeting the latest vulnerabilities.

Anti-spyware

Description

This test verifies that the endpoint attempting to connect to your system has anti-spyware tools installed
and that the anti-spyware definitions are up-to-date.

Test Properties

Select the anti-spyware software allowed on your network. Any endpoint that does not have at least
one of the anti-spyware software packages selected will fail this test. You can also enter a value in the
Last scan performed within text field, which requires the anti-spyware software to have executed a
scan on the endpoint within the set number of days.

How Does this Affect Me?

Spyware is software that gathers and transmits information (about the user, computer, and/or network)
without the user's knowledge. It is usually installed without the user's knowledge through seemingly
harmless downloads such as freeware, shareware, instant messages, and email attachments. Spyware is
intentionally difficult to detect and remove. Those who create and release spyware don't want you to
know it's there or be able to easily uninstall it. The information gathered can be exploited for mischief,
for financial gain, and for gaining unauthorized access to your network. Spyware also consumes system
resources and can cause system instability and crashes.
362
Sentriant AG Users' Guide, Version 5.0

Advertisement

Table of Contents
loading

This manual is also suitable for:

Sentriant ag

Table of Contents