摘要 |
A computer-implemented method includes establishing a logon connection between a host system and one or more client systems through a network; assessing computer security at the host system by scanning each client system after logon; parsing data obtained by scanning each client system; and generating output files containing parsed data. Implementations may include scanning for one or more of: Ethernet adapters, operating system, computer name, antivirus installation, security information, mounted drives, local user information, services, audit policies, shared drives, trusted domains, Internet uniform locators, installed applications, images and movies.
|