+1-800-492-3951 or +318.104.22.168.20 (GMT+1)
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Reduce the risk of security breaches from the insider threat
Control system access, identify employees on the network, respond to suspicious activity & protect patient data with IS Decisions solutions. Read more
Strong access control measures, enforced unique user ID and enhanced access monitoring to the network and cardholder data with our solutions. Read more
Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity. Read more
UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant. Read more
UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control. Read more
This guide looks at some of the key areas for HIPAA compliance and the NHS Security policies with relation to internal safeguards.
Check if you're compliant
Research and guidance on access security for PCI, SOX, GLBA and FCA regulations that safeguard sensitive financial and customer data.
Research and guidance on user security and information access compliance for FISMA, ISO 27001, DPA and Lexcel regulations.
Rather than blaming users for being human, start better protecting users’ authenticated access.
If you are implementing an insider threat program, here’s a 12 step guide to help ensure that it’s set for the future of internal security.
An alternative to complex, costly and disruptive multi-factor authentication
A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
A Study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
ISO 27001/2 Compliance - Information access and user security
Learn about the requirements of ISO 27001 and ISO 27002 compliance with regards to user security and information access and where organizations could be doing better today.
Do your actions risk your employer's security? Prove it!
Play The Weakest Link - A User Security Game.
Free to play for any employee in any position, from any department.Help engage your users and reinforce their user security awareness.
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
Deploy easily the new version of Internet Explorer 9 on your network using RemoteExec 5.
Easily deploy the new Internet Explorer 9 (IE9) browser on chosen computers by following these instructions.
Download the four existing IE 9 packages from the Microsoft Web site
Open RemoteExec and go to Remote Jobs/New Remote Job/Multiple actions through the Configuration tree.
Click on Add Files to execute/deploy in the Quick access pane. A browser will open. Browse to the four downloaded IE 9 packages, select them and click on Open.
Go to the Target Computers section and select the computers on which you want to deploy IE 9.
You can now start your deployment by clicking on
The Progress window will open in a new tab to permit you to follow the remote operation process.
The simplified and direct deployment previously described shows the easiest path possible. This is the full scenario to follow if you want to deploy the required hotfix and Internet Explorer 9.
Here is the list of requirements needed to deploy Internet Explorer 9:
In this article we describe how to build your deployment scenario automatically.
Download the four existing IE 9 packages from Microsoft Web site and the two KB2454826 hotfixs packages:
The Quick access pane allows you to add all Remote Actions needed for this deployment scenario. Click on Add a wake up. This System action will be added to the central window. As it’s already pre-set, you’ve nothing else to do: RemoteExec will wake up the target computers1 and wait until an answer is received before performing the next action.
1: RemoteExec should have automatically scanned the Mac addresses and subnet of Target computers. RemoteExec automatically scans for MAC addresses and subnets at each start-up. You can launch or schedule the scan of MAC addresses during working hours with the Get wake up info Action. You can also check all previously scanned MAC addresses or add manually MAC addresses and subnets in the RemoteExec Options.
Click on Add Files to execute/deploy in the Quick access pane. A browser will open. Browse to the two KB2454826 hotfixs packages. Select them and click on Open.
RemoteExec will detect the package type as an Update installation action and will set all parameters automatically2.
2: If the KB2454826 has been already installed, RemoteExec will display a warning message in the Execution Results Windows: Exit code not null (0x240006 The update to be installed is already installed on the system.). Then it will launch the next action.
Click on Add a reboot in the Quick access pane.
As the reboot needs only be done for the computers which just received the hotfixs, double-click on the Reboot action in the list and check the option Reboot only if needed.
Repeat step 4 to add the IE 9 installation files clicking on Add Files to execute/deploy in the Quick access pane.
Add another Reboot action after the IE 9 installation actions. As in step 6, enable the Reboot only if needed check box. IE 9 deployment require a reboot to finalize his installation.
To finish, click on Add a shutdown to power off your computers.
Your whole IE 9 deployment scenario is now complete.
You can select your Target computers in the third section as wanted: only the machines which can accept the hotfixs or this Internet Explorer version will be processed.
Schedule your Job deployment as explained in a previous article
It can be useful to save this scenario deployment for re-use, when you add new computers to your network for example. Once you’ve finished your Multiple actions configuration, select it in the Configuration tree and then click on Save in my Remote Actions through the context menu or the Quick access pane.
Type a name for this Multiple actions in the pop-up and validate. You will be able to use it later in My Remote Actions menu through the Use action in a new remote job command.
Share this page:
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.