+1-800-492-3951 or +322.214.171.124.20 (GMT+1)
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Reduce the risk of security breaches from the insider threat
Control system access, identify employees on the network, respond to suspicious activity & protect patient data with IS Decisions solutions. Read more
Strong access control measures, enforced unique user ID and enhanced access monitoring to the network and cardholder data with our solutions. Read more
Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity. Read more
UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant. Read more
UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control. Read more
This guide looks at some of the key areas for HIPAA compliance and the NHS Security policies with relation to internal safeguards.
Check if you're compliant
Research and guidance on access security for PCI, SOX, GLBA and FCA regulations that safeguard sensitive financial and customer data.
Research and guidance on user security and information access compliance for FISMA, ISO 27001, DPA and Lexcel regulations.
If you are implementing an insider threat program, here’s a 12 step guide to help ensure that it’s set for the future of internal security.
An alternative to complex, costly and disruptive multi-factor authentication
A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
From Brutus to Snowden: A study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
Do your actions risk your employer's security? Prove it!
Play The Weakest Link - A User Security Game.
Free to play for any employee in any position, from any department.Help engage your users and reinforce their user security awareness.
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
RemoteExec can easily deploy the Windows 7/2008 R2 Service Pack 1. This can be useful if you have to update servers without an Internet connection or workstations with the Windows Update engine turned off.
You can update your system directly following the 6 steps below. Before getting started, check to see if the Targets Computers are being used as this operation will consume resources and will require at least one reboot.
Open RemoteExec and go to Remote Jobs/New Remote Job/Update installation through the Configuration tree.
In the first section Settings, browse to the Service Pack installation file in File field.RemoteExec will detect automatically the name, type, architecture and operating systems concerned. We advise you to keep the option Don’t reboot disabled1: this update needs at least one reboot to process fully. There is nothing else to set.
1: The reboot will be initiated only if no session is open on the target computers. If a session is opened or locked, RemoteExec will notify the user through a popup inviting him to reboot the computer . If you want to force the reboot, you need to create a Multiple actions with first this Update installation and then a Reboot System action. Make sure that the following options are enables for this reboot: Force applications to close and Reboot only if needed.
As you see below, the second section called Filter that RemoteExec automatically configures the required conditions. You can set additional filters such as the target OS level since this Service Pack can address both Windows 7 and Windows 2008 R2.
Go to the Target Computers section and select the computers on which you want to deploy this Service Pack.
You can now start your update by clicking on
The Progress window will open in a new tab to permit you to follow the remote operation process.
The size of this new service pack needs to be taken in consideration for this operation:
The time taken for this deployment can fluctuate (depending on the target computer system and the bandwidth available) between 15 minutes to more than half an hour. As in every Windows Service Pack installation, hardware resources will be impacted. That is why we advise to schedule this operation during off business hours. In the example below, we have planned it for Sunday evening
Follow the previous steps 1 to 4.
Instead of launching the deployment directly, click in the Quick Access Pane on .
Enter a name on the Schedule Wizard for this new Task.
Validate the new Task name and the Windows scheduler pop-up window will appear. Set the task to Once and choose the Start time settings. Validate by clicking OK. You will be prompted to set an administrative account for this Task.
The RemoteExec Scheduler now displays our new scheduled job.
In this example we have scheduled the SP1 update on Sunday evening. You can also schedule the results report of this deployment in order to find it into our mailbox2 Monday morning when coming back to work.
Go to Reporter/Execution results through the Configuration tree.
Set the Report as wanted. In the Time section, leave the Execution combo list to the last Execution done3.
Click in the Quick Access Pane on
Select the Task we previously created and click OK.
The Report will be added in the chosen Scheduled Task.
In the Configuration Tree, go to the Scheduled Task.
Select the Report node Execution results. The report configuration form will be displayed into the Central Window. Go to the Document Generation section and check the box for The first file to generate.
Choose the path and format settings for the report.
Click on Add notification in the Quick Access pane. It will be added just after the Execution results report into the Scheduled Task.
Double click on the Notification line to display its parameters. Check the box Send documents by E-mail and fill in the different fields as needed.
The report will be available in your email box when you will come back to work on Monday morning and you will be able to check if the SP1 deployment was successful.
2 : The SMTP information used for the email expedition needs to be set in the Console Options available at the bottom of the Configuration tree.
3 : When you schedule a report, if you select the latest execution, the report will always be generated for the latest execution.
Download RemoteExec now
Check RemoteExec detailed features
Share this page:
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.