+1-800-492-3951 or +318.104.22.168.20 (GMT+1)
Bolster your defense against the insider threat
The seriousness of insider threats, intentional or not
Identify & mitigate the risk from authenticated users
Securing network access for all authenticated users
Moving from access logging to continuous monitoring and immediate response
Disseminate good user behaviour to protect against insider threats
Reduce the risk of security breaches from the insider threat
Control system access, identify employees on the network, respond to suspicious activity & protect patient data with IS Decisions solutions. Read more
Strong access control measures, enforced unique user ID and enhanced access monitoring to the network and cardholder data with our solutions. Read more
Userlock and FileAudit can both help you address the requirements of SOX by allowing you to control and monitor system access and identity. Read more
UserLock and FileAudit protect the network, and sensitive information within, against unwanted access to help your business become ISO 27001 compliant. Read more
UserLock directly addresses two access control baselines of NIST 800-53, AC-9 Previous Logon (Access) Notification and AC-10 Concurrent Session Control. Read more
This guide looks at some of the key areas for HIPAA compliance and the NHS Security policies with relation to internal safeguards.
Check if you're compliant
Research and guidance on access security for PCI, SOX, GLBA and FCA regulations that safeguard sensitive financial and customer data.
Research and guidance on user security and information access compliance for FISMA, ISO 27001, DPA and Lexcel regulations.
Rather than blaming users for being human, start better protecting users’ authenticated access.
If you are implementing an insider threat program, here’s a 12 step guide to help ensure that it’s set for the future of internal security.
An alternative to complex, costly and disruptive multi-factor authentication
A report on the frustrations that IT managers face with multi-factor authentication and how to improve access security without impeding end users or disrupting existing infrastructure.
User Security in 2015: The future of addressing insider threat
2015 is set to see a huge rise in the number of IT professionals taking action to address insider threat in their organization according to our new research.
Insider Threat Security Manifesto: Beating the threat from within
What can you do to mitigate the risk of insider threats from both a technological and cultural standpoint?
A Study of Insider Threat Personas
Who are the most potentially dangerous users in your organization and what you can do to alter behavior and mitigate risk?
Insider Threat Peer Report
A rare insight into the views of security experts from a variety of industries on internal security
ISO 27001/2 Compliance - Information access and user security
Learn about the requirements of ISO 27001 and ISO 27002 compliance with regards to user security and information access and where organizations could be doing better today.
Do your actions risk your employer's security? Prove it!
Play The Weakest Link - A User Security Game.
Free to play for any employee in any position, from any department.Help engage your users and reinforce their user security awareness.
UserLock limits concurrent logins, restricts access, monitors, alerts and reports on session activity throughout the corporate Windows network.
FileAudit monitors, archives and reports on access (or access attempts) to sensitive files and folders stored on Microsoft Windows systems.
RemoteExec remotely installs applications, executes programs, scripts and updates files and folders on Windows systems throughout the network.
WinReporter retrieves detailed information about hardware, software and security settings from Windows systems and automatically generates reports.
Learn how to install and run CCleaner, the utility program used to clean potentially unwanted files and invalid Windows Registry entries from a computer, with RemoteExec.
CCleaner supports the cleaning of temporary or potentially unwanted files left by certain programs, including Firefox, Opera, Internet Explorer, Safari, and other applications along with browsing history, cookies, Recycle bin, memory dumps, file fragments, log files, system caches, application data, autocomplete form history, and various other data.
Download the latest version of CCleaner from: http://www.piriform.com/ccleaner/download
Open RemoteExec and go to Remote Jobs/New Remote Job/File execution through the Configuration tree.
In the first section «Settings», browse the File field to the setup file previously downloaded.
You can find in the help file of CCleaner all command line parameters.
/S: Performs a silent install of CCleaner with default options.
/D= Permits to choose a different installation folder than the default.
/L= Choose the language file identified by the locale ID.
List of locale ID: http://support.microsoft.com/kb/221435
List of CCleaner supported language: http://www.piriform.com/docs/ccleaner/ccleaner-settings/changing-the-language-ccleaner-uses
At minima you must specify the /S as Argument. If you’d like, you can choose the installation path and language.
Set the Context to Administrative and keep the Auto option checked. RemoteExec will optimize the remote execution.
Go to the Target Computers section and select the computers on which you want to deploy CCleaner.
You can now start your deployment by clicking on . The Progress window will pop in a new tab allowing you to follow the remote execution process.
First install CCleaner on your own computer.
Personalize the parameters.
Save these parameters in an ini file: Menu Options/Advanced – Check the box «Save all settings to INI file». This option allows CCleaner to use the parameters stored into this INI file instead of those contained in the Windows registry.
Once this option enabled, your CCleaner installation is now portable.
Open RemoteExec and go to Remote Jobs/New Remote Job/File operation.
Select in the «Settings» section the Operation «Copy a folder».
In the Source path, browse to the installation folder on your workstation.By default: C:\Program Files\CCleaner.
Type in the Target path field the folder path you want to set on Target Computers1. It can be the same as on your workstation: C:\Program Files\.
1: If the target path doesn’t exist, all the folders composing the path tree will be created Note: If you already have a CCleaner installation on Target Computers (with default parameters or even personalized parameters as done here), you can update/change the CCleaner settings using the Ini file. Change the parameters as wanted in your proper installation or directly in an Ini file copy then push it using RemoteExec selecting the File operation «Copy a file». Ini settings description: http://www.piriform.com/docs/ccleaner/advanced-usage/ccleaner-ini-files/using-ccleanerini-to-modify-how-ccleaner-runs
You can run CCleaner remotely and silently on computers using RemoteExec. The settings taken into account for this remote runs are those set on target machines (see previous paragraph).
RemoteExec and go to Remote Jobs/New Remote Job/File execution through the Configuration tree.
In the File field, specify the remote CCleaner.exe path. By default: C:\Program Files\CCleaner\CCleaner.exe
Fill Argument(s) field with «/AUTO».
Set the Context to Administrative.
Uncheck the Auto box.
Select the Verb «Open».
Select «No» for the Copy files option.
Go to the Target Computers section and select the computers on which you want to run CCleaner.
You can now start your remote execution by clicking on . The Progress window will pop in a new tab allowing you to follow the remote execution process.
Note: When you run CCleaner.exe using the /AUTO parameter, CCleaner does not run the Registry cleaner. You cannot currently run the Registry cleaner through a command-line parameter.
Download RemoteExec now
Check RemoteExec detailed features
Share this page:
(Free number for US & Canada)
Copyright © - IS Decisions | All Rights Reserved.