- Ability to generate and save a detailed log to be used by an IT expert or uploaded to an online forum for diagnosis.
- Option to exclude private, personal information from being saved in logs.
- Integrated Anti-Stealth technology allows discovering hidden objects (e.g. rootkits) in MBR, registry entries, drivers, services and processes.
- Ability to compare two existing logs for differences makes it easy to detect changes over time.
- Log entries are assigned a color code risk level for easy filtering.
- Intuitive hierarchical navigation of logs.
Blog dedicado al estudio de la Seguridad de la Información - Privacidad - Seguridad Informatica - Auditoria informática. (Recopilación de principales noticias, eventos, politicas de seguridad, guías de buenas practicas, normas, estándares, herramientas, otros)
miércoles, 30 de abril de 2008
ESET SysInspector
Etiquetas:
Auditoria,
Herramientas
Suscribirse a:
Enviar comentarios (Atom)
No hay comentarios:
Publicar un comentario